INFORMATION CHANGE THE WORLD

International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.7, No.4, Jul. 2017

Trust Models in Cloud Computing: A Review

Full Text (PDF, 562KB), PP.14-27


Views:68   Downloads:3

Author(s)

Ritu, Sukhchandan Randhawa, Sushma Jain

Index Terms

Trust model;Cloud Computing;Resource Scheduling;Quality of Service and Reliability

Abstract

It is common to hear that big or small organizations are moving to cloud computing for its scalability and cost savings. But, how do you decide which cloud provider to trust? Trust is a vital factor, especially for service oriented systems in the area of Information Technology and Security. Several issues have been raised by enterprises and individuals concerning the reliability of the cloud resources. In cloud computing, trust helps the consumer to choose the service of a cloud service provider for storing and processing their sensitive information. In this paper, a methodical literature analysis of trust management and existing trust models is presented to evaluate trust based on various QoS parameters. Key research issues and future research directions in existing literature are also suggested. 

Cite This Paper

Ritu, Sukhchandan Randhawa, Sushma Jain,"Trust Models in Cloud Computing: A Review", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.7, No.4, pp.14-27, 2017.DOI: 10.5815/ijwmt.2017.04.02

Reference

[1]Cloud Computing Tutorial, [Online], Available: http://www.tutorialspoint.com/cloud_computing/cloud_computing_tutorial.pdf

[2]R. N. Calheiros, R. Ranjan, A. Beloglazov, C.A. De Rose, and R. Buyya., “ CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms,” Software: Practice and Experience, pp.23-50, 2011.

[3]R. Buyya, C.S. Yeo, S. Venugopal , J. Broberg, I. Brandic., “ Cloud computing and emerging IT platforms: Vision, hype,and reality for delivering computing as the 5th utility,” Future Generation Computer Systems; pp. 599–616, 2009.

[4]Q. Zhang, L. Cheng, and R. Boutaba., “Cloud computing: state-of-the-art and research challenges,” In Journal of internet services and applications, pp.7-18, 2010.

[5]Tanvir Ahmed, "Cloud Computing a Solution for Globalization", International Journal of Education and Management Engineering(IJEME), Vol.6, No.4, pp.30-38, 2016.

[6]J. Huang and D.M. Nicol., “Trust mechanisms for cloud computing,” .Journal of Cloud Computing, pp.1-14, 2013.

[7]D. Nicol, J. Huang., “A formal-semantiics-based calculus of trust,” In Internet Computer Sytems IEEE, pp. 38–46, 2010. 

[8]J. Huang, M.S. Fox., “An ontology of trust: formal semantics and transitivity,” In proceedings of the ICEC, New York, NY, USA, pp. 259–270, 2006.

[9]M. Firdhous, O. Ghazali, and S. Hassan., “Trust management in cloud computing: a critical review,” The International Journal on Advances in ICT for Emerging Regions, 2012’

[10]Manpreet kaur, Hardeep Singh,"A Review of Cloud Computing Security Issues", International Journal of Education and Management Engineering(IJEME), Vol.5, No.5, pp.32-41, 2015.

[11]H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato, "A Survey of Trust and Reputation Management in Cloud Systems in Wireless Communications", IEEE, vol. 98, pp. 1755-1772, 2010.

[12]Z. Gan, J. He, and Q. Ding, "Trust relationship modelling in e-commerce-based social network," In International conference on computational intelligence and security, Beijing, China., pp. 206-210, 2009.

[13]D. McKnight and N. Chervany, "Conceptualizing Trust: A Typology and E-Commerce Customer Relationships Model," in proceedings of 34th Hawaii International Conference on System Sciences, Island of Maui, HI, USA, 2001.

[14]D. Paoli, Stefano and Gangdharan, G.R. and Kerr, Aphra and D'Andrea, Vincenzo and Serrano, Martin and Botvich, Dmitri, "Toward trust as result: An interdisciplinary approach," In Proceedings of ALPIS, Sprouts: Working Papers on Information Systems, vol. 10, no. 8, pp. 1-6, 2010.

[15]J. Habibi, M. Akhoondi, and M. Sayyadi, "Towards a Novel model for inferriing trust in heterogeneous systems of social networks," In proceedings of 2nd Asia International Conference on Modelling & Simulation., Kuala Lumpur, Malaysia,. pp. 52-58, 2008.

[16]G. Zhu, H. Huang, and S. Jin, "Revisiting trust and reputation in multi-agent systems," In proceedings of Inter-national Colloquium on Computing, Communication, Control, and Management (ISECSM), Guangzhou, Chiina, pp. 424-429, 2008.

[17]L. Mui, "A Computational models of trust and reputation:: agents, evolutionary games,, and social networks.," Boston, USA, PhD Thesis 2002.

[18]Q. Zhang, T. Yu, and K. Irwin, "A Classification Scheme for Trust Functions in Reputation-Based Trust Management," In International Workshop on Trust, Security, and Reputation on the Semantic Web, Hiroshima, Japan, 2004.

[19]S.K. Chong, J. Abawajy, M. Ahmad, and I.R.A. Hamid., “Enhancing Trust Management in Cloud Environment,” Procedia-Social and Behavioral Sciences, pp.314-321, 2014.

[20]I. Foster, Y. Zhao, I. Raicu, and S. Lu., “Cloud computing and grid computing 360-degree 

[21]P.D. Manuel, S.T Selvi, and M.E Barr., “Trust management system for grid and cloud resources,” In proceedings of First International Conference on Advanced Computing, ICAC, pp. 176-181, IEEE, 2009.

[22]P. Varalakshmi, S.T. Selvi, A.J Ashraf, and K. Karthick., “B-tree based trust model for resource selection in grid,” In proceedings of International Conference on Signal Processing, Communications and Networking, ICSCN'07, pp. 222-227, 2007.

[23]J. Abawajy., “Establishing trust in hybrid cloud computing environments,” In proceedings of 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, pp. 118-125, 2011.

[24]W. Han-Zhang and H. Liu-Sheng., October., “An improved trusted cloud computing platform model based on DAA and privacy CA scheme,” In proceedings of International Conference on computer Application and System Modeling (ICCASM), IEEE, Vol. 13, pp.13-33, 2010.

[25]K. Hwang, S. Kulkareni, and Y. Hu. ,“Cloud security with virtualized defense and reputation-based trust management,” In proceedings of Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC'09, IEEE, pp. 717-722, 2009.

[26]Q. Zhang, L. Cheng, and R. Boutaba., “Cloud computing: state-of-the-art and research challenges,” The Journal of Internet Services and Applications, pp. 7-18, 2010. 

[27]S. Pearson., “Privacy, security and trust in cloud computing,” In proceedings of Privacy and Security for Cloud Computing, Springer London. pp. 3-42, 2012. 

[28]D. Zissis, and D. Lekkas, “Addressing cloud computing security issues,” In Future Generation computer systems, pp. 583-592, 2012.

[29]M. Firdhous, O. Ghazali, and S. Hassan., “Trust management in cloud computing: a critical review,” In the International Journal on Advances in ICT for Emerging Regions.2012

[30]J. Huang and D.M. Nicol., “Trust mechanisms for cloud computing,” .Journal of Cloud Computing: Advances, Systems and Applications, pp. 1-14, 2013. 

[31]X. Sun, G. Chang and F. Li, “A trust management model to enhance security of cloud computing environments,” In proceedings of Second International Conference on Networking and Distributed Computing (ICNDC) IEEE, pp. 244-248, 2011. 

[32]L. Gu, C. Wang, Y. Zhang, J. Zhong, and Z. Ni., “Trust Model in Cloud Computing Environment Based on Fuzzy Theory,” International Journal of Computers Communications & Control, pp. 570-583, 2014. 

[33]H. Xia, Z. Jia, and E.H. Sha., “Research of trust model based on fuzzy theory in mobile ad hoc networks.” Information Security, IET, pp. 88-103, 2014. 

[34]S. Wang, L. Zhang, N. Ma, and S. Wang., “An evaluation approach of subjective trust based on cloud model,” In proceedings of International Conference on Computer Science and Software Engineering, IEEE, pp.1062-1068, 2008.