Deep Seated Neural Network Learner Model for Trust Recommendation
Keywords:
Pervasive Computing, Trust Recommendation, Machine learning, Deep neural network, OptimizationAbstract
Recent and cutting-edge paradigms now used in the field of computers is pervasive computing. In comparison to traditional computer environments, its capacity to distribute computational services within settings where people live, work, or socialise makes problems like privacy, trust, and identification more difficult. One of the main issues with pervasive computing is the breach of security and privacy caused by malicious nodes. This study presents the new deep seated neural network leaner which recommends the trustworthy and unworthy transaction context in pervasive computing environment. Several models such as gaussian naive bayes, random forest, extra tree classifier, passive aggressive classifier, support vector machine learning algorithms are built. The proposed model out performs better compare to other machine learning models.
Downloads
References
F. Almenárez, A. Marín, D. Díaz, A. Cortés, C. Campo, and C. García-Rubio, 2011. Trust management for multimedia P2P applications in autonomic networking. Ad Hoc Networks, 9(4), pp.687-697. doi:10.1016/j.adhoc.2010.09.005.
N. Iltaf, A. Ghafoor, and M. Hussain, 2012. Modeling interaction using trust and recommendation in ubiquitous computing environment. EURASIP Journal on Wireless Communications and Networking, 2012, pp.1-13.doi:10.1186/1687-1499-2012-119.
T. Sun, M.K. Denko, 2007. A distributed trust management scheme in the pervasive computing environment, in: Proceedings of the Canadian Conference on Electrical and Computer Engineering, pp. 1219–1222. doi:10.1109/CCECE.2007.311.
H. Haddadi, P. Hui, T. Henderson, and I. Brown, Targeted advertising on the handset: Privacy and security challenges,” in Pervasive Advertising. Springer, 2011, pp. 119–137.DOIhttps://doi.org/10.1007/978-0-85729-352-7_6
C. Bermejo, Z. Huang, T. Braud, and P. Hui, 2017. When augmented reality meets big data, in 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), June pp. 169–174.DOI: 10.1109/ICDCSW.2017.62
M Blaze, J Feigenbaum, J Lacy, 1996. Decentralized trust management, in 17th IEEE Symposium on Security and Privacy, Oakland, pp. 164–173.DOI: 10.1109/SECPRI.1996.502679
L.Kagal, T.Finin, A. Joshi, 2001. trust-based security in pervasive computing environments. IEEE Comput. 34(12), pp.154–157.DOI: 10.1109/2.970591
L. Kagal, F. Perich, A.Joshi, and T. Finin, 2002, October. A security architecture based on trust management for pervasive computing systems. In Grace Hopper Celebration of Women in Computing.
E. Damiani, D.C. di Vimercati, S. Paraboschi, P.Samarati, and F. Violante, 2002, November. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the 9th ACM conference on Computer and communications security (pp. 207-216). doi:10.1145/511446.511496.
T.Wisanwanichthan, and M. Thammawichai, 2021. A double-layered hybrid approach for network intrusion detection system using combined naive bayes and SVM. IEEE Access, 9, pp.138432-138450.DOI: 10.1109/ACCESS.2021.3118573
A. Dey, 2020, December. Deep IDS: A deep learning approach for Intrusion detection based on IDS 2018. In 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI) (pp. 1-5). IEEE.DOI: 10.1109/STI50764.2020.9350411
P. Chen, Y. Guo, J. Zhang, Y.Wang, and H. Hu, 2020, December. A novel preprocessing methodology for dnn-based intrusion detection. In 2020 IEEE 6th International Conference on Computer and Communications (ICCC) (pp. 2059-2064). IEEE.DOI: 10.1109/ICCC51575.2020.9345300
L. Chen, X. Kuang, A. Xu, S. Suo, and Y. Yang, 2020, December. A novel network intrusion detection system based on CNN. In 2020 eighth international conference on advanced cloud and big data (CBD) (pp. 243-247). IEEE.DOI: 10.1109/CBD51900.2020.00051
J. Weng, C.Miao, and A. Goh, 2005, August. Protecting online rating systems from unfair ratings. In International Conference on Trust, Privacy and Security in Digital Business (pp. 50-59). Berlin, Heidelberg: Springer Berlin Heidelberg.doi:10.1007/11537878_6.
S.I. Ahamed, M.M. Haque, M.E. Hoque, F.Rahman, and N. Talukder, 2010. Design, analysis, and deployment of omnipresent formal trust model (FTM) with trust bootstrapping for pervasive environments. Journal of Systems and Software, 83(2), pp.253-270. doi:10.1016/j.jss.2009.09.040.
S.D. Kamvar, M.T.Schlosser, and H. Garcia-Molina, 2003, May. The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th international conference on World Wide Web (pp. 640-651). doi:10.1145/775152.775242.
E. Damiani, D.C. di Vimercati, S. Paraboschi, P.Samarati, and F. Violante, 2002, November. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the 9th ACM conference on Computer and communications security (pp. 207-216). doi:10.1145/586110.586138.
G. D’Angelo, S.Rampone, and F. Palmieri, 2017. Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification. Soft Computing, 21, pp.6297-6315. DOI: 10.1007/s00500-016-2183-1
G. DAngelo, S.Rampone, and F. Palmieri, 2015, November. An artificial intelligence-based trust model for pervasive computing. In 2015 10th international conference on P2p, parallel, grid, cloud and internet computing (3pgcic) (pp. 701-706). IEEE. DOI: 10.1109/3PGCIC.2015.94.
Prof. Madhuri Zambre. (2016). Analysis and Modeling of Physical Stratum for Power Line Communication. International Journal of New Practices in Management and Engineering, 5(01), 08 - 13. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/42
Pareek, M., Gupta, S., Lanke, G. R., & Dhabliya, D. (2023). Anamoly Detection in Very Large Scale System using Big Data. SK Gupta, GR Lanke, M Pareek, M Mittal, D Dhabliya, T Venkatesh,.." Anamoly Detection in Very Large Scale System Using Big Data. 2022 International Conference on Knowledge Engineering and Communication Systems (ICKES).
Mohapatra, S. K. ., Patnaik, S. ., & Kumar Mohapatra, S. . (2023). An Enhanced Automated Epileptic Seizure Detection Using ANFIS, FFA and EPSO Algorithms . International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 57–67. https://doi.org/10.17762/ijritcc.v11i4s.6307
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.