Next Article in Journal
Infrared Radiation-Assisted Non-Pressure Sintering of Micron-Sized Silver for Power Electronic Packaging
Previous Article in Journal
DSASPP: Depthwise Separable Atrous Spatial Pyramid Pooling for PCB Surface Defect Detection
Previous Article in Special Issue
Enhanced Information Graph Recursive Network for Traffic Forecasting
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On the Evaluation Framework of Comprehensive Trust for Data Interaction in Intermodal Transport

1
Institute of Electromagnetic Compatibility, Beijing Jiaotong University, Beijing 100044, China
2
China Railway Information Technology Group Co., Ltd., Beijing 100844, China
3
China State Railway Group Co., Ltd., Beijing 100038, China
4
School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(8), 1487; https://doi.org/10.3390/electronics13081487
Submission received: 4 March 2024 / Revised: 29 March 2024 / Accepted: 10 April 2024 / Published: 14 April 2024
(This article belongs to the Special Issue Big Data and Machine Learning for Vehicles and Transportation)

Abstract

:
Due to the necessity to realize “building a strong transportation nation”, the construction of intermodal transportation is based on the information resource integration of diverse transport systems. To ensure the data security during the interaction between different transport modes, as well as the effect of data application, the status of entities and data flow in the network should be supervised throughout. Therefore, an evaluation framework of comprehensive trust is proposed in this paper. With feature analysis of transportation big data, a quality assessment is conducted by three-dimensional metric sets, which is considered as a significant factor of trust measurement. Furthermore, a hierarchical trust structure is put forward to assess the trust of entities in different levels, in terms of the static and dynamic evidence. Furthermore, the visualization of a dynamic global information security state is discussed, based on temporal knowledge graphs. As shown in practical application and simulation analysis, this framework can meet the requirements of data security supervision and lay the foundation of further intelligent management. This research is of great significance to improve the data security level in intermodal transport, and to promote the utilization and sharing of public information resources.

1. Introduction

In accordance with national transportation strategies such as ‘Belt and Road’, and ‘building a strong transportation nation’, the demand for building a modern comprehensive transportation system has experienced explosive growth in China. As one of the important components, intermodal passenger transport serves as a cornerstone for improving the quality and standards of integrated transportation services, bearing significant importance in expediting structural reforms in transportation service supply and driving the development of modern comprehensive transportation systems. Currently, the implementation of intermodal transportation faces numerous challenges. From the macro point of view of the government, there are socio-economic issues such as accessibility and inclusiveness, impact on the ecological environment, urban development and land planning, and legal and policy safeguards, as well as economic benefits and costs. From the narrow point of view of the passenger, there is a demand for a more convenient transfer service, a more convenient security check service, a simpler ticketing service and a more accurate information service. The resolution of these issues is inseparable from breaking down data silos to achieve an interconnectivity of information resources between different modes of transportation, such as railways, civil aviation, expressways and urban public transportation. Nowadays, the comprehensive utilization of transportation big data has garnered increasingly widespread attention. In particular, it is necessary to promote integrated data utilization between forms of transport, to realize the vision of route planning with a ‘unified map’, operating control with a ‘unified table’, and travelling with a ‘unified ticket’, so as to better serving the economic and social development of metropolitan areas and improving people’s lives [1].
As a strategic asset and business-driving factor, the data resources of transportation enterprises are currently used separately, with the separation of ownership and use right. Consequently, data silos of transportation resources have led to a dilemma in data sharing and exchange that the requirements for secure sharing and development cannot satisfy. Due to the diversity of data sources and the risk of data transmission, cross-entity, cross-domain, and even cross-mode data exchange may suffer from severe issues, such as data leakage, data compliance issues, data loss and security vulnerabilities. Therefore, it is imperative to supervise and conduct real-time monitoring of the security of relevant entities from the overall perspective to ensure the smooth operation of critical information infrastructure concerning intermodal transportation.
There has been some research on the security evaluation of datasets and access entities for cross-domain interaction. In order to prevent data quality from affecting the secondary application, a multi-level assessment framework based on a business scenario is established to objectively evaluate the data quality of intelligent transportation [2]. A service trust assessment model towards a cross-domain alliance of services is proposed, which combines the characteristics of the service collaboration, the characteristics of service entities, various links in service life cycle and inter-domain security policy [3]. Considering the influence brought by the confidentiality, as well as the synchronization of the trusted measurement frequency with the progress, a multilevel dynamic trusted measurement model based on information flow theory is raised [4]. In order to solve the identity credibility problem in cross-domain authentication under the blockchain-based heterogeneous identity alliance infrastructure, the identity credibility evaluation method of alliance member consensus has been designed [5]. With a trust-based logical framework and trust measurement model, the vicious competition of agents in smart cities can be solved, and agents can adopt a cooperative strategy [6].
The various research mentioned above has realized a flexible and scalable trust measurement of cross-domain information resources, but there are still some shortcomings for the scenario of intermodal transportation. Firstly, as for the data quality assessment, the framework should combine with the properties of traffic big data, where the spatiotemporal characteristics should be adequately addressed. Secondly, considering the information collaboration requirements, data quality should be taken as a great factor of data trust. In fact, the outcome of a business analysis task is directly influenced by the quality of input data, especially in complex analysis tasks; thus, it directly affects the security of data applications. For example, decision-making and predictions based on patterns and trends with poor quality or failing to capture real insights and images of current operational status, can lead to unnecessary risks and losses for transportation organizations, and may have effect on the safety and convenience of passengers’ travelling experience [7]. Thirdly, the trust measurement should be dynamically updated with data flow between entities in the network environment, considering both static and dynamic evidence for different types of entities. In this way, the data security situation of organizations at all levels can be understood in due course, and the integration of comprehensive supervision of data security realized. Finally, in order to ensure the data security of the whole network, it is necessary to provide an effective visual method to find security threats and judge the trend of data security from a global perspective.
Therefore, in this paper, we propose a comprehensive trust evaluation framework for data interaction entities in intermodal transportation, from the perspective of a data security supervisor. It takes trust as a metric to conduct a comprehensive security monitoring of integrated data, in order to effectively guard the normal operation and integrity of critical information infrastructure. Building upon this foundation, it enables an understanding of the data security posture at different levels, facilitates the exchange of data flow information in the network environments, assesses data security compliance from a regulatory standpoint, and evaluates data security risk trends from a holistic perspective. Furthermore, the framework is designed to be implemented on the data integrated service platform and the performance of data transmission will not be affected.
The structure of the paper is as follows: Section 2 analyzes the characteristics of data to share between different transportation modes and proposes the hierarchical evaluation framework based on global security needs. Section 3 raises a model based on three dimensions of time, space and content, to assess the quality of transportation data on different aspects. Section 4 introduces a three-layer trust evaluation structure, considering both inherent attributes and historical interaction behaviors. Moreover, to dynamically display the entity performance in the process of cross-mode data interaction, a visualization based on a temporal knowledge graph is adopted in Section 5. Section 6 demonstrates the feasibility and practicality of the framework through practical examples of a passenger services scenario. Finally, in the last section, a conclusion summarizes the entire paper.

2. Problem Formulation

2.1. Demand of Data Interaction in Intermodal Transportation

Transportation big data generally refers to a dataset generated directly by the management of urban transportation operations, including various types of data related to road traffic and public transport. The broad definition also includes data from industries or fields related to transportation, such as meteorological environment, population planning, mobile communication signaling, etc.; in addition, it counts in traffic condition data provided by mass media, such as text, images, audio, and video provided through Weibo, forums and radio broadcasts, etc. By definition, transportation big data possesses the following characteristics:
A. Huge Resource Volume. Urban transportation generates a massive amount of data continuously, including external data such as weather and environmental monitoring. In large cities like Shanghai, for instance, the structured transportation data alone can exceed 30 GB per day [5], in addition to vast amounts of unstructured data such as road surveillance videos and toll booth photos.
B. Diverse Information Formats. From the perspective of data sources, this includes the data generated directly by data acquisition equipment on-board and off-board, as well as other information systems. Furthermore, the diversity in professional types, wide business scope, and extended service chains contribute to the variety of data types. Taking the railway system as an example, railway big data spans the entire lifecycle from “survey and design—engineering construction—joint debugging and testing—operation and maintenance”, covering the entire business chain of vehicles, machinery, engineering, electricity, and vehicles [3,8].
C. Significant Spatiotemporal Characteristics. Traffic network data usually has a temporal and spatial dimension of massive scale; thus, it belongs to typical spatiotemporal big data. For example, railway information resources come from all locomotives, vehicles, and various sensors on infrastructure in more than 600 station segments of 18 railway companies nationwide, exhibiting clear geographical distribution [4]. In addition, with the development of urban transportation, decision-making in traffic management emphasizes the analysis of recent data. It indicates that historical data has a much lower reference value for traffic management and urban planning decision-making compared to recent data. In particular, in applications such as traffic diversion, accident warnings, and route planning, timely and accurate data collection and processing are indispensable.
D. High Security Requirements. On one hand, transportation data holds rich value and can provide strong support for emergency traffic planning, enabling rapid response and emergency command in critical situations, contributing to social stability and reducing economic losses [9]. On the other hand, the data of the transport industry involves daily management, operational maintenance, and dispatch arrangements for enterprises. Data leakage can pose severe risks to business secrets and public safety. Therefore, the requirement for resource security remains a high level.
To achieve hub transfers, capacity allocation, and dispatch command in metropolitan intermodal transportation, there is need for systematic research on collaborative transportation organization based on integrated information resources. Meanwhile, passengers have higher expectations for intelligent, comprehensive, flexible, interactive, transparent, and efficient information services, including more accurate information services, convenient access anytime and anywhere, and intelligent queries based on natural language interaction. Thus, the comprehensive utilization of transport network facilities and equipment capacities will differ from the previous single-mode form. Furthermore, research is still needed for the coordination and command of emergency situations in the safety assurance system. The realization of these visions depends on the information collaboration and exchange between different transportation systems. According to a previous research and literature review [6,10], the essential information requested in passenger intermodal transportation is shown in Figure 1.

2.2. Comprehensive Assessment Framework for Data Trustworthiness in Intermodal Transportation

Based on the characteristics analysis of the data above, we propose a comprehensive assessment framework for entity trustworthiness as shown in Figure 2, to meet the data exchange demand for cross-mode transportation collaboration. In this hierarchical framework, a single transportation mode is integrally divided into different network domains, based on main business classification. Further, every information system in the domain contains an indefinite number of datasets, which are defined by data safety hierarchy and content. Among the whole network, it is assumed that every entity in the information system layer has only one external interface to interact with both in-domain and out-of-domain entities, so an information system is regarded as a minimum subject entity as well as data source in the access process.
According to the hierarchical structure, the assessment is composed of different aspects. Firstly, we propose a multi-demission model to evaluate data quality, in consideration of the reliability of data applications. And then, trust analysis network is initialized by decentralized data sources, thus data quality is taken as the most significant assessment criteria to initialize the trust network. The whole network topology varies as the data interactions carries out between entities. Meanwhile, the context interactions are introduced to calculate the trust inside and outside subject’ domain. Finally, based on temporal knowledge graph, the dynamic changes in trust can be clearly displayed, which lays the foundation for subsequent intelligent applications, such as global security surveillance and a malicious behavior warning. The specific process is described in the following sections.

3. Quality Assessment for Collaborative Interaction of Transportation Data

Based on the exchange requirement and characteristics of transportation big data, this section selects appropriate dimensions for data quality assessment and specific metrics. Then, the corresponding evaluation models and detailed processes are defined. Here, the assessment method is a comprehensive assessment approach, including both a qualitative assessment and a quantitative assessment [7].

3.1. Metrics for Intermodal Transportation Data Quality Measurement

Since transportation big data exhibits distinct spatiotemporal characteristics, the temporal and spatial properties are as important as inherent content. Accordingly, we employ a three-dimensional structure, i.e., “Time + Space + Content”, to evaluate the quality of transportation information resources, where the dimension of data quality refers to a characteristic or attribute of dataset that can be measured and improved. In fact, quality dimensions provide a way to measure and manage the quality of data products and information resources. Quality indicators for data product quality belong to these quality dimensions and represent a more detailed evaluation form of quality dimensions. Therefore, a two-layer assessment system is proposed with ten indicators from three dimensions, as stated in Table 1.
The time dimension contains three indicators: time coverage, timeliness, and stability. The space dimension contains two indicators: space coverage and spatial consistency. The content dimension contains five indicators: consistency, accuracy, integrity, validity, and traceability. The specific meanings of these ten indicators are defined in Table 1.

3.2. Comprehensive Data Quality Assessment Model for intermodal Transportation

With the evaluation indicators above, an evaluation system is proposed for intermodal transportation data interaction. The system consists of time quality, space quality and content quality. In specific application, these three parts can be used separately or jointly, according to demand of practical scenario. In addition, each quality value is limited to (0, 1), so as to ensure the generality of the model. For a dataset P, we assume that P has N data objects, i.e., P = { o 1 , o 2 , , o N } , and the objects make up an LN-layer spatial structure; K refers to the number of total timestamps of P, indicating time range; the attribute set of P is A = {A1, A2, …, AM}, and M is the number of attributes.

3.2.1. Time Quality Evaluation

The model for time quality P T is as follows:
P T = w t 1 × P T C O V + w t 2 × P T T L + w t 3 × P T S T A
where wt1 ~ wt3 represent weights, limited by wt1 + wt2 + wt3 = 1, and the values can be determined by actual requirements or the importance of evaluation indicators. PTCOV, PTTL, and PTSTA represent the evaluation results of time coverage, timeliness, and traceability, respectively.
(a)
Time Coverage PTCOV
If data object pi is the lack of content at a certain time point, the time integrity of the data object is affected. Assuming the mapping function F(x|C) represents whether the data object exists under certain conditions, we have:
F x | C = 1 ,     d a t a   e x i s t s   u n d e r   c o n d i t i o n   C 0 ,     e l s e
Thus, the time coverage evaluation PTCOV of dataset P, is as follows:
P T C O V = i = 1,2 , , N ;   j = 1,2 , , K F ( o i | t = t j ) N × K
The value range of PTCOV is (0, 1), where a value closer to 1 indicates a better time coverage of the data product, and vice versa.
(b)
Timeliness P T T L
Timeliness reflects whether the generation of the data is timely, and it can be represented by the difference between the time of data generation and the current time. Assuming the current time is used as the reference time, denoted as t, the timeliness evaluation model PTTL is as follows:
P T T L = 1 t t P t
where tP represents the creation or acquisition time of data P. For the ease of calculation, tP and t can be converted into integers. For example, the time point t0 can be uniformly converted to the time interval from 1 January 1970, 0:00:00 in milliseconds. The value range of PTTL is (0, 1), where a value closer to 1 indicates better timeliness of the dataset, and vice versa.
(c)
Stability P T S T A
Stability measures the volatility and discreteness of data. The dataset is divided into equal data slices based on the time range, and it is categorized into N classes according to object characteristics. Calculate each expectation μi and standard deviation σi of the newly added data within each class and obtain coefficient of variation C·Vi for each class. The overall dataset stability is defined as the average of the coefficients of variation for each class:
S T A = 1 N ( σ i μ i )
The range of STA is (0, ∞), generally applicable when the average value is greater than 0. The smaller STA is, the smaller the data fluctuation and the lower the degree of dispersion, indicating higher stability. To limit the range of PVSTA to [0, 1], select the tanh function for mapping. Therefore, the stability evaluation model PVSTA is:
P T S T A = 2 1 + e 2 S T A 1

3.2.2. Space Quality Evaluation

The evaluation model for space quality is as follows:
P S = w s 1 × P S C O V + w s 2 × P S C O N
where ws1 and ws2 represent weights, and ws1 + ws2 = 1. The values of weights are determined by the application requirement. PSCOV and PSCON represent the evaluation results of spatial coverage and spatial consistency, respectively.
(a)
Spatial Coverage P S C O V
Spatial coverage reflects whether data objects in the data product are missing or redundant. The spatial coverage evaluation model PSCOV is as follows:
P S C O V = c o u n t ( P ) N , 0 < c o u n t ( P ) N 1 c o u n t P N N , N < c o u n t P < 2 N 0 , c o u n t ( P ) 2 N
where the function count(P) refers to the amount of data objects in the dataset. If the value of PSCOV is 1, it indicates that there are no missing or redundant data objects. The closer PSCOV is to 1, the fewer missing or redundant data objects there are, and vice versa.
(b)
Spatial Consistency P S C O N
Since the way of obtaining data and the data standards both vary considerably among different transportation departments and organizations, the form and content of spatial data often have significant differences in geometric aspects. Therefore, in addition to spatial coverage, it is also necessary to check spatial consistency for traffic data.
Spatial consistency includes spatial location consistency, spatial objectives consistency, and spatial relationship consistency [6]. Spatial location consistency refers to the degree of matching in coordinate representation. Spatial objectives consistency refers to the equivalence of object existence, number of digits, shape, size, and spatial details. Spatial relationship consistency refers to topological equivalence and directional equivalence. Among these types of consistency, the relationship consistency is the most important content, with topological relationships dominating.
Assuming oik and ojl represent the kth data object in the ith layer and the lth data object in the jth layer, ηs(oik,ojl) is the spatial consistency check function between data objects oik and ojl. If the topological relationship between objects oik and ojl is consistent with reality, η(oik,ojl) is 1; otherwise, it is 0. The spatial consistency evaluation model PSCON is defined as follows:
P S C O N = i , j = 1,2 , , L N ;   k , l = 1,2 , , N η s o i k , o j l i = 1,2 , , L N ,   j = 1,2 , , L N t f i j
where tfij represents the number of neighborhood object for oik and ojl with topological relation, in the ith and jth layer.

3.2.3. Content Quality Evaluation

The evaluation model for content quality is as follows:
P V = w v 1 × P V C O V + w v 2 × P V A C C + w v 3 × P V E F F + w v 4 × P V C O N + w v 5 × P V T R A
(a)
Attribute Coverage Rate P V C O V
If the attributes of data objects in the data product are missing, it will reduce the usability of the data product. The attribute coverage rate evaluation model PVCOV is as follows:
P V C O V = i = 1,2 , , N ;   j = 1,2 , , M F ( o i | A = A j ) N × M
where F ( o i | A = A j ) is to check the existence of the ith data object at the jth attribute. The P V C O V value closer to 1 indicates a better time coverage of the data product, and vice versa.
(b)
Accuracy P V A C C
Accuracy reflects whether data objects accurately and truthfully describe the application scenario. We suppose the attribute set A = {A1, A2, …, AM} has reference value standard sets R = {R1, R2, …, RM} in this case. Let φ ( ) be the accuracy judgment function. If the value of object oi at attribute Ak satisfies the reference value standard Rk, then φ ( o i k ) is 1; otherwise, it is 0. The accuracy evaluation model PVACC is as follows:
P V A C C = i = 1,2 , , N ;   j = 1,2 , , M φ o i j | R j N × M
where the range of PVACC is [0, 1]. When PVACC is 0, the accuracy of data objects is low; and vice versa.
(c)
Effectiveness P V E F F
Effectiveness can be assessed by customized rules for specific application scenarios, where each rule can be related to one or more conditions. For example, when accessibility is the metric, we should inspect the physical conditions and interfaces for users to access data. The effectiveness evaluation model PVEFF is as follows:
P V E F F = N U N N
where UN represents the number of ineffective data objects.
(d)
Consistency P V C O N
Consistency is used to determine whether the values between different attributes of the same data object are correct and complete. Let Ak and Al be two attributes with consistency relations, and μv(⋅) be the consistency judgment function. If the value of object oi at attributes Ak and Al satisfies the consistency relation, then μ v o i k , o j l is 1; otherwise, it is 0. The consistency evaluation model PVCON is as follows:
P V C O N = i = 1,2 , , N ;   k , l = 1,2 , , M μ v o i k , o j l N × C c M
where the function Cc(M) counts the number of consistent attribute pairs in set A.
(e)
Traceability P V T R A
The traceability evaluation is primarily qualitative [11]. It can be designed to score items that require traceability, and then check whether various traceable elements in the data are provided. If provided by the provider, the corresponding part of score is obtained; otherwise, the score for that item is 0. Finally, the obtained scores are added together to obtain the final evaluation result.

3.3. Assessment Process

Since transportation data covers all aspects of the transportation industry, the evaluation indicators, weights, and results threshold in the transportation data assessment model should be decided by the specific business requirement. In practical applications, after determining the need for data quality assessment, the evaluation of transportation data quality can be divided into the following steps:
(a)
Identify the evaluation dataset: select either the entire data content or a typical data field set as the evaluation object based on business needs.
(b)
Select evaluation indicators: determine the indicators or factors that need to be assessed. The choice of evaluation dimensions can be comprehensive, or to select individual dimensions based on business needs.
(c)
Determine evaluation weights: determine the factors influencing weight allocation, such as data importance, business requirements, expert opinions, etc., and select suitable weighting methods. Common methods for determining weights include the Analytic Hierarchy Process, Delphi method, statistical analysis method, and expert scoring method, etc., which should be chosen according to the content of data evaluation [12]. Continuously improve weight allocation based on feedback and actual results during the evaluation process to ensure the accuracy and effectiveness of the evaluation system.
(d)
Validate and Adjust: Verify whether the chosen indictors and calculated weights align with reality and make adjustments and optimizations as needed. Relevant data and stakeholders’ opinions should be gathered to provide a basis for validation.
(e)
Summarize: record the evaluation results of each dataset, calculate the score of the evaluation object based on the weights and scores of each dataset, and determine whether the data is compliant based on the threshold.

4. Trustworthiness Evaluation for Data Collaborative Interaction of Intermodal Transportation

In the data access session, trustworthiness reflects the degree to which the subject entity meets the object security expectations. It varies with every access behavior. Thus, it is characterized by subjectivity, context dependency, dynamic uncertainty, and temporal lag. Considering the cross-domain interactions of traffic information resources, a hierarchical framework is proposed to inspect entity trustworthiness on different levels. By refining level by level, the evaluation system transforms the trust measurement problem of complex network behavior into an objective, measurable and computable evaluation problem, based on interaction evidence.

4.1. Trustworthiness Assessment Framework for Data Interaction of Intermodal Transportation

4.1.1. Hierarchical Structure

Based on the cross-mode interactions of transportation information resources, a hierarchical entity trust assessment model is proposed, as shown in Figure 3. This framework facilitates a hierarchical approach to comprehensively assess based on the mixed evidence layer, making the evaluation of complex network behaviors more objective and quantifiable. The calculation of trustworthiness consists of three layers: data layer, information system layer, and secure domain layer.
Aside from the multi-level structure, this framework is characterized by the multipart evidence layer. As for the cross-mode interaction of traffic data, trustworthiness is dependent on both the intrinsic properties of the subject entity and its past performances. In order to evaluate the trust of data and entities comprehensively, the measurement of trustworthiness should consist of two parts, i.e., the static trust indicates entity secure state while dynamic trust indicates entity historical access behaviors. Generally, the static trust and the dynamic trust can complement each other, and dynamic trust provides more fine-grained security than the static identity trust. Considering the actual situation of the communication network compared with the frequent data access between systems, the inherent characteristics of the system and security domain are relatively fixed. Therefore, in order to simplify the modeling and calculation, we assume that the static trust is kept in a relatively stable state from beginning, so it is expressed by the initial state. When the entity suffers from network attack or malfunction, which leads to sharp changes in inherent state, it is necessary to reinitialize the evaluation network according to the situation at that moment. Therefore, this framework is based on an abundant evidence layer composed of a static part and dynamic part.
As for different types of evidence, they are dealt with corresponding metrics. For static trust, different evaluation metrics can be used for entity types at different levels, from the perspective of actual security requirements in practical application. Depending on practical considerations, additional evidence types can be introduced, or existing ones may be adjusted to balance feasibility and computational complexity in evidence collection and handling. For dynamic trust, the access success rate is the key indicator.

4.1.2. Operating Principle

When the model is initialized, the self-trustworthiness of the requesting domain is set to the initial trustworthiness, and basic network access control rights are allocated based on trustworthiness. The interaction context is continuously monitored and measured. If at time t there is no new evidence of interaction context compared to time t Δ t , the direct trustworthiness at the current time decays over time. When the direct trustworthiness increment is positive, no punishment is required. However, when the increment is negative, a penalty is applied to the trustworthiness to make it quickly drop below the trust threshold, restricting its access control rights.
During the process of updating and iteration of the trust calculation network, regulation of historical behavior and malicious access behaviors is of great significance [13]. Thus, we introduce the sequence factor, temporal factor and penalty factor to adjust the dynamic changes. The sequence factor inspects historical behaviors, the temporal parameter targets the attenuation with time, and the penalty factor deals with impact of malicious access.
(a)
Sequence factor
The impact of an entity’s historical access behavior on the current trust value varies at different moments. Typically, access behaviors closer to the present have a greater impact on the entity’s trust value, while those that occurred earlier have a smaller impact. Therefore, a sequence decay factor H(k) is introduced, to adjust the influence of sequential access behaviors, expressed as:
H k = k K ρ ,         k = 1,2 , , K
where k is the sequence number of access request, and K is the count of total historical access behaviors. H(k) ∈ (0, 1], ρ ∈ (0, 1], ρ is used to adjust the decay rate, with a larger value leading to faster trustworthiness decay. The sequence factor takes into account the dynamic decay of trustworthiness over access requirements, effectively enhancing the accuracy of trustworthiness calculation.
(b)
Temporal factor
Temporal factor represents the time attenuation coefficient at time t [14]. When the trust of entity remains the same from time t − Δt to t, it is subjected to a time-attenuation penalty. Temporal factor is defined as:
λ t = 1 Δ t × ξ t t 0
where λ(t) ∈ (0, 1), ξ ∈ (0, 1], t0 is the starting time for calculation, t is the current time, and Δt is the time difference between two consecutive calculations. ξ is used to adjust the attenuation rate, with a larger value leading to faster trustworthiness decay. The temporal factor takes the dynamic decay of trustworthiness over time into account, effectively enhancing the accuracy of trustworthiness calculation.
(c)
Penalty factor
For undesirable behaviors in entity interaction, a penalty factor δ is introduced, expressed as:
δ = 1 ,                               T D ( t ) T D ( t 1 ) 0 0 < δ t < 1 , T D ( t ) T D ( t 1 ) < 0  
where δt ∈ (0, 1), and TD is the behavioral trust. When TD decreases at t, a penalty is applied to the trust, and δt is used to adjust the strength of the penalty. A smaller value of δt results in a stronger penalty, while a larger value leads to a milder penalty. The penalty factor is crucial for imposing strict punishment on entities providing false or malicious services, causing them to rapidly decrease below the trust threshold and restricting their access control permissions in the whole network. This effectively curbs the attacks of malicious entities.

4.2. Hierarchical Data Trust Assessment for Data Interaction

4.2.1. Data Trust

The trustworthiness of dataset d is determined by the inherent characteristics of the data. Aside from data quality, the grade is also of great importance since it is based on the universal standard dedicated to importance and sensitivity. Data trust is represented as T d a t a = s P d a t a w s e s , where es represents the trust value determined according to the requirement in P d a t a , and ws represents the corresponding weight. Default ws and es are shown in Table 2.

4.2.2. In-Domain Trust

In-domain trust describes the credibility of a system, from the perspective of other systems in the same secure domain, based on its initial state and all past interaction requests.
At the beginning, the initial trust of the system u is determined by its own security attributes, including the data-layer and system-layer information. In-domain trust of u is expressed as T u 0 = s P s y s t e m w s e s , where es represents the value determined by the security requirements of its own domain Di. The security requirements and weights for u are shown in Table 3.
Within time interval (t − Δt, t), the dynamic trust of system u can be obtained from the access behaviors during this period and is expressed as:
D T D u t Δ t , t = s = 1 n a s H ( s ) s = 1 n a s H ( s ) + s = 1 m 1 b s H ( s ) + s = 1 m 2 c s H ( s )
where n is the number of successful access requests, while m1 and m2 represent the number of failed ones within the entity’s domain and out of this domain, respectively. as is the reward coefficient for successful requests, and as ≥ 1. bs and cs are the punishment coefficients for domain access failures and cross-domain access failures, respectively, with larger punishment coefficients indicating stronger penalties. Typically, the results of cross-domain access also affect the trust level between domains; therefore, the punishment for cross-domain access failures should be greater than that for domain access failures, so cs > bs > 0.
Therefore, the trust of the access system u in its own domain Di is expressed as:
T u t = T u 0 , t = 0 T u t Δ t · λ t , Δ N t Δ t , t = 0 1 Δ t α + t T u t Δ t · δ + Δ t α + t D T D u t , else
where ΔNt−Δt,t = n + m1 + m2 represents the total number of access requests from u during time interval (t − Δt, t), α is the coefficient for historical trust value. λ(t) represents the timeliness factor, and δ represents the penalty factor.

4.2.3. Global Trust

Global trust refers to the credibility of a system, from the perspective of systems in a particular secure domain, based on the initial state of requesting domain, in-domain trust and cross-domain trust, which measures all past interaction requests between these two domains.
At the initial moment, the trust of the requesting domain Di is determined based on environmental requirements and is expressed as: T i 0 = s P d o m a i n w s e s , where es represents the trust value determined by the security requirements of the target domain Dj, and ws is the weight. The default metrics and weights of the target domain for the requesting domain are shown in Table 4.
Within the time range (t − Δt, t), the dynamic cross-domain trust of the behavior of the requesting domain Di in the target domain Dj is expressed as:
I T D i j t Δ t , t = s = 1 N a s H ( s ) s = 1 N a s H ( s ) + s = 1 M c s H ( s )
where N is the total number of successful access requests from any systems in domain Di to target domain Dj, M is the total number of failed ones.
Therefore, the comprehensive trust from requesting domain Di to target domain Dj is represented as:
T i j t = T i 0 , t = 0 T i j t Δ t · λ t , Δ M t Δ t , t = 0 1 Δ t β + t T i j t Δ t · δ + Δ t β + t I T D i j t , else
where Δ M t Δ t , t = N + M represents the total number of access request from Di to Dj in the time period ( t Δ t , t ), β is the coefficient for historical trust value. λ(t) represents the timeliness factor, and δ represents the penalty factor.
In general, the global trust of entity u in the requesting domain Di to the target domain Dj is given by:
T i j u t = T i j t × T u t

5. Data Interactive Visualization Method Based on Temporal Knowledge Graphs

Through graph visualization, suitable data display layouts and interactive methods can be designed according to the need of an intermodal transportation business. It helps information resource managers to perceive global data resources and understand cross-domain interactions. Therefore, a method based on a temporal knowledge graph is raised, and it helps to present massive and complex data interaction relationships intuitively and reasonably. In further research, it will lay the foundation of discovering malicious entities and tracing data flows promptly [15,16].
In this section, the Data Interaction Temporal Knowledge Graph (DITKG) is constructed for transportation cooperation. We first make the definition of DITKG, then introduce the methods for constructing the graph, and finally visualize the DITKG using the Neo4j graph database.

5.1. Formal Definition of DITKG

Knowledge graphs have evolved from the development of graph data technologies. In contrast to traditional tabular storage methods, the knowledge graph data model is more suitable for machines to understand data correlations, aligning with human cognition and memory of the real world. As data volumes grow and business complexities increase, traditional forms of charts and metrics may not satisfy the need for business staff to understand the relationships behind the results. Furthermore, time information is significant to represent the variation trend of domain trustworthiness between two security domains, and situations where the global trustworthiness of a system sharply declines due to continuous malicious behavior, etc. Furthermore, it can provide vital support in the analysis of trustworthiness, predicting cross-domain malicious access, and thus protecting the security of data interactions. Therefore, we proposed a visualization approach based on temporal knowledge graph.
The data interaction temporal knowledge graph is a heterogeneous graph that describes interaction relationships between entities, where access requests are represented by directed edges with timestamps. Each fact in the temporal knowledge graph can be represented by a temporal quadruple (es, r, eo, t), where es is the head entity, r is the relationship between the head entity and the tail entity, eo is the tail entity, and t represents the timestamp of the occurrence. This quadruple overall describes the interaction relationship r occurring between the subject entity es and the object entity eo at time t. In addition, the set of all content in the DITKG is defined as G = (E, R, T), where es, eoE represents the entity set, rR represents the relationship set, and tT represents the timestamp set.

5.2. Schema of Temporal Data Knowledge Graph

The formal definition of the temporal knowledge graph lays the foundation for constructing the graph. The detailed construction involves ontologies, relationships, and attributes of the DITKG.
Since the constructed knowledge graph in this paper is time-varying, there are both time-sensitive and time-insensitive attributes. For example, attributes such as in-domain trust and access count are time-sensitive, closely linked to time, and their values may change at different moments. On the other hand, attributes like data ID and the partition of security domains are time-insensitive; they do not change with time and have fixed values. As shown in Figure 3, dynamic attributes are all related to the interaction behaviors, which are presented as relationships in DITKG. Therefore, attributes of ontologies are time-sensitive while that of relationships are time-insensitive.
A.
Entity and Attribute Definitions
According to the trust assessment framework, ontologies in this graph include data sets, information systems, security domains and transport mode. Ontologies with their attribute as defined in Table 5, which describes the static attributes corresponding to each ontology.
B.
Relationship and Attribute Definitions
Relationships in the DITKG consist of two types: memberships and interactions. Memberships are static without time-varying attributes, referring to the relation “is an element of”. Memberships exist between a system and dataset, a system and a security domain, a security and a transport mode. Interactions describe the access request between subject entity and object entity, and they are the most significant part in DITKG with time-sensitive properties. From the perspective of accessing entity types, interactions are defined between System and Data, System and System, System and Domain, Domain and Domain. To reflect the changes in trust value adequately, interactions between System and Domain are divided into System and Domain to which it belongs, and System and other Domain, corresponding to the in-domain trust and global trust, respectively.
In the process of generating the temporal quadruple knowledge graph, there are two ways to represent time information [13]. One is as a new relationship connecting the subject entity and the object entity, and the other is as an attribute of the relationship itself. In this paper, the treatment of time-sensitive attributes is consistent with the approach used in relation extraction, considering this type of data as four-tuples with time labels [17]. Table 6 describes the relationships and corresponding associated attributes.
In summary, the constructed pattern layer is illustrated in Figure 4. As shown, static properties and relationships are represented in blue, while dynamic ones are in red.

5.3. Construction and Visualization of Temporal Knowledge Graph

Graph visualization involves transforming the originally obtained relational database into a graph database schema based on the schema illustration. Compared to common knowledge graph, the DITKG extends triples into temporal quadruples (es, r, eo, t) to take dynamic temporal information into account, where t provides additional temporal information about when the event, i.e., an access request occurred.
We use the Neo4j graph database to draw the temporal knowledge graph of data interactions. As a graph database, Neo4j stores knowledge in a network form of ontology structure, unlike traditional relational databases that use tabular forms [18]. It visualizes relationships between entities and is one of the most commonly used databases for knowledge graphs. The triple knowledge of Neo4j is usually stored in the “node-edge-node” format, while temporal quadruples need to be stored in DITKG. Therefore, we added the timestamp as an attribute of the relationship in Neo4j when storing. For example, the quadruple (‘AFC’, ‘access_data’, ‘Railway Ticket Reservation Data’, ‘2023/10/19/13/0/0’) would be stored as an ‘access_data’ relationship with the time attribute ‘2023/10/19/13/0/0’. Finally, to improve the intelligibility of the graph, we stipulate that the ontology of the graph is displayed as its own name attribute by default, the static relationships are displayed as types, while the dynamic relationships are displayed as the trust attribute.

6. Application and Analysis

This section verifies the comprehensive trust assessment framework for information resource exchange in intermodal transportation. Based on the scenario of intermodal passenger transport between subway and mainline railway, we first calculate the quality of relevant datasets, to check whether it can meet the demand of the cross-mode standard. And then, the trust of entities is compared in different situations. Finally, the dynamic changes caused by data interaction is visualized by DITKG.
For intermodal passenger transport, the demand of information exchanging mainly focuses on one-ticket booking [19], intelligent passenger guide, and better transfer support at junction station [20]. Some of related entities in subway and mainline railway are shown in Figure 5. In the subway system [21], the production management system (PMS) and production auxiliary systems (PAS) are regarded as the domain of subway operation business [22]. PAS has two significant information systems, i.e., passenger information system (PIS) and auto fare collection (AFC) system. The PIS system utilizes operational information that would be open to the public, through displays at stations, onboard broadcasting and displays, mobile applications, and online websites. The ticketing internet platform (TIP) is to update ticket availability, prices, and seat selection information to purchase tickets. AFC collects data from turnstiles and ticket selling equipment, and aggregates them to a central server, including passenger flow for income clearing, origin–destination passenger flow, cross section passenger flow, and ticket transaction data [23]. In railway system [24], the information systems associated with passenger service are the ticket reservation system (TRS), passenger transport marketing decision-support system (PTDS), passenger service systems (PSS), and passenger transport management system (PTMS). The first three of these belong to the business domain of passenger transport marketing (PTM), and the last one belongs to the transportation production organization (TPO) domain [25].

6.1. Compliance of Data Quality

Taking a two-day ticket transaction dataset as an example, we conduct a quality assessment of the data and use 0.75 as the threshold to check the compliance of the dataset. This dataset is adopted from AFC system of subway transport in city A, where there are a total of 11 subway lines in the city. In this case, the dataset is divided based on the line numbers where the passenger alighted, so that we can compare the data quality between different operating lines.
Firstly, the data feature analysis of subway ticket transaction data is conducted. Due to the fixedness of operating lines and stations, the spatial consistency is always 1. Also, because the data within the subway system is traceable from collection to aggregation, its traceability is considered as 1. The acquisition frequency of ticket transaction data is daily, and the dataset meets the requirements, hence its timeliness is 1. Therefore, the dataset’s quality is primarily examined from metrics such as spatial integrity, temporal integrity, attribute completeness, validity, accuracy, stability, and consistency. The result is shown in Figure 6.
As in Figure 6, it can be observed that the stability of data from various subway lines is generally at a low level, where the time slice for stability evaluation is set to 1 h. This is determined by the traffic patterns in urban transportation, and it varies dramatically from hour to hour. Assuming weights of quality metrics in Section 3.2 are determined by expert scoring method to be w v i = 0.2 i = 1 ,   2 , , 5 ,     w t 1 = 0.6 ,   w s 1 = 0.8 , w S = 0.3 , w T = 0.3 ,   w V = 0.4 , the data quality assessment values for each line can be obtained. Line 10 has the highest value at 0.798, while Line 1 has the lowest value at 0.7432. The data of Line 1 are below the threshold of 0.75, indicating a need for improvement before sharing to other transport modes. The rest of the lines meet the standards.

6.2. Trust Evaluation

In this experiment, we assume that the initial in-domain trust is set to 1 for all systems, and the initial inter-domain trust is also set to 1. The reward coefficient as = 1, the in-domain punishment coefficient bs = 1.5, the inter-domain punishment coefficient cs = 2; α = β = 1; temporal factor λ = 0.999, and penalty δ = 0.98. The highest frequency of access requests is once per second.

6.2.1. Trust of a Subject System to Multiple Object

We assume that in the PAS domain, only AFC can raise cross-domain access request. The AFC system initiates access requests to the PIS server for the first 250 s, with 150 successes and 100 failures. From 251 to 500 s, access requests are made to the TRS in PTM domain. The changes in the in-domain trust and global trust of AFC system, as well as inter-domain trust between PAS and PTM over time, are shown in Figure 7.
Figure 7 illustrates the trust value curve of the AFC system under random success and failure conditions. The experimental results show that the entity’s trust value increases with the count of successful accesses and decreases with the count of failures. Additionally, under the influence of the penalty factor, the overall trend of the curve is downward. In the first 250 s, because there are no inter-domain access requests, the inter-domain trust decays over time due to the temporal factor. Therefore, the difference between the in-domain trust value of the AFC system and the global trust is relatively small. However, in the subsequent 250 s, as cross-domain interactions occur, the inter-domain trust fluctuates greatly, resulting in a gradual widening of the gap between the in-domain trust value and the global trust value.
Figure 8 shows the change in DITKG over time, where the relation “access_data” and trust-related relationships are in orange and red, respectively. For the ease of observation, only relationships in connection with the last interaction happened at the specific moment is visible. For example, AFC accesses the terminal data of PIS at t = 100 s and t = 200 s, so the graphs in (a) and (b) have the same structure with different transient attributes. In this scenario, graphs in (c) and (b) are completely unlike.

6.2.2. Mutual Effect of Multiple In-Domain Systems

To facilitate observation, the history records of access failures and successes are artificially controlled in this case. The AFC system and the PIS system both launch service access requests 500 times to a fixed object, and they may access each other or turn to the TRS in PTM domain. The AFC system fails in request 51 to 150, while the PIS system fails in 201 to 300, and other accesses are successful. The in-domain trust and global trust of both systems are shown in Figure 9, as well as inter-domain trust from PAS to PTM.
Figure 9 illustrates the trust value changes in cases where access objects are different. Firstly, let us examine the case where no cross-domain accesses occur, as shown in (a). As the inter-domain trust value only decays over time, the only influence factor is the access result sequence. Observing the in-domain trust curves of AFC and PIS in (a), it can be seen that the lowest point of the AFC curve is lower than that of the PIS curve. This is because the records of access failures of the AFC system are relatively distant from the current moment compared to PIS, resulting in a higher proportion of access failures relative to the total number of accesses at the specific time. Additionally, at 500 s, the trust of AFC is higher than that of PIS, as the impact of access history records on the trust value of an entity increases with proximity to the current time point.
Furthermore, considering the cases where cross-domain interactions happen, when we compare the results in (d) and (c), the fluctuation trend of the inter-domain trust curve synchronizes only with the in-domain trust value of a single system, indicating it is only related to the system conducting inter-domain accesses. As shown in (b), the fluctuation trend of inter-domain trust value lies between the two in-domain trust curves, indicating its change is correlated with both systems. Therefore, different entities within the same security domain may mutually influence each other through the global trust.
Figure 10 shows the change in DITKG in different scenarios at t = 500 s. Due to the diversity in access objects, the four graphs are totally different in both structure and transient attribute value. Taking (b) as an example, both AFC and PIS request inter-domain accesses, thus it provides the most information about the state of the whole network. Therefore, DITKG is an effective way to reflect the time-varying characteristics of global network state of intermodal transportation.

7. Conclusions and Future Work

This paper focused on the comprehensive trustworthiness between different entities, aiming to break down the data silos and protect the interaction during the operation of intermodal transportation. According to the challenging demand of security and granularity, the hierarchical framework is put forward to evaluate the trust value of different types of the entities in the whole network, where data quality is regarded as a significant part of data trust. Furthermore, a DITKG based on a temporal knowledge graph is discussed as a visualization method of cross-domain interaction. By proving experimentation, the framework can satisfy the demand of data sharing in intermodal transportation. Next, we will validate the data exchange process with real data through the construction of a prototype system. Compared with related work, the results in Table 7 show that this Comprehensive trust assessment framework has advantage in data quality evaluation, hierarchical structure, dynamic updating and visualization. Therefore, the comprehensive trust assessment framework can better meet the data supervision demand of intermodal transportation.
As for future work, there are two aspects in sight. In the short-term, we intend to delve into network security methods and explore how to integrate appropriate secure communication strategies into our framework. This can not only enhance the security of our framework but also improve efficiency; thus, our research can better meet the needs of practical applications while ensuring data security. For our long-term plan, we will take a broader view of the intermodal transport and carry out multidisciplinary research topics, such as urban planning, environmental considerations, human behavior and larger socio-economic issues.

Author Contributions

Conceptualization, Z.M. and Y.W.; methodology, X.G. and P.D.; validation, X.G. and K.X., P.D. and F.K.; formal analysis, F.K.; investigation, X.G. and P.D.; resources, X.G. and F.K.; data curation, K.X. and P.D.; writing—original draft preparation, X.G.; writing—review and editing, K.X., Z.M. and Y.W.; visualization, F.K.; supervision, K.X., Z.M. and Y.W.; project administration, F.K., K.X. and P.D. All authors have read and agreed to the published version of the manuscript.

Funding

The work was supported by Important Project of Scientific and Technical Exploitation Program of CHINA RAILWAY (No. N2023S002).

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Acknowledgments

The authors wish to thank the reviewers for their valuable comments and suggestions concerning this manuscript.

Conflicts of Interest

Authors Xin Geng, Zhisong Mo, Peng Dong and Fanpeng Kong were employed by the companies China Railway Information Technology Group Co., Ltd. and China State Railway Group Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Liu, X.; Jiang, Y.; Tang, Y.; Zhang, Y.; Wang, Z.; Luo, J. Development prospect of intermodal Transportation big data application technology. Big Data Res. 2019, 5, 55–68. [Google Scholar]
  2. Qie, Z.; Chen, L.; Ma, X.; Chen, Z. Research and practice of data quality assessment Framework for intelligent transportation. Police Technol. 2023, 1, 83–87. [Google Scholar]
  3. Mei, S. Research on Key Techniques of Trust Assurance towards Cross-Domain Alliance of Services. Ph.D. Thesis, National University of Defense Technology, Changsha, China, 2014. [Google Scholar]
  4. Ze, K.; Chen, D.; Zhuang, Y. A multilevel dynamic trusted measurement model based on information flow. Comput. Eng. Sci. 2018, 40, 2156–2163. [Google Scholar]
  5. Dong, G.; Chen, Y.; Li, H. Cross-domain Authentication Credibility based on Blockchain in Heterogeneous Environment. Commun. Technol. 2019, 52, 1450–1460. [Google Scholar]
  6. Jiang, H. Research and Verification of Trust Measurement of Multi-Agent Based on Reinforcement Learning. Master’s Thesis, Beijing University of Posts and Telecommunications, Beijing, China, 2022. [Google Scholar]
  7. Imran, M.; Ahmad, A. Enhancing data quality to mine credible patterns. J. Inf. Sci. 2023, 49, 544–564. [Google Scholar] [CrossRef]
  8. Wang, T. On Top-Level Design for China Railway’s Big Data Application & Case Study. China Railw. 2017, 01, 8–16. [Google Scholar]
  9. Liu, Y. The Key Technologies Research of Railway Master Data Management for Big Data Applications. Master’s Thesis, China Academy of Railway Sciences Corporation Limited, Beijing, China, 2018. [Google Scholar]
  10. JT/T 1137-2017; Data Exchange Specification for Management and Service Information System of Urban Transit. Ministry of Transport of the People’s Republic of China: Beijing, China, 2017.
  11. Cai, L.; Zhu, Y. From data quality to data products quality. Big Data 2022, 8, 26–39. [Google Scholar]
  12. Zhang, F. The Research on the Data Quality Produced by Official Statistical Offices and Its’ Government. Master’s Thesis, Hunan University, Changsha, China, 2004. [Google Scholar]
  13. Zhou, Y. Research on Data Quality Evaluation Method Based on Big Data. Mod. Inf. Technol. 2020, 4, 86–89. [Google Scholar]
  14. Liang, H.; Wu, W. Research of trust evaluation model based on dynamic Bayesian network. J. Commun. 2013, 34, 68–76. [Google Scholar]
  15. Ding, W. Research on the Construction and Application of Temporal Academic Knowledge Graph. Master’s Thesis, Northwest Normal University, Xi’an, China, 2023. [Google Scholar]
  16. Zhang, H. Research and Implementation of Investment Decision Based on Temporal Knowledge Graph. Master’s Thesis, Beijing Jiaotong University, Beijing, China, 2022. [Google Scholar]
  17. Chen, J. Ontology-Based Consistent Researches for Multiple Representation of Spatial Data. Master’s Thesis, Central China Normal University, Wuhan, China, 2007. [Google Scholar]
  18. Wang, H.; Qi, G.; Chen, H. Knowledge Graphs: Methods, Practices, and Applications; Beijing Book Co., Inc.: Beijing, China, 2019. [Google Scholar]
  19. Hu, S.; Yu, C.; Yan, J. Ticket system integration scheme for ‘Four networks integration’. Railw. Comput. Appl. 2022, 31, 87–91. [Google Scholar] [CrossRef]
  20. Ma, D.; Guo, Y. Research on Service-oriented Access Control Model Based on Trust Metric and Attribute Constraint. J. Taiyuan Univ. Sci. Technol. 2019, 40, 258–263. [Google Scholar]
  21. T/CCTAS28-2022; Technical Specification for Data Acquisition Platform of Urban Rail Transit. China Communications and Transportation Association: Beijing, China, 2022.
  22. Geng, X.; Wen, Y.; Mo, Z.; Liu, Y. An Access Control Framework for Multilayer Rail Transit Systems Based on Trust and Sensitivity Attributes. Appl. Sci. 2023, 13, 12904. [Google Scholar] [CrossRef]
  23. Gao, F.; Zheng, L.; Gu, J. Hypergraph Based Knowledge Representation and Construction for Polynary and Temporal Relations in Financial Domain. J. Shanxi Univ. (Nat. Sci. Ed.) 2022, 45, 873–883. [Google Scholar]
  24. Xie, R.; Wen, W.; Tang, Q.; Liu, Y.; Xie, G.; Huang, T. Survey on rail transit mobile edge computing network security. J. Commun. 2023, 44, 201–215. [Google Scholar]
  25. He, C.; Zhu, Y. Big Data of Urban Traffic; Shanghai Scientific and Technical Publishers: Shanghai, China, 2015; pp. 4–5. [Google Scholar]
Figure 1. Summary of data exchange contents between different transportation systems.
Figure 1. Summary of data exchange contents between different transportation systems.
Electronics 13 01487 g001
Figure 2. Comprehensive assessment framework for data interactions in intermodal transportation.
Figure 2. Comprehensive assessment framework for data interactions in intermodal transportation.
Electronics 13 01487 g002
Figure 3. Illustration for hierarchical entity trustworthiness assessment framework.
Figure 3. Illustration for hierarchical entity trustworthiness assessment framework.
Electronics 13 01487 g003
Figure 4. Schema of temporal knowledge graph for data interaction in intermodal transportation.
Figure 4. Schema of temporal knowledge graph for data interaction in intermodal transportation.
Electronics 13 01487 g004
Figure 5. Part of related entities to intermodal passenger services in subway and railway.
Figure 5. Part of related entities to intermodal passenger services in subway and railway.
Electronics 13 01487 g005
Figure 6. Quality of transaction data from 11 subway lines.
Figure 6. Quality of transaction data from 11 subway lines.
Electronics 13 01487 g006
Figure 7. Performance of in-domain trust and global trust to PTM domain during 500s of mixed in-domain and inter-domain interaction.
Figure 7. Performance of in-domain trust and global trust to PTM domain during 500s of mixed in-domain and inter-domain interaction.
Electronics 13 01487 g007
Figure 8. Visualization of DITKG in different time: (a) t = 100 s; (b) t = 200 s; (c) t = 300 s; (d) t = 400 s.
Figure 8. Visualization of DITKG in different time: (a) t = 100 s; (b) t = 200 s; (c) t = 300 s; (d) t = 400 s.
Electronics 13 01487 g008aElectronics 13 01487 g008b
Figure 9. Performance of in-domain and global trust of 2 systems in different scenarios: (a) AFC and PIS both access in-domain data; (b) AFC and PIS both access PTM domain data; (c) AFC accesses in-domain data while PIS accesses PTM domain data; (d) PIS accesses in-domain data while AFC accesses PTM domain data.
Figure 9. Performance of in-domain and global trust of 2 systems in different scenarios: (a) AFC and PIS both access in-domain data; (b) AFC and PIS both access PTM domain data; (c) AFC accesses in-domain data while PIS accesses PTM domain data; (d) PIS accesses in-domain data while AFC accesses PTM domain data.
Electronics 13 01487 g009aElectronics 13 01487 g009b
Figure 10. Visualization of DITKG when t=500s in different scenarios: (a) AFC and PIS both access in-domain data; (b) AFC and PIS both access PTM domain data; (c) AFC accesses in-domain data while PIS accesses PTM domain data; (d) PIS accesses in-domain data while AFC accesses PTM domain data.
Figure 10. Visualization of DITKG when t=500s in different scenarios: (a) AFC and PIS both access in-domain data; (b) AFC and PIS both access PTM domain data; (c) AFC accesses in-domain data while PIS accesses PTM domain data; (d) PIS accesses in-domain data while AFC accesses PTM domain data.
Electronics 13 01487 g010aElectronics 13 01487 g010b
Table 1. Quality evaluation metrics for intermodal transportation data.
Table 1. Quality evaluation metrics for intermodal transportation data.
DimensionQuality IndicatorDefinition
Time Time CoverageThe completeness of data objects at various time points described in the dataset.
TimelinessThe significant time difference from the generation to the acquisition and utilization of the data product.
StabilityMeasures the volatility and discreteness of the data with time.
Space Space CoverageThe completeness of data objects included in the space described by the data product.
Spatial ConsistencyThe correctness and completeness of logical relationships between different data objects in space.
Content ConsistencyThe correctness and completeness of logical relationships between data objects in different attributes or between different objects.
AccuracyThe degree of correctness, reliability, and distinguishability of the data product.
IntegrityThe completeness of the data product in terms of attribute sets.
ValidityDescribes whether the model or data satisfies user-defined conditions.
TraceabilityWhether the data product provides a description of the operations and transformations undergone during its lifecycle.
Table 2. Requirement of security for data.
Table 2. Requirement of security for data.
Data Security Requirements PdataWeight wsEvaluation Value es
Time quality0.2PT
Space quality0.2PS
Content quality0.2PV
Data grade0.4Five levels {0.2, 0.4, 0.6, 0.8, 1}
Table 3. Initial requirement of security for system.
Table 3. Initial requirement of security for system.
System Security Requirements PsystemWeight wsAssessment Value es
The identity information integrity 0.2In case of complete1; otherwise 0.
The system secure grade0.3Five levels {0.2, 0.4, 0.6, 0.8, 1}
The average quality of data provided by u0.4 s = 1 a s Q s s
Table 4. Initial requirement of security for domain.
Table 4. Initial requirement of security for domain.
Domain Security Requirements PdomainWeight wsEvaluation es
Integrity of system authentication requirements within Di0.4In case of complete1;
otherwise 0.
Integrity of Di after initializing0.3In case of complete1;
otherwise 0.
Integrity of historical access behavior log within Di0.1In case of complete1;
otherwise 0.
Integrity of the trust management point within Di0.1In case of complete1;
otherwise 0.
Integrity of the policy information point in Di0.1In case of complete1;
otherwise 0.
Table 5. Temporal knowledge graph ontology and attribute definition.
Table 5. Temporal knowledge graph ontology and attribute definition.
EntityAttributeDescription
DataData_IDDataset ID
Data_nameDataset name
Data_qualityQuality of a dataset
Data_stateInitial state of a dataset
SystemSys_IDSystem ID
Sys_nameSystem name
Sys_stateInitial state of an information system
DomainDomn_IDDomain ID
Domn_nameDomain name
Domn_stateInitial state of a security domain
TransportTransport_IDID of a transport mode
Transport_nameName of a transport mode
Table 6. Relationships and corresponding associated attributes of knowledge graph.
Table 6. Relationships and corresponding associated attributes of knowledge graph.
RelationshipSubjectObjectAttributeDescription
con_dataSystemData--
con_sysDomainSystem--
con_domnTransportDomain--
access_dataSystemDataresultThe latest result of access to object by subject in Boolean.
countThe total number of access requests by subject to object.
access_sysSystemSystemsucs_rateThe probability of access success among all requests by subject to any dataset of the object system.
countThe total number of access requests to any dataset of object system.
access_indomnSystemDomainindomn_trustThe value of in-domain trust.
countThe total number of in-domain access requests by subject.
access_outdomnSystemDomainglobal_trustThe value of global trust.
countThe total number of out-of-domain access requests by subject.
inter_domnDomainDomaininter_trustThe inter-domain trust from subject to object.
countThe total number of cross-domain access requests by systems in subject domain.
Table 7. The characteristics comparison of comprehensive trust assessment mechanism in this paper with related work.
Table 7. The characteristics comparison of comprehensive trust assessment mechanism in this paper with related work.
Data QualityHierarchical StructureDynamic UpdateVisualization
Multilevel quality model [2]
Service trust model [3]
Information-flow-theory based model [4]
Block-chain-based model [5]
Trust-based logical model [6]
Comprehensive trust assessment
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Geng, X.; Wen, Y.; Mo, Z.; Dong, P.; Kong, F.; Xiong, K. On the Evaluation Framework of Comprehensive Trust for Data Interaction in Intermodal Transport. Electronics 2024, 13, 1487. https://doi.org/10.3390/electronics13081487

AMA Style

Geng X, Wen Y, Mo Z, Dong P, Kong F, Xiong K. On the Evaluation Framework of Comprehensive Trust for Data Interaction in Intermodal Transport. Electronics. 2024; 13(8):1487. https://doi.org/10.3390/electronics13081487

Chicago/Turabian Style

Geng, Xin, Yinghong Wen, Zhisong Mo, Peng Dong, Fanpeng Kong, and Ke Xiong. 2024. "On the Evaluation Framework of Comprehensive Trust for Data Interaction in Intermodal Transport" Electronics 13, no. 8: 1487. https://doi.org/10.3390/electronics13081487

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop