A Approach of Credibility-Based Trust Management Service in Cloud Environments

Article Preview

Abstract:

Trust management is one of the most challenging issues in the emerging cloud computing. A distributed way is adopted to manage and store trust feedbacks data. We propose a credibility-based trust management model that not only distinguishes between credible trust feedbacks, but also has the ability to detect the malicious trust feedbacks from attackers .On this basis, we also present a replication determination model that dynamically decides the optimal replica number of the trust management service so that the trust management service can be always maintained at a desired availability level. The research results have been validated by experimental results.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1771-1778

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Armbrust, M., et al.: A View of Cloud Computing. Communication of the ACM 53(4), 50–58 (2010).

Google Scholar

[2] Hoffman, K., Zage, D., Nita-Rotaru, C.: A Survey of Attack and Defense Techniques for Reputation Systems. ACM Computing Surveys (CSUR) 42(1), 1–31(2009).

DOI: 10.1145/1592451.1592452

Google Scholar

[3] Jφsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43(2), 618–644 (2007).

DOI: 10.1016/j.dss.2005.05.019

Google Scholar

[4] Wang, Y., Vassileva, J.: Toward Trust and Reputation Based Web Service Selection: A Survey. International Transactions on Systems Science and Applications 3(2), 118–132 (2007).

Google Scholar

[5] Brandic, I., Dustdar, S., Anstett, T., Schumm, D., Leymann, F., Konrad, R.: Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds. In: Proc. of IEEE 3rd Int. Conf. on Cloud Computing (CMOUD 2010), Miami, Florida, USA (July 2010).

DOI: 10.1109/cloud.2010.42

Google Scholar

[6] Manuel., Thamarai Selvi, S., Barr, M.E.: Trust Management System for Grid and Cloud Resources. In: Proc. of the 1st Int. Conf. on Advanced Computing(ICAC 2009), Chennai, India (December 2009).

DOI: 10.1109/icadvc.2009.5378187

Google Scholar

[7] Hwang, K., Mi, D.: Trusted Cloud Computing with Secure Resources and Data Coloring. IEEE Internet Computing 14(5), 14–22 (2010).

DOI: 10.1109/mic.2010.86

Google Scholar

[8] Chen, K., Hwang, K., Chen, G.: Heuristic Discovery of Rome-Based Trust Chains in Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems 20(1), 83–96 (2008).

DOI: 10.1109/tpds.2008.60

Google Scholar

[9] Conner, W., Iyengar, A., Mikamsen, T., Rouvemmou, I., Nahrstedt, K.: A Trust Management Framework for Service-Oriented Environments. In: Proc. of the 18th Int. Conf. on World Wide Web (WWW 2009), Madrid, Spain (April 2009).

DOI: 10.1145/1526709.1526829

Google Scholar

[10] Skopik, F., Schall, D., Dustdar, S.: Trustworthy Interaction Balancing in Mixed Service-Oriented Systems. In: Proc. of ACM 25th Symp. on Applied Computing (SAC 2010), Sierre, Switzerland (March 2010).

DOI: 10.1145/1774088.1774255

Google Scholar

[11] Malik, Z., Bouguettaya, A.: RATE Web: Reputation Assessment for Trust Establishment Among Web services. The VMDB Journal 18(4), 885–911 (2009).

DOI: 10.1007/s00778-009-0138-1

Google Scholar

[12] Weng, J., Miao, C.Y., Goh, A.: Protecting Online Rating Systems from Unfair Ratings. In: Katsikas, S.K., L'opez, J., Pernul, G. (eds. ) TrustBus 2005. LNCS, vol. 3592, p.50–59. Springer, Heidelberg (2005).

DOI: 10.1007/11537878_6

Google Scholar

[13] Jφsang, A., Quattrociocchi, W.: Advanced Features in Bayesian Reputation Systems. In: Fischer-Hubner, S., Lambrinoudakis, C., Pernul, G. (eds. ) TrustBus 2009. LNCS, vol. 5695, p.105–114. Springer, Heidelberg (2009).

Google Scholar

[14] Malik, Z., Bouguettaya, A.: Rater Credibility Assessment in Web Services Interactions. World Wide Web 12(1), 3–25 (2009).

DOI: 10.1007/s11280-008-0056-y

Google Scholar

[15] Sheth, A.P., Gomadam, K., Lathem, J.: SA-REST: Semantically Interoperable and Easier-to-Use Services and Mashups. IEEE Internet Computing 11(6), 84–87 (2007).

DOI: 10.1109/mic.2007.133

Google Scholar

[16] Douceur, J.R.: The Sybil Attack. In: Druschem, P., Kaashoek, M.F., Rowstron, A. (eds. ) IPTPS 2002. MNCS, vol. 2429, p.251–260. Springer, Heidelberg (2002).

Google Scholar

[17] NetLogo: Netlogo home page (2011), http: /ccm. northwestern. edu/netmogo/(accessed March 1, 2011).

Google Scholar

[18] Massa, P., Avesani, P.: Trust Metrics in Recommender Systems. In: Computing with Social Trust. Human-Computer Interaction Series, p.259–285. Springer, London (2009).

DOI: 10.1007/978-1-84800-356-9_10

Google Scholar