TELKOM
NIKA
, Vol.11, No
.11, Novemb
er 201
3, pp. 6534
~6
539
e-ISSN: 2087
-278X
6534
Re
cei
v
ed Ap
ril 12, 2013; Revi
sed
Jun
e
19, 2013; Accepted July 2
0
,
2013
Autonomy Domain Trust Model in Manufacturing Grid
based o
n
User Trust Agent
Jun
y
u Xiao*, Zhang
w
e
i Y
a
ng, Feng Ji
ang
Dep
a
rtment of Educati
on a
nd
T
e
chnolog
y, Pi
ng
xi
ang U
n
iv
er
sit
y
, Pin
g
x
ia
ng
337
00
0, Jiang
xi, Chin
a
*Corres
p
o
ndi
n
g
author, e-ma
i
l
:
269
458
24
@qq.
com
A
b
st
r
a
ct
T
r
ust security i
s
on
e of t
he
h
o
tspot i
n
ma
nu
fact
uring
gri
d
.
T
he p
aper
pr
o
poses
a trust
mo
de
l t
o
suit for ma
nuf
acturin
g
grid,
base
d
on d
o
m
ain trust mo
d
e
l
. It manag
es trust value
of grid user fro
m
th
e
introd
ucin
g of user trust age
n
t
in auton
o
m
y do
ma
in. F
u
rt
he
rmor
e, it consi
ders the i
m
p
a
c
t
of time dec
ay an
d
the pu
nis
h
men
t
of mal
i
ci
ous t
r
ansacti
ons. T
he
mo
del
is
effective i
n
red
u
c
i
ng th
e
mal
i
cio
u
s transacti
on
o
f
grid us
er to improve sec
u
rity of ma
nufacturi
ng gri
d
throu
g
h
analys
is an
d e
x
peri
m
e
n
t si
mu
latio
n
.
Ke
y
w
ords
:
aut
ono
my d
o
m
ai
n
,
trust agent, manufactur
i
n
g
gr
id, trust mod
e
l
Copy
right
©
2013 Un
ive
r
sita
s Ah
mad
Dah
l
an
. All rig
h
t
s r
ese
rved
.
1. Introduc
tion
The Gri
d
technolo
g
y is st
rongly recom
m
ende
d
net
work infrastru
c
ture. G
r
id computing
system
is int
egratin
g di
stri
buted
cal
c
ul
a
t
ion, sto
r
age
and
kn
owl
e
d
ge et
c tog
e
th
er into
a
virtu
a
l
sup
e
r compu
t
er. By
this way, resources-sh
ar
i
ng is improved greatly. Grids tend to be more
loosely coupl
ed, hetero
g
e
neou
s, geog
raphi
cally disp
ersed an
d flexible. So Grid system is m
u
ch
more
com
p
licated than tra
d
itional
Internet enviro
n
m
ent. In orde
r
to make th
e
Grid
com
puti
n
g
more
se
curel
y
, more attracting an
d mo
re co
nvenie
n
tly communi
cate betwe
en grid entitie
s, the
se
curity between entitie
s seem
s extraordinarily impo
rtant.
Tru
s
t is an i
m
porta
nt asp
e
ct of grid
secu
rity. It is
an impo
rtant
method of g
uara
n
tee
se
curity of
grid. In the gi
rd calcul
ation
env
iro
n
ment
, good t
r
u
s
t relation
ship
should
be
set
up
betwe
en nod
es. The curre
n
t high-p
e
rfo
r
mance cal
c
ul
ating system
s are b
a
sed
on trust poli
cy to
open to u
s
e
r
s. Grid n
ode
s ca
n be a
d
j
u
sted a
nd u
pdated trust
relation
shi
p
throu
gh hi
storical
dire
ct or indi
rect co
ntactin
g
experie
nce.
It maximiz
e
s
the s
e
c
u
rity in the grid.
With the
ad
vancem
ent i
n
networkin
g and
multi
m
edia te
ch
n
o
logie
s
e
n
a
b
les th
e
distrib
u
tion
a
nd sha
r
ing
of multimedi
a co
ntent
wi
dely. In the
meantime,
pira
cy be
co
mes
increa
singly
ramp
ant as
the cu
stome
r
s ca
n eas
ily
duplicate a
nd redi
strib
u
te the received
multimedia
content to
a
larg
e a
udie
n
ce. In
su
ri
ng
the copyri
g
h
ted
multim
e
d
ia conte
n
t is
approp
riately use
d
ha
s be
come incre
a
si
ngly critical.
Although e
n
cryption can p
r
ovide m
u
ltimedia
c
ontent
with the de
si
red
se
cu
rity durin
g
transmissio
n, once
a pie
c
e of digital
content
i
s
decrypted, the dishon
est
custo
m
er
can
redis
t
ribute it arbitrarily [2, 3].
2. Based o
n
Domain Trus
t Model
Acco
rdi
ng to
different
structure a
nd d
i
fferent
lo
cati
on of g
r
id
e
n
tities (i
ncl
u
d
i
ng g
r
id
servi
c
e
provider and
g
r
id
use
r
s), g
r
id
can b
e
divid
e
d
into lot
s
of
in
depe
ndent
a
u
tonomy d
o
m
a
in.
Each
autono
my domain i
n
clu
d
e
s
lots
of grid
entities. Th
ere
are inde
pen
de
nt admini
s
tra
t
ive
strategi
es a
n
d
se
curity stra
tegie
s
between auto
nom
y domains.
There a
r
e tru
s
t rel
a
tion
shi
p
and
tru
s
t ch
oice
between
gird entities. The
g
r
id envi
r
onm
ent
is dynami
c
a
nd un
ce
rtain.
The tru
s
t relation
ship
should
be kn
own
wh
en in
teractio
ns
occur
betwe
en enti
t
ies.
Refere
n
c
e 4
me
ntio
ned de
signi
n
g
ide
a
s ba
sed o
n
reput
ation-b
a
sed t
r
ust
model. It divi
de g
r
id
into
several
man
a
g
e
ment
domai
ns. T
he trust
relation
shi
p
b
e
twee
n n
ode
s i
s
divided into trust
within do
mains a
nd trust betw
een
domain
s
. Different
strategi
es a
r
e taken
to
deal with the
s
e different trust relation
ships. Th
e co
mplexity of calcul
ating tru
s
t value with
in
domain
de
pe
nds on
the
n
u
mbe
r
s of
n
ode
s. Inste
a
d
the
comple
xity of cal
c
ul
ating trust va
lue
Evaluation Warning : The document was created with Spire.PDF for Python.
TELKOM
NIKA
e-ISSN:
2087
-278X
Autonom
y Do
m
a
in Trust M
odel in Man
u
facturi
ng
G
r
id
based on
User Trust Agen
t (Jun
yu Xiao
)
6535
betwe
en
dom
ains de
pen
ds on
the
num
b
e
rs of
dom
ain
s
. In thi
s
mod
e
l, the
numb
e
r
of th
e
entitie
s
is the o
n
ly pa
ramete
r of
co
mplexity of ca
lculatin
g tru
s
t value. The
a
d
vantage i
s
t
he complexity of
cal
c
ulatio
n i
s
low. But th
ere a
r
e
also
so
me di
s
adva
n
tage
s su
ch as:
no con
s
id
eration of
co
nte
x
t.
Normally cont
ext environm
ent is a
determinant of tru
s
t. There a
r
e
n
o
setu
p meth
od of initial trust
and tru
s
t valu
e updatin
g. No con
s
id
erati
on of the e
ffect of time attenuatio
n affecting tru
s
t value
whi
c
h redu
ce
the exactn
ess of tru
s
t. No
con
s
id
eratio
n of puni
shm
ent of malici
o
us n
ode
s whi
c
h
reduc
e
the trus
t s
e
c
u
rity.
There are
we
akn
e
ss of lo
w exactn
ess
of trus
two
r
thi
ness an
d low grid se
cu
rity based in
traditional
do
main trust
model. Expe
rts
pro
p
o
s
ed
seve
ral
imp
r
oved
mod
e
l
s
. Referen
c
e
5
mentione
d
trust
mo
del which ba
sed
on
Demp
ster
-Shafer (D-S
) proof the
o
ry trust mo
d
e
l.
Acco
rdi
ng to
relevant
rule
s, evaluate th
e tru
s
two
r
thin
ess into th
re
e cate
go
rie
s
( trust
w
ort
h
y, not
trust
w
orthy a
nd un
sure) . In referen
c
e 6
the tr
ustwort
h
ine
ss b
a
sed
on fuzzy set wa
s discu
s
se
d.
It c
a
tegoriz
e
s trus
tworthin
e
s
s into
differe
nt deg
re
e a
n
d
set u
p
trus
t
s
e
t
func
tion.
In referenc
e
7
the trust
w
orthiness based on joint probability dist
ri
butions was
discussed.
In reference 8
the
trust
w
orthi
n
e
s
s ba
sed
on
action
wa
s
di
scusse
d.
Use
trust
and
re
p
u
tation a
s
m
e
asu
r
em
ent. Use
trust attenu
ation functio
n
to reflect the
cha
nge
of tru
s
t acco
rding t
o
time. Aforementione
d trust
model
s ma
ke improve
m
e
n
t base
d
on
traditional
trust mod
e
l from aspe
cts
of context, time
attenuation et
c. The gri
d
se
curity
is imp
r
oved sig
n
ifica
n
tly.
3. Trust Stud
y
on Manufa
c
turing Grid
Manufa
c
turi
n
g
G
r
id i
s
a
speci
a
l
kind
of
gri
d
. It use
sou
nd
grid
e
n
vironm
ent t
o
set up
manufa
c
turi
n
g
coordinatin
g mod
e
l. Ma
nufactu
ring
g
r
id h
a
s chara
c
teri
stics of
common
gri
d
su
ch
as shari
ng, o
pen an
d co
ordination.
But at the same t
i
me there a
r
e
potential saf
e
ty hazard su
ch
as mali
cio
u
s
entity cheatin
g. The tru
s
t conception i
s
i
n
trodu
ce
d in
Grid. A reli
ab
le third p
a
rty is
set up
which
cal
c
ulate th
e
value of tru
s
t
w
orthi
n
e
ss.
B
y
this way, the Qos of
Grid is improved. In
the man
u
fact
uring
G
r
id, th
ere i
s
no
reli
able thi
r
d
pa
rty. It is
difficult to set up
trus
t
w
orthines
s
betwe
en entit
ies.
Manufa
c
turi
n
g
grid i
s
wid
e
ly distrib
u
te
d
and
com
p
li
cated. Th
e reasona
ble di
vision of
autonomy d
o
m
ain will affe
ct the setu
p of trust. In
re
feren
c
e 9 it d
i
scusse
d ma
nufactu
ring
g
r
id
resou
r
ces
se
rvice T
r
u
s
t-Qo
s evalu
a
tion
model. It di
vi
des re
so
urce
s into
9 a
u
ton
o
my domai
ns. It
also
divide
s t
he tru
s
t eval
uation into
wi
thin dom
ain
and b
e
twe
e
n
domai
ns. In
referen
c
e 1
0
, it
discu
s
sed th
e manufa
c
turing re
so
urce
s reputatio
n m
odel in ma
nu
facturin
g gri
d
environm
ent
.
It
divides th
e
enterp
r
i
s
e’
s reputation i
n
to re
sou
r
ce reputation
an
d se
rvic
e
re
putation. Fo
r the
resource reputation is the
initial configuration tr
ust
e
v
aluation val
ue. After coo
peratio
n, the
trust
value wa
s
u
p
dated acco
rdi
ng
to expe
rie
n
ce. The
s
e
two
model
s are di
rectly
eva
l
uating th
e trust
value. Th
ere
i
s
n
o
co
nsid
eration of
tru
s
t
recomme
ndat
ion. But in
m
anufa
c
turin
g
grid
it is a
mo
st
importa
nt part. Besides, b
o
th model
s d
on’t con
s
ide
r
the time attenuatio
n and
punish
ment
to
malicious acti
on. The m
a
licious acti
on in manufacturing grid
will
a
ffect m
o
re
seri
ous
ly than ot
her
grid e
n
viron
m
ent su
ch a
s
re
so
urce g
r
id or calculati
on gri
d
. A failed tran
sa
ctio
n may affect the
survival of the manufa
c
turer.
4. Manufa
c
tu
ring Grid Us
er Trus
t Age
n
t
In the m
anuf
acturi
ng
gri
d
environme
n
t, there
a
r
e
many e
n
tities, the
s
e
enti
t
ies a
r
e
dynamic. To
grid entitie
s, autonomy do
mains a
r
e
co
mparably sta
b
le. So he trust model b
a
s
ed
on auton
omy domain i
s
suit
able.
4.1. GSP Directly
Manage User Tr
ust
In autonomy
domain, the
partici
pants
in the
grid e
x
chan
ge are
grid u
s
ers
and g
r
id
servi
c
e
provi
ders. Only if t
r
ust
relatio
n
ship is
set up
can th
ey exchang
e reliabl
y. There
are
many
GSP and grid
users in one
autonomy do
main. In the
us
e
r
trust list
of GSP,
there
are many user
cre
d
it re
cords in different G
SP. Like Figu
re 1.
Use GSP to directly man
age the rel
a
tionshi
p with
grid u
s
e
r
s. It requi
re
s GS
P high
efficien
cy of
handli
ng.
Wh
en g
r
id
users req
u
e
s
t serv
ice, GSP
will
han
dle a
c
co
rding
to b
e
lo
w
pro
c
ed
ures.
Step 1: Use
r
A reque
st se
rvice from GS
P. In
order to safeg
uard the
reliability of service,
User A nee
d GSP with hig
h
stand
ard Q
o
s. I.e. meet certai
n tru
s
tworthine
s
s.
Evaluation Warning : The document was created with Spire.PDF for Python.
e-ISSN: 2
087-278X
TELKOM
NIKA
Vol. 11, No
. 11, Novemb
er 201
3: 653
4 – 6539
6536
Step 2: GSP will see
k
tru
s
t value of the
grid u
s
e
r
in t
he u
s
er t
r
u
s
t list file. If it is unde
r
the tru
s
t line,
the exchang
e
will b
e
refused. The
gr
i
d
use
r
n
eed
re
que
st service
to othe
r GS
P till
get permit. T
hen the GSP will provid
e re
sou
r
ces a
nd
servi
c
e to UserA.
Step 3: Whe
n
UserA get
servi
c
e an
d finish ex
cha
n
g
e
. It will submit result to GSP and
requ
est GSP
to update the
cre
d
it profile.
Step 4: Wh
e
n
GSP re
ceiv
e re
que
st, it will up
date u
s
er tru
s
t list.
Then th
e tran
sa
ction i
s
finis
h
ed.
Figure 1. GSP Dire
ctly Manage
User Trust
In the manufacturi
ng g
r
id,
the method of usi
ng GSP
to directly manag
e use
r
trust ha
s
su
ch adva
n
ta
ges a
s
simpl
e
cal
c
ulatio
n and hig
h
pe
rforma
nce efficiency. But there are still so
me
disa
dvantag
e
s
in the pra
c
tical use a
s
belo
w
: 1)
in the manufa
c
t
u
ring g
r
id, the numbe
r of grid
use
r
s i
s
h
uge
. One
GSP n
eed
han
dle l
o
ts of
req
u
e
s
t
from g
r
id
u
s
e
r
s at the
sam
e
time. So
Th
e
trust ma
nag
e
m
ent efficien
cy is lo
w. 2)
GSP has
we
akn
e
ss of dy
namics a
nd u
n
ce
rtainty wh
ich
make
the
ex
cha
nge
bet
ween
grid
u
s
e
r
s lo
w
reli
ab
ili
ty.
3)
Mali
cio
u
s users will regi
ster
a
s
n
e
w
use
r
s anytim
e
and
se
nd
service
re
que
st to GSP. It
will waste m
u
ch
re
sou
r
ce
of GSP. So GSP
can
not
re
co
gnize mali
cio
u
s
users e
a
si
ly. 4)T
he
exchang
e result i
s
g
o
t from i
n
depe
ndent
user,
the accuracy
of the trust evaluation i
s
no
t so high.
4.2. Introduc
tion of User
Trust
Agen
t
In order to
solve afo
r
em
entione
d pro
b
lems, thi
s
p
aper i
n
trod
uces auto
nomy
domain
use
r
trust Ag
ent UTA. A
s
the tru
s
tworthy th
ird p
a
rt
y, UTA man
age the
Cre
d
it of auton
o
m
y
domain
gri
d
use
r
s. Both
GSP and g
r
i
d
users
w
ill check the
beh
avior of
UTA
and g
e
t refe
rence
trust value. T
he UTA mod
e
l is like b
e
lo
w gra
phi
c.
Figure 2. UT
A Trust Mod
e
l
When gri
d
user
request
se
rvi
c
e, the
UTA model
will handle
according to below
pro
c
ed
ure:
Evaluation Warning : The document was created with Spire.PDF for Python.
TELKOM
NIKA
e-ISSN:
2087
-278X
Autonom
y Do
m
a
in Trust M
odel in Man
u
facturi
ng
G
r
id
based on
User Trust Agen
t (Jun
yu Xiao
)
6537
Step 1: Use
r
A send requ
e
s
t to UTA to get
GSP list which me
et tru
s
t con
d
ition
s
.
Step 2: Acco
rding to the
histori
c
al ex
c
hang
e re
cord
s between G
r
id users an
d GSP,
UTA evalu
a
te the tru
s
tworthine
s
s of
these
G
SP. Upo
n
the
re
que
st from
UserA, UTA wil
l
response qualified GSP list to UserA.
Step 3: UserA will choo
se
one famili
ar
GSP and
req
uest
re
sou
r
ce
s an
d then
re
spo
n
se
the result to UTA.
Step 4: When UTA
receive the re
sponse
result, it will extract
the user’s trus
t profile in
the autonomy
domain an
d will issue tru
s
t certificate to
Use
r
A.
Step
5: UserA
will request
service with submi
tting the certificate t
o
appointed
GSP. GSP
will decide whether provide
servi
c
e or not accordi
ng to the trus
t
w
orthy level in th
e certifi
c
ate.
Step 6: If GSP acce
pt to provide servi
c
e,
then UserA
and GSP be
gin to excha
n
ge. Afte
r
the tran
sa
ctio
n, both pa
rtie
s will
re
spon
se the re
sult to
UTA. UTA wi
ll update the t
r
ust
re
cords
of
both then the
transactio
n
i
s
over. If GSP doesn’t a
ccept to provid
e se
rvice,
UserA nee
d cho
o
se
GSP again th
en reve
rt to Step5.
After introdu
cing a
u
tono
my domain
UTA to man
u
facturi
ng g
r
i
d
trust mo
d
e
l, UTA
become relia
ble third pa
rty to both grid users an
d G
SP. The transa
c
tion
s are
carrie
d out b
a
se
d
on the tru
s
t reco
rd
s p
r
ovid
ed by UTA. F
r
om the
pers
pective of G
r
i
d
user, the trust mod
e
l is l
i
ke
b
e
l
ow
p
r
oc
edu
r
e
in
F
i
gu
r
e
3
.
Figure 3. Tru
s
t Model Pro
c
edures
Comp
ared t
o
the trust
model
of G
SP di
re
ctly
managi
ng u
s
ers, UTA
h
a
s su
ch
advantag
es
as hig
h
e
r
m
anag
ement e
fficiency,
hig
her reliability
and hig
her
safety. GSP only
need
face UTA inste
ad
of hug
e nu
mbers
of u
s
ers. By thi
s
way the
tru
s
t evaluation
and
manag
eme
n
t efficien
cy are improved.
At the sam
e
time, grid
users only n
e
e
d
face
the
stable
UTA inste
ad
of dynamic
GSP. UTA has hig
h
auth
o
rities i
n
aut
onomy dom
ai
n. It can ma
nage
grid
users eff
e
ctively and
avoid of
che
a
ting. UTA
can get tran
sa
ction
re
cords of all gri
d
u
s
ers
and GSP in the domai
n. By this way, the trus
t evalua
tion result will
be more a
ccurate.
4.3. Punishment on Malicious Trad
e
In manufact
u
ring
grid, th
e harm of m
a
licio
us tr
ade
is mu
ch hig
her tha
n
no
rmal grid. It
will le
ad to
cri
t
ical
cri
s
i
s
of
the e
n
terpri
se.
So in
the
ma
nufactu
ring
g
r
id mo
del, the
puni
shme
nt t
o
malicio
us tra
de m
u
st
be i
n
trodu
ce
d. E
v
ery tran
sa
cti
on
of gri
d
u
s
er
m
u
st be carri
ed out
th
rough
the certificate
issue
d
by UTA.
By this way, UTA can accurately
tell whethe
r the user exchan
ge
maliciously.
Evaluation Warning : The document was created with Spire.PDF for Python.
e-ISSN: 2
087-278X
TELKOM
NIKA
Vol. 11, No
. 11, Novemb
er 201
3: 653
4 – 6539
6538
For exam
ple
of User A,
Ns
rep
r
e
s
e
n
t the su
cce
ssful t
r
ade
n
u
mbe
r
s i
n
UTA kept
records, Nf re
pre
s
ent failed
numbe
rs. So
the
value of trust
w
o
r
thine
s
s T is calculat
ed as:
)
1
(
N
Ns
Ns
f
T
(1)
λ
is
puni
shm
ent factor.
When the
numb
e
r of
mali
ciou
s trad
e is
big
ger, the valu
e
of
λ
will
be bigger. It will reduce the value
of trustworthiness
of UserA. Fi
nally it will be
excluded by
UTA.
In ord
e
r to
sa
feguard the
safety of manu
facturin
g g
r
id,
λ
will be progressively
i
n
creased base
on
expone
nt 10.
For exa
m
pl
e, if the Use
r
A mad
e
on
e malici
o
u
s
t
r
ade,
λ
i
s
1
0
, if made t
w
o
malicious trading,
λ
is
10
×10, three times 1
0
×10
×
10 ….
If Use
r
A make more malicio
us trade,
the trust valu
e will be ne
arl
y
0. So it can av
oid malici
o
us attack to manufa
c
turi
n
g
grid.
At the same time, consi
d
e
r
ing the facto
r
of
time atte
nuation affect
ing trust
w
orth
iness.
The n
earer th
e tran
sa
ction
is, the mo
re t
r
ust
w
o
r
thy
it is. in o
r
de
r to
sho
w
the
re
cent trad
e affe
ct
trust
w
orthy m
o
re, wh
en UTA
get
tran
saction
reco
rd
s,
it can
set one paramet
er
Sum.
Extract
recent tran
sa
ction
s
to cal
c
ulate the value of trus
two
r
t
h
ine
ss T. No
rmally when S
u
m is sm
aller, it
can e
m
body
clea
re
r abo
ut time attenua
tion. But whe
n
maliciou
s
t
r
ade a
ppe
ars, using sum can
not a
c
curatel
y
cal
c
ulate
the valu
e of t
r
ust
w
o
r
thine
s
s. In o
r
d
e
r t
o
ea
sily reco
gnize mali
cio
u
s
u
s
er
s
,
n
o
n
-
fixe
d
va
lue
s
h
ou
ld
be
tak
e
n to
d
e
t
er
mine
Su
m. F
o
r
th
e r
e
c
e
n
t
ma
lic
i
o
u
s
us
er
s
,
if th
e
value of sum
is smalle
r, the effect of p
u
n
ishi
ng
mali
ci
ous t
r
ad
e is
cleare
r
. F
rep
r
ese
n
ts time
s
of
malicio
us tra
de. Below tab
l
e record
s the
updating tru
s
tworthin
ess p
r
ofile.
Table 1. Use
r
A Trust
w
orthi
ness Profile
F Sum
λ
Ns
N
f
T
1 1000
10
999
1
0.9901
2 500
100
498
2
0.7135
3
200 1000
197
3
0.0616
4 100
10000
96
4
0.0024
Whe
n
G
r
id
u
s
er an
d GSP
finish t
r
an
sa
ction
and re
spon
se
th
e
re
sult
to UTA, UTA will
update th
e
history tran
saction
re
co
rd
s taki
ng
su
m tran
sa
ctio
ns to
cal
c
ul
ate the valu
e o
f
trust
w
orthi
n
e
s
s and
up
dat
e the trust p
r
ofile to the
u
s
er. Next time
whe
n
the
use
r
reque
st
service
it will be re
co
rded in the trust ce
rtificate
.
If
one user
made
several
maliciou
s
tra
n
sa
ction
s
, the
value of trust
w
orthi
n
e
ss i
s
nearly o, so it
will be ki
cke
d
off the manufacturi
ng g
r
i
d
.
4.4. Simulation Experime
nt and Resul
t
Analy
s
is
In orde
r to v
e
rify the effe
ctivene
ss
of the in
tro
d
u
c
tio
n
of UTA, a
simulation exp
e
rime
nt
is
carrie
d out
in a m
odel
ca
lculatin
g g
r
id
environ
ment.
The exp
e
rim
e
nt co
ntain
s
t
w
o
part
s
p
a
rt A
is G
r
id
User reque
st
servi
c
e directly fro
m
GSP.
Part B
is
G
r
id Use
r
reque
st se
rvice
fro
m
UT
A.
After reque
st servi
c
e, the total transacti
ons a
r
e
10
0 times with 5 m
a
licio
us tra
d
e
.
Figure 4 sho
w
s
the value of trustworthin
ess under two pa
rts.
Figure 4. Value of Tru
s
two
r
thine
ss
Cha
nge
Evaluation Warning : The document was created with Spire.PDF for Python.
TELKOM
NIKA
e-ISSN:
2087
-278X
Autonom
y Do
m
a
in Trust M
odel in Man
u
facturi
ng
G
r
id
based on
User Trust Agen
t (Jun
yu Xiao
)
6539
The exp
e
rim
e
nt sh
ows
with
the in
crea
se
of
malici
o
u
s
t
r
ade, t
he valu
e of trust
w
ort
h
ine
s
s
unde
r the
m
odel of
GSP dire
ct man
a
g
e
ment i
s
de
crea
sed
slig
htly. It will make the mali
cio
u
s
use
r
s keep m
a
licio
us
exch
ange
with GS
P. In the ma
n
u
facturi
ng g
r
i
d
it is not
allo
wed.
Ho
weve
r
in the UTA model, if two malicio
us
transactio
n
s
appe
ars, the value of trustworthin
ess of
malicious user will be decreas
ed
significantly nearly to 0.
It avoid the further mali
cious
transactio
n
s
and safegu
ard the whol
e
secu
rity of manufactu
ring g
r
id.
Furthe
rmo
r
e,
the model o
f
GSP direct m
anage u
s
e
r
’s tru
s
t ca
n not Re
sist th
e white
wa
shin
g atta
ck b
e
twe
en
ne
w u
s
e
r
s an
d
malicio
us u
s
e
r
s thro
ugh
tra
n
sforming
ide
n
tity. Based
o
n
the mod
e
l of
this a
r
ticle,
m
a
licio
us u
s
ers’s
c
ontin
uou
s or ra
ndom
White
Wa
shi
ng atta
ck will
be
redu
ce the p
enalty factor
cre
d
it quickly after t
he su
ccess of previo
us attacks by GSP. When
the
malicio
us u
s
er’s tru
s
t
clo
s
e to
0,
GSP no l
ong
er
trust th
e p
r
o
xy that an
attacker can
n
o
t be
su
staine
d, an
d curb mali
ci
ous atta
cks e
ffectively.
5. Conclusio
n
Manufa
c
turi
n
g
gri
d
requi
res
stri
ct security of g
r
id.
Autonomy
domain
tru
s
t
model
cal
c
ulate
s
an
d evaluate
s
the value of trustworthin
ess of entities which i
s
the ba
sis of resources
sha
r
ing
an
d
coo
r
din
a
tion.
With th
e int
r
odu
ction
of
UTA in
auto
nomy do
mai
n
gri
d
u
s
e
r
t
r
ust
manag
eme
n
t and
the
co
n
s
ide
r
ation
of
time att
enuati
on a
nd
puni
shment to
mal
i
ciou
s trade, t
he
value of trustworthin
ess
of us
ers i
s
more
a
c
cura
tely cal
c
ulate
d
. The
se
cu
rity pro
b
lem
in
manufa
c
turi
n
g
grid is effe
ctively solved.
Referen
ces
[1]
F
o
ster I, Kesselma
n
C, T
uecke S. T
he ana
tom
y
of
th
e gri
d
: Enab
lin
g sc
ala
b
le v
i
rtual
o
r
gan
izatio
ns.
Internatio
na
l Journ
a
l of
Sup
e
r
computer Ap
pl
icatio
ns
. 2001;
15(3): 1-10.
[2]
Z
hang
w
e
i
Ya
n
g
. Sha
o
b
i
n
Hu
ang.
Res
earch
on
trust mo
d
e
l in auto
n
o
m
ous do
main
of
ca
mp
us grid
.
Procee
din
g
s o
f
2011 Inter
n
a
t
iona
l Co
nfere
n
ce o
n
Comp
uter Scienc
e
and S
e
rvice S
y
stem. 20
11
;
167
0-16
73.
[3]
Rahm
an A, H
a
iles S.
Su
pp
orting T
r
ust in
Virtual Co
mmu
n
iti
e
s.
Proceed
ings
of the 33rd
Ha
w
a
i
i
Internatio
na
l C
onfere
n
ce o
n
Sy
stem Scie
nce
s
. 2000; 600
7-
601
6.
[4]
A Josang, SJ Knapsk
og.
A m
e
tric for trusted system
s.
Pr
ocee
din
g
s of the 21st Nati
on
al Informatio
n
S
y
stems Sec
u
r
i
t
y
Co
nfere
n
ce.
1998; 1
6
-29.
[5]
Azzedi
n F
,
M
u
thucum
aru
Mahes
w
a
ra
n.
T
o
w
a
rds T
r
us
t-Aw
are Reso
urce M
ana
ge
me
nt i
n
Gri
d
Co
mp
uting Sy
stems.
Proc
ee
din
g
s of the
2nd IEEE/AC
M In
ternatio
na
l S
y
m
posi
u
m
on Cl
uste
r
Comp
uting a
n
d
the Grid. 2002
; l-6.
[6]
Li
xi
ao
yo
ng, G
u
i
Xi
ao
lin. Qu
a
n
tified
trust mo
del
bas
ed on
multi-dim
ensi
o
n
d
e
cisi
on in
r
e
liab
l
e
net
w
o
rk.
IT
Journal
. 20
09; 32(3): 4
05-
416.
[7]
A Josang, S
Hird, E Faccer.
Simulati
ng
the
Effect of Rep
u
tation
Syste
m
s
on
e-Markets.
Procee
din
g
s
of the F
i
rst Inte
rnatio
nal C
onfe
r
enc
e o
n
T
r
ust
Mana
geme
n
t. 200
3; 179-
194.
[8]
Hu
yefa, T
a
o
fei, Z
hou
zu
de. Ma
nufactu
ring
grid
reso
urces serv
ice
T
r
ust-QoS evalu
a
tion
an
d
app
licati
on.
Ch
ines
e Journ
a
l o
f
Mechanic
a
l E
ngi
neer
in
g
. 2007; 43(1
2
): 131
-136.
[9]
W
ang
Xia
o
li
n, Z
hang Yun,
Qing Z
hao
bo.
Stud
y
on the
decisi
on-m
a
kin
g
me
thod of
manufactur
i
n
g
partner s
e
lecti
on u
n
d
e
r virtu
a
l e
n
terpris
e
e
n
viro
nmen.
C
h
ina M
e
cha
n
ic
al
Engi
ne
erin
g
. 200
7; 18(
10)
:
119
7-12
00.
[10]
Foster I, Kesselma
n
C, Ni
ck J,
T
uecke S. Grid services
fo
r distributed
s
y
st
em integr
ation.
IEEE
Co
mp
uter
. 2002; 35(6): 3
7
-4
6.
[11]
Ma li, Z
hen
g w
e
imi
n
. S
y
nth
e
size trust de
g
r
ee
eva
l
u
a
ting
mode
l for an i
n
formatio
n
gri
d
enviro
n
ment.
Journ
a
l of T
s
in
ghu
a Univ
ersit
y
(Sci &T
ech).
200
9; 49(4): 59
9
−
603.
Evaluation Warning : The document was created with Spire.PDF for Python.