{"id":"https://openalex.org/W4381327531","doi":"https://doi.org/10.1109/tdsc.2023.3285927","title":"Trust Mechanism-Based Multi-Tier Computing System for Service-Oriented Edge-Cloud Networks","display_name":"Trust Mechanism-Based Multi-Tier Computing System for Service-Oriented Edge-Cloud Networks","publication_year":2023,"publication_date":"2023-06-20","ids":{"openalex":"https://openalex.org/W4381327531","doi":"https://doi.org/10.1109/tdsc.2023.3285927"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3285927","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3285927","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101461406","display_name":"Mingfeng Huang","orcid":"https://orcid.org/0000-0002-8173-2881"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mingfeng Huang","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, Hunan, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081827896","display_name":"Zhetao Li","orcid":"https://orcid.org/0000-0002-7804-0286"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhetao Li","raw_affiliation_strings":["National and Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, College of Information Science and Technology, Jinan University, Guangzhou, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"National and Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, College of Information Science and Technology, Jinan University, Guangzhou, Guangdong, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100602821","display_name":"Fu Xiao","orcid":"https://orcid.org/0000-0003-1815-2793"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fu Xiao","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020630479","display_name":"Saiqin Long","orcid":"https://orcid.org/0000-0001-7119-8673"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Saiqin Long","raw_affiliation_strings":["National and Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, College of Information Science and Technology, Jinan University, Guangzhou, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"National and Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, College of Information Science and Technology, Jinan University, Guangzhou, Guangdong, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075435434","display_name":"Anfeng Liu","orcid":"https://orcid.org/0000-0001-5190-4761"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anfeng Liu","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, Hunan, China","institution_ids":["https://openalex.org/I139660479"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101461406"],"corresponding_institution_ids":["https://openalex.org/I139660479"],"apc_list":null,"apc_paid":null,"fwci":12.39,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.98632511,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"21","issue":"4","first_page":"1639","last_page":"1651"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9714999794960022,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9714999794960022,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12702","display_name":"Brain Tumor Detection and Classification","score":0.9700999855995178,"subfield":{"id":"https://openalex.org/subfields/2808","display_name":"Neurology"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9650999903678894,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8829156160354614},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6649515628814697},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5040515661239624},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.475106805562973},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4686317443847656},{"id":"https://openalex.org/keywords/backtracking","display_name":"Backtracking","score":0.4622509181499481},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4622229337692261},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.46142369508743286},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4412154257297516},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.42072951793670654},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36495327949523926},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.344113826751709},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11789697408676147}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8829156160354614},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6649515628814697},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5040515661239624},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.475106805562973},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4686317443847656},{"id":"https://openalex.org/C156884757","wikidata":"https://www.wikidata.org/wiki/Q798554","display_name":"Backtracking","level":2,"score":0.4622509181499481},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4622229337692261},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.46142369508743286},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4412154257297516},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.42072951793670654},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36495327949523926},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.344113826751709},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11789697408676147},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2023.3285927","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3285927","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.5199999809265137}],"awards":[{"id":"https://openalex.org/G5888125704","display_name":null,"funder_award_id":"62072475","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8718608543","display_name":null,"funder_award_id":"62032020","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2760348722","https://openalex.org/W2783885583","https://openalex.org/W2120095724","https://openalex.org/W2368326437","https://openalex.org/W2357479099","https://openalex.org/W2364309619","https://openalex.org/W2371864976","https://openalex.org/W1987401977","https://openalex.org/W2391415040","https://openalex.org/W2788111191"],"abstract_inverted_index":{"Edge-cloud":[0],"networks":[1],"face":[2],"security":[3],"threats":[4],"during":[5],"data":[6,8,15,25,34,45,96,104,108,186],"collection,":[7],"routing,":[9],"and":[10,18,27,47,66,110,128,145,178,188,214],"service":[11],"construction,":[12],"resulting":[13],"in":[14,83,195],"tampering,":[16],"stealing,":[17],"communication":[19,111],"interruption.":[20],"Trust":[21,75],"mechanism":[22],"can":[23,184],"predict":[24],"quality":[26],"cooperation":[28],"probability":[29],"of":[30,120],"nodes":[31,156,167],"before":[32],"purchasing":[33],"or":[35,198],"establishing":[36],"cooperation,":[37],"so":[38],"as":[39,59],"to":[40,157,168],"select":[41],"trusted":[42],"participants":[43],"for":[44,143,154,165],"perception":[46],"interaction.":[48],"However,":[49],"there":[50],"are":[51,152,163],"some":[52],"problems":[53],"with":[54],"existing":[55],"trust":[56,64,91,101,119,139],"methods,":[57],"such":[58],"limited":[60],"evaluation":[61,68,92,102,135],"scope,":[62],"incomplete":[63],"evidence,":[65],"inaccurate":[67],"results.":[69],"To":[70],"address":[71],"these":[72],"issues,":[73],"a":[74,89,137,196],"mechanism-based":[76],"Multi-Tier":[77],"Computing":[78],"system":[79],"(TMTC)":[80],"is":[81,141],"proposed":[82],"this":[84],"paper.":[85],"Specifically,":[86],"we":[87],"propose":[88],"two-tier":[90],"model.":[93],"At":[94,113],"the":[95,114,176],"collection":[97],"layer,":[98,116],"it":[99,117,201],"conducts":[100],"on":[103,107,134,175],"reporters":[105],"based":[106,133],"submission":[109],"interactions.":[112],"network":[115],"evaluates":[118],"routers":[121],"through":[122],"path":[123,130],"backtracking":[124],"verification,":[125],"multi-service":[126],"analysis":[127],"coincident":[129],"analysis.":[131],"Then,":[132],"results,":[136],"differentiated":[138],"detection":[140,150,161,210],"initiated":[142,153,164],"normal":[144,166],"abnormal":[146],"nodes.":[147],"And":[148,193],"high-frequency":[149],"tasks":[151,162],"malicious":[155,208],"improve":[158],"accuracy,":[159],"sparse":[160],"reduce":[169],"costs.":[170],"Finally,":[171],"extensive":[172],"experiments":[173],"conducted":[174],"synthetic":[177],"real-world":[179],"datasets":[180],"demonstrate":[181],"that,":[182],"TMTC":[183],"resist":[185],"tampering":[187],"good-bad":[189],"mouth":[190],"attacks":[191],"effectively.":[192],"whether":[194],"dense":[197],"uniform":[199],"scene,":[200],"outperforms":[202],"two":[203],"benchmark":[204],"methods":[205],"by":[206,212,217],"increasing":[207],"node":[209],"rate":[211],"13.37%-21.87%":[213],"reducing":[215],"cost":[216],"18.8%-50.32%.":[218]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":10}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
