ABSTRACT

Trusted network is characterized by a large amount of data, abnormal dispersion, and high complexity. Traditional methods are easily affected by trusted network environment, resulting in unreliable mining results. Therefore, a new real-time mining method of trusted network difference data is proposed. Real-time collection of trusted network difference data through history system is performed on the basis of determining the principle of trusted network difference data mining and collecting and extracting the characteristics of difference data. The process of trusted network differential data mining is designed through the artificial bee colony algorithm. According to the process, differential data mining is carried out from three aspects: constructing a trusted network differential data transmission path, updating pheromone, and establishing a differential data transmission path set. The experimental results show that the proposed method can effectively realize the real-time mining of difference data, and the mining accuracy is more accurate.

References

1.
H.-F.
 
Huang
, “
A New Design of Access Control in Wireless Sensor Networks
,”
International Journal of Distributed Sensor Networks
7
, no. 
1
(April
2011
):
412146
,
2.
S.
 
Amudha
and
M.
 
Murali
, “
WITHDRAWN: DESD-CAT Inspired Algorithm for Establishing Trusted Connection in Energy Efficient FoG-BAN Networks
,”
Materials Today Proceedings
. Published ahead of print, February 19,
2021
,
3.
Y.
 
Cao
,
Y.
 
Zhao
,
J.
 
Li
,
R.
 
Lin
,
J.
 
Zhang
, and
J.
 
Chen
, “
Hybrid Trusted/Untrusted Relay Based Quantum Key Distribution over Optical Backbone Networks
,”
IEEE Journal on Selected Areas in Communications
39
, no. 
1
(September
2021
):
2701
2718
,
4.
X.
 
Ding
, “
Detection Method of Data Integrity in Network Storage Based on Symmetrical Difference
,”
Symmetry
12
, no. 
2
(February
2020
):
228
,
5.
P.-W.
 
Tsai
,
J.-S.
 
Pan
,
B.-Y.
 
Liao
, and
S.-C.
 
Chu
, “
Enhanced Artificial Bee Colony Optimization
,”
International Journal of Innovative Computing, Information and Control
5
, no. 
12
(December
2009
):
5081
5092
.
6.
L. A. K.
 
Ayad
,
G.
 
Bernardini
,
R.
 
Grossi
,
C. S.
 
Iliopoulos
,
N.
 
Pisanti
,
S. P.
 
Pissis
, and
G.
 
Rosone
, “
Longest Property-Preserved Common Factor: A New String-Processing Framework
,”
Theoretical Computer Science
812
(April
2020
):
244
251
,
7.
T.
 
Li
,
H.
 
Li
,
L.
 
Hu
, and
H.
 
Li
, “
A Reversible Steganography Method with Statistical Features Maintained Based on the Difference Value
,”
IEEE Access
8
(
2020
):
12845
12855
,
8.
H.
 
Qiang
,
Y.
 
Wan
,
Z.
 
Liu
,
L.
 
Xiang
, and
X.
 
Meng
, “
Discriminative Deep Asymmetric Supervised Hashing for Cross-Modal Retrieval
,”
Knowledge-Based Systems
204
(September
2020
):
106188
,
9.
Z.
 
Zheng
,
H.
 
Zheng
,
J.
 
Ju
,
D.
 
Chen
,
X.
 
Li
,
Z.
 
Guo
,
C.
 
You
, and
M.
 
Lin
, “
A System for Identifying an Anti-counterfeiting Pattern Based on the Statistical Difference in Key Image Regions
,”
Expert Systems with Applications
183
(November
2021
):
115410
,
10.
H.
 
Liu
,
R. J.
 
Shor
, and
S. S.
 
Park
, “
Data Fusion by a Supervised Learning Method for Orientation Estimation Using Multi-sensor Configuration under Conditions of Magnetic Distortion and Shock Impact
,”
IEEE Access
8
(
2020
):
7776
7791
,
11.
M.
 
Paniri
,
M. B.
 
Dowlatshahi
, and
H.
 
Nezamabadi-Pour
, “
Ant-TD: Ant Colony Optimization Plus Temporal Difference Reinforcement Learning for Multi-label Feature Selection
,”
Swarm and Evolutionary Computation
64
(July
2021
):
100892
,
12.
R.
 
Pang
,
B.
 
Xu
,
Y.
 
Zhou
, and
L.
 
Song
, “
Seismic Time-History Response and System Reliability Analysis of Slopes Considering Uncertainty of Multi-parameters and Earthquake Excitations
,”
Computers and Geotechnics
136
(August
2021
):
104245
,
13.
O.
 
Delgado-Friedrichs
,
A. M.
 
Kingston
,
S. J.
 
Latham
,
G. R.
 
Myers
, and
A. P.
 
Sheppard
, “
PI-Line Difference for Alignment and Motion-Correction of Cone-Beam Helical-Trajectory Micro-tomography Data
,”
IEEE Transactions on Computational Imaging
6
(
2020
):
24
33
,
14.
P.
 
Maniriho
,
L. J.
 
Mahoro
,
Z.
 
Bizimana
,
E.
 
Niyigaba
, and
T.
 
Ahmad
, “
Reversible Difference Expansion Multi-layer Data Hiding Technique for Medical Images
,”
International Journal of Advances in Intelligent Informatics
7
, no. 
1
(
2021
):
1
11
,
15.
M.
 
Das
,
D.
 
Gupta
,
P.
 
Radeva
, and
A. M.
 
Bakde
, “
NSST Domain CT–MR Neurological Image Fusion Using Optimised Biologically Inspired Neural Network
,”
IET Image Processing
14
, no. 
16
(December
2020
):
4291
4305
,
16.
N.
 
Zaghari
,
M.
 
Fathy
,
S. M.
 
Jameii
,
M.
 
Sabokrou
, and
M.
 
Shahverdy
, “
Improving the Learning of Self-Driving Vehicles Based on Real Driving Behavior Using Deep Neural Network Techniques
,”
The Journal of Supercomputing
77
, no. 
4
(August
2020
):
3752
3794
,
17.
S. D.
 
Patil
and
L.
 
Ragha
, “
An Adaptive Fuzzy Based Message Dissemination and Micro-artificial Bee Colony Algorithm Optimized Routing Scheme for Vehicular Ad Hoc Network
,”
IET Communications
14
, no. 
6
(April
2020
):
994
1004
,
18.
V.
 
Morello
,
E. D.
 
Barr
,
B. W.
 
Stappers
,
E. F.
 
Keane
, and
A. G.
 
Lyne
, “
Optimal Periodicity Searching: Revisiting the Fast Folding Algorithm for Large-Scale Pulsar Surveys
,”
Monthly Notices of the Royal Astronomical Society
497
, no. 
4
(October
2020
):
4654
4671
,
19.
A. H.
 
Alaidi
,
S.
 
Chen
, and
Y. W.
 
Leong
, “
Systematic Review of Enhancement of Artificial Bee Colony Algorithm Using Ant Colony Pheromone
,”
International Journal of Interactive Mobile Technologies
15
, no. 
16
(
2021
):
172
179
,
You do not currently have access to this content.