SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD26420 | Volume – 3 | Issue – 5 | July - August 2019 Page 718
A Real Dynamic Cyber Trust Model
Kuchillapati Chinnari1, Dr. Adusumalli Balaji2
1M.Tech Student, Department of Computer Science and Engineering,
2Associate Professor and Head of Department, Department of Computer Science and Engineering,
1,2Guntur Engineering College, Yanamadala, Guntur, Andhra Pradesh, India
How to cite this paper: Kuchillapati
Chinnari | Dr. Adusumalli Balaji "A Real
Dynamic Cyber Trust Model" Published in
International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-5, August
2019, pp.718-720,
https://doi.org/10.31142/ijtsrd26420
Copyright © 2019 by author(s) and
International Journalof Trendin Scientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
ABSTRACT
A Real Dynamic Cyber Trust Model is an application that is proposed in order
to distinguish the trust belief among the trustees who have been marketing in
today’s digital world by authenticated users. Though we are happy with the
developing technology, still we are worrying about thesecurityissuesinevery
scenario. In the same way, if we shop online by trusting some products, there
are few chances of getting bad products. We can experience these types of
scenarios when we shop online in some interfaces like amazon, e-bay, flip-
kart, etc. Of course, there are many existing systems which give a rating to the
product, that help the buyer to trust the seller and buy the product. Still, there
is an issue of being cheated by some wrong reviews given by unauthenticated
users. In order to overcome that type of issues, this Real Dynamic Cyber Trust
Model has been proposed. A Real Dynamic Cyber Trust Model has taken the
scenario of seller and buyer who goes shopping for products online. This Real
Dynamic Cyber Trust model acts as an interface between the SellerandBuyer.
Both Modules of Seller and Buyer have the opportunity of getting registered
and log in to the application. Buyer can give the feedback of any product he
buys and checks the trust factor of any seller. Whereas the Seller can add,
update or delete the products he sells. Based on the feedback given by the
buyer the Real Dynamic Cyber Trust Model calculates the trust factor of the
seller, which helps the buyer to find out whether the seller is trustworthy or
not.
KEYWORDS: Authentication, Competence, Integrity, Interface, Trust Factor,
Trustworthy, Trust model
INTRODUCTION
A REAL DYNAMIC CYBERTRUST MODEL isasystemwhichis
used in any of the real-time scenarios in order to provide the
trust factor i.e.; the believing rate of a particular entity
dynamically based on their actions performed. It further
helps to maintain the details of trusters and Trustees in the
Scenario.Thissystemmaintainsacentralizeddatabasewhere
the details of trusters and trustees are stored.
A Real Dynamic Cyber Trust Model can be useful to the
trusters in any organization. It provides the facility to the
trusters to get Trust Factor of the Trustees which changes
dynamically based on the feedback of the other trusters.
The main aim of this system is to provide “Trust Factor”
which changes based on thefeedbackoftrusters.Hereweare
considering a scenario of a SELLER and a BUYER. Here, the
Seller is a Trustee and the Buyer is a Truster.
OBJECTIVE
The main objective of this system is to calculate the trust
factor of the seller based on feedback provided by the buyer
for his purchased product. In this project, Seller registers
with the system by entering his details. Further, he could log
inby using credentialsandperformsoperationslikeselecting
his products from the database and updating products if any
required. This systemprovidesregistrationtothebuyer,such
that the buyer login and selects a product based on his
requirement. Then the system will automatically providethe
id of seller producing that product which helps buyer either
to get trust factor of a particular seller or provides the
feedback to a particular seller about his product.
AIM AND SCOPE
A. Aim
The main aim of this system is to provide Trust Factor of
Seller which changes dynamically based on feedback
provided by the Buyers.
B. Scope
The scope of this system is to enable automated trust
management that represents trusting behaviors, trusting
belief in integrity from that incompetence. We propose this
real dynamiccyber trustmodelwiththeauthenticationofthe
user.
EXISTING SYSTEMS
RBAC (ROLE BASED ACCESS CONTROL) is a modern system
uses digital identity as evidence about a user to grant access
to resources the user is entitled to. However, holding
evidence does not necessarily certify a user’s good behavior.
For example, when a creditcard company is decidingtoissue
a credit card to an individual, it does not only require
evidence such as social security number and home address
IJTSRD26420
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26420 | Volume – 3 | Issue – 5 | July - August 2019 Page 719
butalso checks the credit score, representingthebeliefabout
theapplicant, formed based on previousbehavior.Thatbelief
is called dynamic measure which assures that a user will not
conduct harmful actions. Similarly, here our work is
proposed. We developed a real dynamic trust model with
authentication of the user. Experimental evaluation of the
proposed integrity belief model in a simulated environment
of entities with different behavior patterns suggests that the
model is able to provide better estimations of integrity trust
behavior than other major trust computation models,
especially in the case of trustees with changing behavior.
Hence, we proposedaREALDYNAMICCYBERTRUSTMODEL
with user authorization which solves this problem by having
both integrity trust and competence trust.
Competence means a trustee havings the ability to
perform certain tasks.
Integrity means a trustee is honest and keeps
commitments.
SYSTEM ANALYSIS
The Real Dynamic Cyber Trust Model is built on Net
Beans IDE, where JAVA is front-end and MySQL is back-
end connected using JDBC.
It is independent of the operating system and accessible
application.
A. Hardware Requirements:
Processor : Pentium 3
Speed : 1.1 GHz
RAM : 256 MB (min)
Hard Disk : 20 GB (min)
B. Software Requirements:
Operating System : Windows XP
Front End : Java
Back End : MySQL
Database Connectivity : JDBC
SYSTEM DESIGN
As per our Scenario of SELLER-BUYER, herethetrusteeisthe
seller. His products could be purchased by ‘n’ number of
people (buyers). The feedback of product purchased buyers
will be given to our trust model (Reputation System). Based
on which the trust factor of that particular Seller will be
dynamically changed and is provided to the truster (Buyer).
PROJECT ANALYSIS
Our Real dynamic cyber trust model contains three different
modules namely:
Reputation System Module:
The Reputation System stores and provides the operations
done by the Seller and Buyer. It provides Trust Factor of
Seller to the Buyer and also changes it dynamically based on
feedback provided by the Buyer.
Seller Module:
The Seller registers and login into the system in order to
select, update or delete his products.
Buyer Module:
The Buyer registers and login into the system in order to
select the products and getits corresponding seller’s id, such
that he could get Trust Factor of that Seller or he can provide
feedback to the Seller’s product.
CONCLUSION
In REAL DYNAMIC CYBER TRUST MODEL, we proposed and
designed a dynamic trust model for determining the trust
factor of a seller in a SELLER-BUYER scenario. This system
provides services such as registrations and logins for seller
and buyer, buyers view products of different sellers, obtain
the trust factor of seller given by multiple buyers and they
provide feedback to sellers. The sellers will give thedetails of
the products theyproduce. The buyer willseetheproductsof
different sellers along with their ids’. Among different
products, buyers will select their required products. The
system we developed can be used by different scenarios.
Buyers can also see the existing trust factor saved in our
system. The trust factor of a particular seller will be varied
depending on the feedback provided by the buyers who
purchased products. This model is ingrained in answering
from social science and is not restricted to trusting belief as
most cyber methods are. We presented a demonstration of
contextand functionsthatrelatedissimilarcontexts,enabling
Building and testing initial competence trust.Experimentsin
a virtual trust environmentshowthat theproposed integrity
trust model carries out better than other major trust models
in calculating the behavior of users whose behavior
transform based on certain patterns over time.
ACKNOWLEDGMENT
The satisfaction and euphoriathat accompany the successful
completion of any task would be incomplete without the
mention of people who made it possible, whose constant
guidance and encouragement crowned our efforts with
success.
The firstperson I would like to thankmyProjectguideMr.Dr.
A. Balaji, M. Tech, Ph.D., Associate Professor and Head of the
Department in the Department of Computer Science and
Engineering. His understanding, encouragement and
personal guidance have provided the basis for this project.
I wish tothank Mr. Dr. A. RAMA RAO M.Tech,Ph.D.,Professor
in the Department Mechanical Engineering, Principal of
Guntur Engineering College, Yanamadala, for their
encouragement.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26420 | Volume – 3 | Issue – 5 | July - August 2019 Page 720
I also take this opportunity to express gratitude from the
core of my heart to our honorable Chairman, Mr. M.
NARAHARI RAO for his cordial support, which helped me in
completing this task through various stages.
I am very much thankful to Technical Supporting Staff,
especially Mr. M. KoteswaraRao,M.Tech,AssistantProfessor
who has helped me in the successful completion of the
project.
Finally, I would like to thank my parents for their
encouragement and support in studying this course and for
providing valuable suggestions which helped me a lot.
REFERENCES
[1] G.R. Barnes and P.B. Cerrito, “A mathematical modelfor
interpersonal relationships in social networks,” Social
Networks, vol. 20, no. 2, pp. 179- 196, 1998.
[2] R. Brent, Algorithms for Minimization without
Derivatives. Englewood Cliffs, NJ: Prentice-Hall, 1973.
[3] A. Das and M.M. Islam. “Secured Trust: a dynamic trust
computation model for secured communication in
multivalent systems,” IEEE Trans. Dependable Sec.
Compute., vol. 9, no. 2, pp. 261-274, 2012.
[4] C. Dellarocas, “Immunizingonlinereputation reporting
systems against unfair ratings and discriminatory
behavior,” in Proc. 2nd ACM Conference on Electronic
Commerce, 2000, pp. 150-157

More Related Content

Similar to A Real Dynamic Cyber Trust Model

Connecting social media to e commerce (2)
Connecting social media to e commerce (2)Connecting social media to e commerce (2)
Connecting social media to e commerce (2)krsenthamizhselvi
 
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...IRJET Journal
 
Flipkart Software requirements specification SRS
Flipkart Software requirements specification SRSFlipkart Software requirements specification SRS
Flipkart Software requirements specification SRSAman Goel
 
Recommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data StreamsRecommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data StreamsIRJET Journal
 
Identifying Malicious Reviews Using NLP and Bayesian Technique on Ecommerce H...
Identifying Malicious Reviews Using NLP and Bayesian Technique on Ecommerce H...Identifying Malicious Reviews Using NLP and Bayesian Technique on Ecommerce H...
Identifying Malicious Reviews Using NLP and Bayesian Technique on Ecommerce H...IRJET Journal
 
acuteIQ- The machine learning economy is here
acuteIQ- The machine learning economy is hereacuteIQ- The machine learning economy is here
acuteIQ- The machine learning economy is hereSarthak Baluja
 
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...Hafiz Sanni
 
Sentimental Analysis and Opinion Mining on Online Customer Review
Sentimental Analysis and Opinion Mining on Online Customer ReviewSentimental Analysis and Opinion Mining on Online Customer Review
Sentimental Analysis and Opinion Mining on Online Customer ReviewIRJET Journal
 
ValiDeck Slide Deck
ValiDeck Slide DeckValiDeck Slide Deck
ValiDeck Slide DeckAlok Narula
 
AI in Banking Industry and Effects on Customers.pdf
AI in Banking Industry and Effects on Customers.pdfAI in Banking Industry and Effects on Customers.pdf
AI in Banking Industry and Effects on Customers.pdfCeyhun Jay Tugcu
 
Online shopping ecommerce java project
Online shopping ecommerce java projectOnline shopping ecommerce java project
Online shopping ecommerce java projectTutorial Learners
 
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...Ioannis Mandourarakis
 
IRJET-User Profile based Behavior Identificaton using Data Mining Technique
IRJET-User Profile based Behavior Identificaton using Data Mining TechniqueIRJET-User Profile based Behavior Identificaton using Data Mining Technique
IRJET-User Profile based Behavior Identificaton using Data Mining TechniqueIRJET Journal
 
Intelligent Shopping Recommender using Data Mining
Intelligent Shopping Recommender using Data MiningIntelligent Shopping Recommender using Data Mining
Intelligent Shopping Recommender using Data MiningIRJET Journal
 
Drive Revenue and Loyalty by Engaging Mobile and Social Consumers
Drive Revenue and Loyalty by Engaging Mobile and Social ConsumersDrive Revenue and Loyalty by Engaging Mobile and Social Consumers
Drive Revenue and Loyalty by Engaging Mobile and Social ConsumersPhil Hendrix
 
Put Your Trust in Hyper-relevance
Put Your Trust in Hyper-relevancePut Your Trust in Hyper-relevance
Put Your Trust in Hyper-relevanceAccenture Insurance
 
IRJET- Internet Shopping Value and Customer Repurchase Intention
IRJET-  	  Internet Shopping Value and Customer Repurchase IntentionIRJET-  	  Internet Shopping Value and Customer Repurchase Intention
IRJET- Internet Shopping Value and Customer Repurchase IntentionIRJET Journal
 

Similar to A Real Dynamic Cyber Trust Model (20)

main project doument
main project doumentmain project doument
main project doument
 
Connecting social media to e commerce (2)
Connecting social media to e commerce (2)Connecting social media to e commerce (2)
Connecting social media to e commerce (2)
 
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
 
Flipkart Software requirements specification SRS
Flipkart Software requirements specification SRSFlipkart Software requirements specification SRS
Flipkart Software requirements specification SRS
 
Recommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data StreamsRecommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data Streams
 
Identifying Malicious Reviews Using NLP and Bayesian Technique on Ecommerce H...
Identifying Malicious Reviews Using NLP and Bayesian Technique on Ecommerce H...Identifying Malicious Reviews Using NLP and Bayesian Technique on Ecommerce H...
Identifying Malicious Reviews Using NLP and Bayesian Technique on Ecommerce H...
 
acuteIQ- The machine learning economy is here
acuteIQ- The machine learning economy is hereacuteIQ- The machine learning economy is here
acuteIQ- The machine learning economy is here
 
Ad4301161166
Ad4301161166Ad4301161166
Ad4301161166
 
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
 
Sentimental Analysis and Opinion Mining on Online Customer Review
Sentimental Analysis and Opinion Mining on Online Customer ReviewSentimental Analysis and Opinion Mining on Online Customer Review
Sentimental Analysis and Opinion Mining on Online Customer Review
 
7 ps in banking
7 ps in banking7 ps in banking
7 ps in banking
 
ValiDeck Slide Deck
ValiDeck Slide DeckValiDeck Slide Deck
ValiDeck Slide Deck
 
AI in Banking Industry and Effects on Customers.pdf
AI in Banking Industry and Effects on Customers.pdfAI in Banking Industry and Effects on Customers.pdf
AI in Banking Industry and Effects on Customers.pdf
 
Online shopping ecommerce java project
Online shopping ecommerce java projectOnline shopping ecommerce java project
Online shopping ecommerce java project
 
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
 
IRJET-User Profile based Behavior Identificaton using Data Mining Technique
IRJET-User Profile based Behavior Identificaton using Data Mining TechniqueIRJET-User Profile based Behavior Identificaton using Data Mining Technique
IRJET-User Profile based Behavior Identificaton using Data Mining Technique
 
Intelligent Shopping Recommender using Data Mining
Intelligent Shopping Recommender using Data MiningIntelligent Shopping Recommender using Data Mining
Intelligent Shopping Recommender using Data Mining
 
Drive Revenue and Loyalty by Engaging Mobile and Social Consumers
Drive Revenue and Loyalty by Engaging Mobile and Social ConsumersDrive Revenue and Loyalty by Engaging Mobile and Social Consumers
Drive Revenue and Loyalty by Engaging Mobile and Social Consumers
 
Put Your Trust in Hyper-relevance
Put Your Trust in Hyper-relevancePut Your Trust in Hyper-relevance
Put Your Trust in Hyper-relevance
 
IRJET- Internet Shopping Value and Customer Repurchase Intention
IRJET-  	  Internet Shopping Value and Customer Repurchase IntentionIRJET-  	  Internet Shopping Value and Customer Repurchase Intention
IRJET- Internet Shopping Value and Customer Repurchase Intention
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

A Real Dynamic Cyber Trust Model

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD26420 | Volume – 3 | Issue – 5 | July - August 2019 Page 718 A Real Dynamic Cyber Trust Model Kuchillapati Chinnari1, Dr. Adusumalli Balaji2 1M.Tech Student, Department of Computer Science and Engineering, 2Associate Professor and Head of Department, Department of Computer Science and Engineering, 1,2Guntur Engineering College, Yanamadala, Guntur, Andhra Pradesh, India How to cite this paper: Kuchillapati Chinnari | Dr. Adusumalli Balaji "A Real Dynamic Cyber Trust Model" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-5, August 2019, pp.718-720, https://doi.org/10.31142/ijtsrd26420 Copyright © 2019 by author(s) and International Journalof Trendin Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) ABSTRACT A Real Dynamic Cyber Trust Model is an application that is proposed in order to distinguish the trust belief among the trustees who have been marketing in today’s digital world by authenticated users. Though we are happy with the developing technology, still we are worrying about thesecurityissuesinevery scenario. In the same way, if we shop online by trusting some products, there are few chances of getting bad products. We can experience these types of scenarios when we shop online in some interfaces like amazon, e-bay, flip- kart, etc. Of course, there are many existing systems which give a rating to the product, that help the buyer to trust the seller and buy the product. Still, there is an issue of being cheated by some wrong reviews given by unauthenticated users. In order to overcome that type of issues, this Real Dynamic Cyber Trust Model has been proposed. A Real Dynamic Cyber Trust Model has taken the scenario of seller and buyer who goes shopping for products online. This Real Dynamic Cyber Trust model acts as an interface between the SellerandBuyer. Both Modules of Seller and Buyer have the opportunity of getting registered and log in to the application. Buyer can give the feedback of any product he buys and checks the trust factor of any seller. Whereas the Seller can add, update or delete the products he sells. Based on the feedback given by the buyer the Real Dynamic Cyber Trust Model calculates the trust factor of the seller, which helps the buyer to find out whether the seller is trustworthy or not. KEYWORDS: Authentication, Competence, Integrity, Interface, Trust Factor, Trustworthy, Trust model INTRODUCTION A REAL DYNAMIC CYBERTRUST MODEL isasystemwhichis used in any of the real-time scenarios in order to provide the trust factor i.e.; the believing rate of a particular entity dynamically based on their actions performed. It further helps to maintain the details of trusters and Trustees in the Scenario.Thissystemmaintainsacentralizeddatabasewhere the details of trusters and trustees are stored. A Real Dynamic Cyber Trust Model can be useful to the trusters in any organization. It provides the facility to the trusters to get Trust Factor of the Trustees which changes dynamically based on the feedback of the other trusters. The main aim of this system is to provide “Trust Factor” which changes based on thefeedbackoftrusters.Hereweare considering a scenario of a SELLER and a BUYER. Here, the Seller is a Trustee and the Buyer is a Truster. OBJECTIVE The main objective of this system is to calculate the trust factor of the seller based on feedback provided by the buyer for his purchased product. In this project, Seller registers with the system by entering his details. Further, he could log inby using credentialsandperformsoperationslikeselecting his products from the database and updating products if any required. This systemprovidesregistrationtothebuyer,such that the buyer login and selects a product based on his requirement. Then the system will automatically providethe id of seller producing that product which helps buyer either to get trust factor of a particular seller or provides the feedback to a particular seller about his product. AIM AND SCOPE A. Aim The main aim of this system is to provide Trust Factor of Seller which changes dynamically based on feedback provided by the Buyers. B. Scope The scope of this system is to enable automated trust management that represents trusting behaviors, trusting belief in integrity from that incompetence. We propose this real dynamiccyber trustmodelwiththeauthenticationofthe user. EXISTING SYSTEMS RBAC (ROLE BASED ACCESS CONTROL) is a modern system uses digital identity as evidence about a user to grant access to resources the user is entitled to. However, holding evidence does not necessarily certify a user’s good behavior. For example, when a creditcard company is decidingtoissue a credit card to an individual, it does not only require evidence such as social security number and home address IJTSRD26420
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26420 | Volume – 3 | Issue – 5 | July - August 2019 Page 719 butalso checks the credit score, representingthebeliefabout theapplicant, formed based on previousbehavior.Thatbelief is called dynamic measure which assures that a user will not conduct harmful actions. Similarly, here our work is proposed. We developed a real dynamic trust model with authentication of the user. Experimental evaluation of the proposed integrity belief model in a simulated environment of entities with different behavior patterns suggests that the model is able to provide better estimations of integrity trust behavior than other major trust computation models, especially in the case of trustees with changing behavior. Hence, we proposedaREALDYNAMICCYBERTRUSTMODEL with user authorization which solves this problem by having both integrity trust and competence trust. Competence means a trustee havings the ability to perform certain tasks. Integrity means a trustee is honest and keeps commitments. SYSTEM ANALYSIS The Real Dynamic Cyber Trust Model is built on Net Beans IDE, where JAVA is front-end and MySQL is back- end connected using JDBC. It is independent of the operating system and accessible application. A. Hardware Requirements: Processor : Pentium 3 Speed : 1.1 GHz RAM : 256 MB (min) Hard Disk : 20 GB (min) B. Software Requirements: Operating System : Windows XP Front End : Java Back End : MySQL Database Connectivity : JDBC SYSTEM DESIGN As per our Scenario of SELLER-BUYER, herethetrusteeisthe seller. His products could be purchased by ‘n’ number of people (buyers). The feedback of product purchased buyers will be given to our trust model (Reputation System). Based on which the trust factor of that particular Seller will be dynamically changed and is provided to the truster (Buyer). PROJECT ANALYSIS Our Real dynamic cyber trust model contains three different modules namely: Reputation System Module: The Reputation System stores and provides the operations done by the Seller and Buyer. It provides Trust Factor of Seller to the Buyer and also changes it dynamically based on feedback provided by the Buyer. Seller Module: The Seller registers and login into the system in order to select, update or delete his products. Buyer Module: The Buyer registers and login into the system in order to select the products and getits corresponding seller’s id, such that he could get Trust Factor of that Seller or he can provide feedback to the Seller’s product. CONCLUSION In REAL DYNAMIC CYBER TRUST MODEL, we proposed and designed a dynamic trust model for determining the trust factor of a seller in a SELLER-BUYER scenario. This system provides services such as registrations and logins for seller and buyer, buyers view products of different sellers, obtain the trust factor of seller given by multiple buyers and they provide feedback to sellers. The sellers will give thedetails of the products theyproduce. The buyer willseetheproductsof different sellers along with their ids’. Among different products, buyers will select their required products. The system we developed can be used by different scenarios. Buyers can also see the existing trust factor saved in our system. The trust factor of a particular seller will be varied depending on the feedback provided by the buyers who purchased products. This model is ingrained in answering from social science and is not restricted to trusting belief as most cyber methods are. We presented a demonstration of contextand functionsthatrelatedissimilarcontexts,enabling Building and testing initial competence trust.Experimentsin a virtual trust environmentshowthat theproposed integrity trust model carries out better than other major trust models in calculating the behavior of users whose behavior transform based on certain patterns over time. ACKNOWLEDGMENT The satisfaction and euphoriathat accompany the successful completion of any task would be incomplete without the mention of people who made it possible, whose constant guidance and encouragement crowned our efforts with success. The firstperson I would like to thankmyProjectguideMr.Dr. A. Balaji, M. Tech, Ph.D., Associate Professor and Head of the Department in the Department of Computer Science and Engineering. His understanding, encouragement and personal guidance have provided the basis for this project. I wish tothank Mr. Dr. A. RAMA RAO M.Tech,Ph.D.,Professor in the Department Mechanical Engineering, Principal of Guntur Engineering College, Yanamadala, for their encouragement.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26420 | Volume – 3 | Issue – 5 | July - August 2019 Page 720 I also take this opportunity to express gratitude from the core of my heart to our honorable Chairman, Mr. M. NARAHARI RAO for his cordial support, which helped me in completing this task through various stages. I am very much thankful to Technical Supporting Staff, especially Mr. M. KoteswaraRao,M.Tech,AssistantProfessor who has helped me in the successful completion of the project. Finally, I would like to thank my parents for their encouragement and support in studying this course and for providing valuable suggestions which helped me a lot. REFERENCES [1] G.R. Barnes and P.B. Cerrito, “A mathematical modelfor interpersonal relationships in social networks,” Social Networks, vol. 20, no. 2, pp. 179- 196, 1998. [2] R. Brent, Algorithms for Minimization without Derivatives. Englewood Cliffs, NJ: Prentice-Hall, 1973. [3] A. Das and M.M. Islam. “Secured Trust: a dynamic trust computation model for secured communication in multivalent systems,” IEEE Trans. Dependable Sec. Compute., vol. 9, no. 2, pp. 261-274, 2012. [4] C. Dellarocas, “Immunizingonlinereputation reporting systems against unfair ratings and discriminatory behavior,” in Proc. 2nd ACM Conference on Electronic Commerce, 2000, pp. 150-157