Deep Seated Neural Network Learner Model for Trust Recommendation

Authors

  • Jayashree V. Agarkhed Professor, Department of Computer Science and Engineering, Poojya Doddappa Appa College of Engineering, Kalaburagi, Karnataka, India
  • Geetha Pawar Research Scholar, Department of Computer Science and Engineering, Poojya Doddappa Appa College of Engineering, Kalaburagi, Karnataka, India

Keywords:

Pervasive Computing, Trust Recommendation, Machine learning, Deep neural network, Optimization

Abstract

Recent and cutting-edge paradigms now used in the field of computers is pervasive computing. In comparison to traditional computer environments, its capacity to distribute computational services within settings where people live, work, or socialise makes problems like privacy, trust, and identification more difficult.  One of the main issues with pervasive computing is the breach of security and privacy caused by malicious nodes. This study presents the new deep seated neural network leaner which recommends the trustworthy and unworthy transaction context in pervasive computing environment. Several models such as gaussian naive bayes, random forest, extra tree classifier, passive aggressive classifier, support vector machine learning algorithms are built. The proposed model out performs better compare to other machine learning models.

Downloads

Download data is not yet available.

References

F. Almenárez, A. Marín, D. Díaz, A. Cortés, C. Campo, and C. García-Rubio, 2011. Trust management for multimedia P2P applications in autonomic networking. Ad Hoc Networks, 9(4), pp.687-697. doi:10.1016/j.adhoc.2010.09.005.

N. Iltaf, A. Ghafoor, and M. Hussain, 2012. Modeling interaction using trust and recommendation in ubiquitous computing environment. EURASIP Journal on Wireless Communications and Networking, 2012, pp.1-13.doi:10.1186/1687-1499-2012-119.

T. Sun, M.K. Denko, 2007. A distributed trust management scheme in the pervasive computing environment, in: Proceedings of the Canadian Conference on Electrical and Computer Engineering, pp. 1219–1222. doi:10.1109/CCECE.2007.311.

H. Haddadi, P. Hui, T. Henderson, and I. Brown, Targeted advertising on the handset: Privacy and security challenges,” in Pervasive Advertising. Springer, 2011, pp. 119–137.DOIhttps://doi.org/10.1007/978-0-85729-352-7_6

C. Bermejo, Z. Huang, T. Braud, and P. Hui, 2017. When augmented reality meets big data, in 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), June pp. 169–174.DOI: 10.1109/ICDCSW.2017.62

M Blaze, J Feigenbaum, J Lacy, 1996. Decentralized trust management, in 17th IEEE Symposium on Security and Privacy, Oakland, pp. 164–173.DOI: 10.1109/SECPRI.1996.502679

L.Kagal, T.Finin, A. Joshi, 2001. trust-based security in pervasive computing environments. IEEE Comput. 34(12), pp.154–157.DOI: 10.1109/2.970591

L. Kagal, F. Perich, A.Joshi, and T. Finin, 2002, October. A security architecture based on trust management for pervasive computing systems. In Grace Hopper Celebration of Women in Computing.

E. Damiani, D.C. di Vimercati, S. Paraboschi, P.Samarati, and F. Violante, 2002, November. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the 9th ACM conference on Computer and communications security (pp. 207-216). doi:10.1145/511446.511496.

T.Wisanwanichthan, and M. Thammawichai, 2021. A double-layered hybrid approach for network intrusion detection system using combined naive bayes and SVM. IEEE Access, 9, pp.138432-138450.DOI: 10.1109/ACCESS.2021.3118573

A. Dey, 2020, December. Deep IDS: A deep learning approach for Intrusion detection based on IDS 2018. In 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI) (pp. 1-5). IEEE.DOI: 10.1109/STI50764.2020.9350411

P. Chen, Y. Guo, J. Zhang, Y.Wang, and H. Hu, 2020, December. A novel preprocessing methodology for dnn-based intrusion detection. In 2020 IEEE 6th International Conference on Computer and Communications (ICCC) (pp. 2059-2064). IEEE.DOI: 10.1109/ICCC51575.2020.9345300

L. Chen, X. Kuang, A. Xu, S. Suo, and Y. Yang, 2020, December. A novel network intrusion detection system based on CNN. In 2020 eighth international conference on advanced cloud and big data (CBD) (pp. 243-247). IEEE.DOI: 10.1109/CBD51900.2020.00051

J. Weng, C.Miao, and A. Goh, 2005, August. Protecting online rating systems from unfair ratings. In International Conference on Trust, Privacy and Security in Digital Business (pp. 50-59). Berlin, Heidelberg: Springer Berlin Heidelberg.doi:10.1007/11537878_6.

S.I. Ahamed, M.M. Haque, M.E. Hoque, F.Rahman, and N. Talukder, 2010. Design, analysis, and deployment of omnipresent formal trust model (FTM) with trust bootstrapping for pervasive environments. Journal of Systems and Software, 83(2), pp.253-270. doi:10.1016/j.jss.2009.09.040.

S.D. Kamvar, M.T.Schlosser, and H. Garcia-Molina, 2003, May. The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th international conference on World Wide Web (pp. 640-651). doi:10.1145/775152.775242.

E. Damiani, D.C. di Vimercati, S. Paraboschi, P.Samarati, and F. Violante, 2002, November. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the 9th ACM conference on Computer and communications security (pp. 207-216). doi:10.1145/586110.586138.

G. D’Angelo, S.Rampone, and F. Palmieri, 2017. Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification. Soft Computing, 21, pp.6297-6315. DOI: 10.1007/s00500-016-2183-1

G. DAngelo, S.Rampone, and F. Palmieri, 2015, November. An artificial intelligence-based trust model for pervasive computing. In 2015 10th international conference on P2p, parallel, grid, cloud and internet computing (3pgcic) (pp. 701-706). IEEE. DOI: 10.1109/3PGCIC.2015.94.

Prof. Madhuri Zambre. (2016). Analysis and Modeling of Physical Stratum for Power Line Communication. International Journal of New Practices in Management and Engineering, 5(01), 08 - 13. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/42

Pareek, M., Gupta, S., Lanke, G. R., & Dhabliya, D. (2023). Anamoly Detection in Very Large Scale System using Big Data. SK Gupta, GR Lanke, M Pareek, M Mittal, D Dhabliya, T Venkatesh,.." Anamoly Detection in Very Large Scale System Using Big Data. 2022 International Conference on Knowledge Engineering and Communication Systems (ICKES).

Mohapatra, S. K. ., Patnaik, S. ., & Kumar Mohapatra, S. . (2023). An Enhanced Automated Epileptic Seizure Detection Using ANFIS, FFA and EPSO Algorithms . International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 57–67. https://doi.org/10.17762/ijritcc.v11i4s.6307

Downloads

Published

16.07.2023

How to Cite

V. Agarkhed, J. ., & Pawar, G. . (2023). Deep Seated Neural Network Learner Model for Trust Recommendation. International Journal of Intelligent Systems and Applications in Engineering, 11(3), 539–552. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3207

Issue

Section

Research Article