IJCNIS Vol. 7, No. 5, 8 Apr. 2015
Cover page and Table of Contents: PDF (size: 543KB)
Full Text (PDF, 543KB), PP.41-50
Views: 0 Downloads: 0
Trust, Cloud Computing, service selection, Cloud Service Provider, Certain Logic, Direct Trust, Recommended Trust
Cloud Computing refers to network-based service provided by a large number of computers, sharing computing and storage resources. Combined with on-demand provisioning mechanisms and relied on a pay-per-use business model.
The Cloud Computing offers the possibilities to scale rapidly, to store data remotely and to share services in a dynamic environment. However, these benefits can be seen as weaknesses for assuring trust, and providing confidence to the users of service. In this case, some traditional mechanisms to guarantee reliable services are no longer suitable or dynamic enough, and new models need to be developed to fit this paradigm.
This study describes the assessment of the trust in the context of Cloud Computing, proposes a new trust model adapted to Cloud environments, and shows some experiments in regards of the proposed solution.
Fatima Zohra Filali, Belabbes Yagoubi, "Global Trust: A Trust Model for Cloud Service Selection ", International Journal of Computer Network and Information Security(IJCNIS), vol.7, no.5, pp.41-50, 2015. DOI:10.5815/ijcnis.2015.05.06
[1]Kamal K. Bharadwaj and Mohammad Yahya H. Al-Shamri. Fuzzy computational models for trust and reputation systems. Electronic Commerce Research and Applications, 8(1):37-47, 2009.
[2]Sergey Brin and Lawrence Page. Reprint of:The anatomy of a large-scale hypertextual web search engine. Computer Networks, 56(18):3825-3833, 2012.
[3]Diogo A. B. Fernandes, Liliana F. B. Soares, Joào V. P. Gomes, Màrio M. Freire, and Pedro R. M. Inàcio. Security issues in cloud environments: a survey. Int. J. Inf. Sec., 13(2):113-170, 2014.
[4]Saurabh Kumar Garg, Steven Versteeg, and Rajkumar Buyya. A framework for ranking of cloud computing services. Future Generation Comp. Syst., 29(4):1012-1023, 2013.
[5]Guangjie Han, Jinfang Jiang, Lei Shu, Jianwei Niu, and Han-Chieh Chao. Management and applications of trust in wireless sensor networks: A survey. J. Comput. Syst. Sci., 80(3):602-617, 2014.
[6]Jin Huang, Feiping Nie, Heng Huang, and Yi-Cheng Tu. Trust prediction via aggregating heterogeneous social networks. In 21st ACM International Conference on Information and Knowledge Management, CIKM'12, Maui, HI, USA, October 29 - November 02, 2012, pages 1774-1778, 2012.
[7]Naima Iltaf and Abdul Ghafoor. A fuzzy based credibility evaluation of recommended trust in pervasive computing environment. In 10th IEEE Consumer Communications and Networking Conference, CCNC 2013, Las Vegas, NV, USA, January 11-14, 2013, pages 617-620, 2013.
[8]Audun J?sang, Elizabeth Gray, and Michael Kinateder. Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems, 4(2):139-161, 2006.
[9]Audun J?sang, Ross Hayward, and Simon Pope. Trust network analysis with subjective logic. In Computer Science 2006, Twenty-Nineth Australasian Computer Science Conference (ACSC2006), Hobart, Tasmania, Australia, January 16-19 2006, pages 85-94, 2006.
[10]Audun J?sang, Roslan Ismail, and Colin Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2):618-644, 2007.
[11]Audun J?sang. A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge- Based Systems, 9(3):279-212, 2001.
[12]Audun J?sang. Subjective logic. Technical report, University of Oslo, 2013.
[13]Sepandar D. Kamvar, Mario T. Schlosser, and Hector Garcia-Molina. The eigentrust algorithm for reputation management in P2P networks. In Proceedings of the Twelfth International World Wide Web Conference, WWW 2003, Budapest, Hungary, May 20-24, 2003, pages 640-651, 2003.
[14]Ronny Lempel and Shlomo Moran. The stochastic approach for link-structure analysis (SALSA) and the TKC effect. Computer Networks, 33(1-6):387-401, 2000.
[15]Paul Manuel. A trust model of cloud computing based on quality of service. Annals of Operations Research, pages 1-12, 2013.
[16]Stephen Paul Marsh. Formalising trust as a computational concept. Technical report, 1994.
[17]Tim Muller and Patrick Schweitzer. On beta models with trust chains. In Trust Management VII - 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings, pages 49-65, 2013.
[18]Talal H. Noor, Quan Z. Sheng, Sherali Zeadally, and Jian Yu. Trust management of services in cloud environments: Obstacles and solutions. ACM Comput. Surv. 46(1):12, 2013.
[19]Siani Pearson and Azzedine Benameur. Privacy, security and trust issues arising from cloud computing. In Cloud Computing, Second International Conference, CloudCom 2010, November 30 - December 3, 2010, Indianapolis, Indiana, USA, Proceedings, pages 693-702, 2010.
[20]Pramod S. Pawar, Muttukrishnan Rajarajan, Srijith Krishnan Nair, and Andrea Zisman. Trust model for optimized cloud services. In Trust Management VI - 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings, pages 97-112, 2012.
[21]Sebastian Ries, Sheikh Mahbub Habib, Max Müuhlh?user, and Vijay Varadharajan. Certainlogic: A logic for modeling trust and uncertainty - (short paper). In Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings, pages 254-261, 2011.
[22]Paul Resnick and Richard Zeckhauser. Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay's Reputation System. Elsevier Science, November 2002.
[23]Sebastian Ries. Extending bayesian trust models regarding context-dependence and user friendly representation. In Proceedings of the ACM SAC, New York, USA, 2009.
[24]Shanshan Song, Kai Hwang, and Yu-Kwong Kwok. Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling. IEEE Trans. Computers, 55(6):703-719, 2006.
[25]Shanshan Song, Kai Hwang, Runfang Zhou, and Yu-Kwong Kwok. Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing, 9(6):24-34, 2005.
[26]S. Subashini and V. Kavitha. A survey on security issues in service delivery models of cloud computing. J. Network and Computer Applications, 34(1):1-11, 2011.
[27]Wanita Sherchan, Surya Nepal, and Cécile Paris. A survey of trust in social networks. ACM Comput. Surv., 45(4):47, 2013.
[28]Ahmad-Reza Sadeghi and Christian Stüble. Property-based attestation for computing platforms: caring about properties, not mechanisms. In Proceedings of the New Security Paradigms Workshop 2004, September 20-23, 2004, Nova Scotia, Canada, pages 67-77, 2004.
[29]Antonino Simone, Boris Skoric, and Nicola Zannone. Flow-based reputation: More than just ranking. International Journal of Information Technology and Decision Making, 11(3):551-578, 2012.
[30]Adel Nadjaran Toosi, Rodrigo N. Calheiros, and Rajkumar Buyya. Interconnected cloud computing environments: Challenges, taxonomy, and survey. ACM Comput. Surv., 47(1):7, 2014.
[31]Mozhgan Tavakolifard and Svein J. Knapskog. A probabilistic reputation algorithm for decentralized multi-agent environments. Electr. Notes Theor. Comput. Sci., 244:139-149, 2009.
[32]W. T. Luke Teacy, Michael Luck, Alex Rogers, and Nicholas R. Jennings. An efficient and versatile approach to trust and reputation using hierarchical Bayesian modelling. Artif. Intell., 193:149-185, 2012.
[33]Ton van Deursen, Paul Koster, and Milan Petkovic. Hedaquin: A reputation-based health data quality indicator. Electr. Notes Theor. Comput. Sci., 197(2):159-167, 2008.
[34]Andrew Whitby, Audun JAsang, and Jadwiga Indulska. Filtering Out Unfair Ratings in Bayesian Reputation Systems. 2004.
[35]Yonghong Wang and Munindar P. Singh. Trust representation and aggregation in a distributed agent system. In Proceedings of the 21st National Conference on Artificial Intelligence - Volume 2, AAAI'06, pages 1425-1430. AAAI Press, 2006.
[36]Yanchao Zhang and Yuguang Fang. A fine grained reputation system for reliable service selection in peer-to-peer networks. IEEE Trans. Parallel Distrib. Syst., 18(8):1134-1145, 2007.
[37]Partha Sarathi Banerjee, J. Paulchoudhury, S. R. Bhadra Chaudhuri. Fuzzy Membership Function in a Trust Based AODV for MANET. Intern. Journal of Computer Network and Information Security (IJCNIS), 5(12), 27. 2013.
[38]Calheiros, R. N., Ranjan, R., Beloglazov, A., De Rose, C. A., & Buyya, R. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Practice and Experience, 41(1), 23-50. 2011.