[1] |
SUN X , ANSARI N . EdgeIoT:mobile edge computing for the Internet of things[J]. IEEE Communications Magazine, 2016,54(12): 22-29.
|
[2] |
SKALA K , DAVIDOVI? D , AFGAN E ,et al. Scalable distributed computing hierarchy:cloud,fog and dew computing[J]. Open Journal of Cloud Computing, 2015,2(1): 16-24.
|
[3] |
SONEKAR S V , KSHIRSAGAR M M , MALIK L . Cluster head selection and malicious node detection in wireless ad hoc networks[C]// Next-Generation Networks. Berlin:Springer, 2018: 547-554.
|
[4] |
YIM H J , SON Y H , LEE K C . A data distribution service quality of services policy configuration for data/events/services in the Internet of things[J]. Advanced Science Letters, 2016,22(11): 3612-3617.
|
[5] |
乐光学, 戴亚盛, 杨晓慧 ,等. 边缘计算可信协同服务策略建模[J]. 计算机研究与发展, 2020,57(5): 1080-1102.
|
|
YUE G X , DAI Y S , YANG X H ,et al. Model of trusted cooperative service for edge computing[J]. Journal of Computer Research and Development, 2020,57(5): 1080-1102.
|
[6] |
HASHEM E M , NI Q , SHI Q . Secure and privacy-aware cloud-assisted video reporting service in 5G-enabled vehicular networks[J]. IEEE Transactions on Vehicular Technology, 2016,65(10): 7868-7881.
|
[7] |
CONOSCENTI M , VETRò A , DE MARTIN J C . Peer to peer for privacy and decentralization in the Internet of things[C]// Proceedings of 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C). Piscataway:IEEE Press, 2017: 288-290.
|
[8] |
JIN B , JIANG D S , XIONG J B ,et al. D2D data privacy protection mechanism based on reliability and homomorphic encryption[J]. IEEE Access, 2018,6: 51140-51150.
|
[9] |
SCIANCALEPORE S , PIRO G , CALDAROLA D ,et al. OAuth-IoT:an access control framework for the Internet of things based on open standards[C]// Proceedings of 2017 IEEE Symposium on Computers and Communications. Piscataway:IEEE Press, 2017: 676-681.
|
[10] |
GUAN Z T , SI G L , WU J ,et al. Utility-privacy tradeoff based on random data obfuscation in Internet of energy[J]. IEEE Access, 2017,5: 3250-3262.
|
[11] |
ZHENG W T , WANG Z Y , LV T T ,et al. K-anonymity algorithm based on improved clustering[C]// Algorithms and Architectures for Parallel Processing. Berlin:Springer, 2018: 462-476.
|
[12] |
WANG Q , HUANG J , CHEN Y J ,et al. PROST:privacy-preserving and truthful online double auction for spectrum allocation[J]. IEEE Transactions on Information Forensics and Security, 2019,14(2): 374-386.
|
[13] |
WANG X , LUO T , LI J F . An efficient fully homomorphic encryption scheme for private information retrieval in the cloud[J]. International Journal of Pattern Recognition and Artificial Intelligence, 2020,34(4): 2055008.
|
[14] |
张佳乐, 赵彦超, 陈兵 ,等. 边缘计算数据安全与隐私保护研究综述[J]. 通信学报, 2018,39(3): 1-21.
|
|
ZHANG J L , ZHAO Y C , CHEN B ,et al. Survey on data security and privacy-preserving for the research of edge computing[J]. Journal on Communications, 2018,39(3): 1-21.
|
[15] |
HUANG X M , YU R , KANG J W ,et al. Distributed reputation management for secure and efficient vehicular edge computing and networks[J]. IEEE Access, 2017,5: 25408-25420.
|
[16] |
邓宇乔, 杨波, 唐春明 ,等. 基于密文策略的流程加密研究[J]. 计算机学报, 2019,42(5): 1063-1075.
|
|
DENG Y Q , YANG B , TANG C M ,et al. Research of ciphertext policy process-based encryption[J]. Chinese Journal of Computers, 2019,42(5): 1063-1075.
|
[17] |
霍星, 张阳洋, 景永俊 ,等. MAS环境中一种基于反馈可信度的多维信誉计算算法[J]. 软件学报, 2020,31(2): 374-394.
|
|
HUO X , ZHANG Y Y , JING Y J ,et al. Multidimensional reputation calculation method based on feedback reliability in MAS environment[J]. Journal of Software, 2020,31(2): 374-394.
|
[18] |
王田, 张广学, 蔡绍滨 ,等. 传感云中的信任评价机制研究进展[J]. 通信学报, 2018,39(6): 37-51.
|
|
WANG T , ZHANG G X , CAI S B ,et al. Survey on trust evaluation mechanism in sensor-cloud[J]. Journal on Communications, 2018,39(6): 37-51.
|
[19] |
NAGARAJAN R , THIRUNAVUKARASU R , SHANMUGAM S . A fuzzy-based intelligent cloud broker with MapReduce framework to evaluate the trust level of cloud services using customer feedback[J]. International Journal of Fuzzy Systems, 2018,20(1): 339-347.
|
[20] |
SIADAT S , RAHMANI A M , NAVID H . Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model[J]. The Journal of Supercomputing, 2017,73(6): 2682-2704.
|
[21] |
邱磊, 蒋文贤, 李玉泽 ,等. 基于边缘计算与信任值的可信数据收集算法[J]. 软件学报, 2019,30(S1): 71-81.
|
|
QIU L , JIANG W X , LI Y Z ,et al. Trustworthy data collection method based on edge computing and trust value[J]. Journal of Software, 2019,30(S1): 71-81.
|
[22] |
LI X , LI J , YIU S ,et al. Privacy-preserving edge-assisted image retrieval and classification in IoT[J]. Frontiers of Computer Science, 2019,13(5): 1136-1147.
|
[23] |
HAN G J , HE Y , JIANG J F ,et al. A synergetic trust model based on SVM in underwater acoustic sensor networks[J]. IEEE Transactions on Vehicular Technology, 2019,68(11): 11239-11247.
|
[24] |
HUANG L T , DENG S G , LI Y ,et al. A trust evaluation mechanism for collaboration of data-intensive services in cloud[J]. Applied Mathematics & Information Sciences, 2013,7(1L): 121-129.
|
[25] |
WU Q T , ZHANG X L , ZHANG M C ,et al. Reputation revision method for selecting cloud services based on prior knowledge and a market mechanism[J]. The Scientific World Journal, 2014,2014: 1-9.
|
[26] |
AZIZ B , FREMANTLE P , WEI R ,et al. A utility-based reputation model for the Internet of things[C]// ICT Systems Security and Privacy Protection. Berlin:Springer, 2016: 261-275.
|
[27] |
REDDY V B , NEGI A , VENKATARAMAN S ,et al. A similarity based trust model to mitigate badmouthing attacks in Internet of things (IoT)[C]// Proceedings of 2019 IEEE 5th World Forum on Internet of Things. Piscataway:IEEE Press, 2019: 278-282.
|
[28] |
YUAN J , LI X Y . A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion[J]. IEEE Access, 2018,6: 23626-23638.
|
[29] |
TRUONG N B , LEE G M , UM T W ,et al. Trust evaluation mechanism for user recruitment in mobile crowd-sensing in the Internet of things[J]. IEEE Transactions on Information Forensics and Security, 2019,14(10): 2705-2719.
|