Research on Reputation and Risk Evaluation-Trust for Cloud Environment

Article Preview

Abstract:

This paper which starts from the characteristics of human social trust relationship, researches the trust in cloud computing environment. At present, the commercial cloud environment exist two main safe problems: one is the cloud platform trust security problems in their own special environment, the second is the security issues on the network of cheating, false, malicious ads and spam trust security . Aiming at solving this problem, on the basis of the existing trust models, this paper studies the cloud environment trust models according to the characteristics of the cloud environment, constructs a model of trust in the cloud environmentReputation and Risk Evaluation-Trust Model (RRE-Trust), and improves the trust evaluation algorithm. Finally, the experiment results show that, compared with the existing trust models, the proposed evaluate method of this model is closer to the real service behavior of service providers, resist effectively all kinds of malicious behaviors, shows a good robustness and ability in recognize.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1331-1335

Citation:

Online since:

January 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Marios D, Dimitrios D, Pankaj K, et al. Cloud computing: distributedinternet computing for it and scientific research. IEEE Internet Computing . (2009).

Google Scholar

[2] Wei Jin-peng, Zhang Xiao-lan, Glenn Ammons. Managing securi-ty of virtual machine images in a cloud environment. Proceed-ings of the 2009 ACM Workshop on Cloud Computing Security . (2009).

DOI: 10.1145/1655008.1655021

Google Scholar

[3] Y. Wang,J. Vassileva. Trust and Reputation Model in Peer-to-Peer Networks. Third International Conference on Peer-to-Peer Computing (P2P'03), IEEE . (2003).

DOI: 10.1109/ptp.2003.1231515

Google Scholar

[4] Ninghui Li, Mitchell C J, Winsborough H W. Design of a Role-based Trust-management Framework[C. In: Proceedings of 2002 IEEE Symposium on Security and Privacy, IEEE Computer Socitey Press, 2002-05: 114~130.

DOI: 10.1109/secpri.2002.1004366

Google Scholar

[5] Ninghui Li, Mitchell C J. RT: A Role-based Trust-management Framework[C]. In: The Third DARPA Information Survivability Conference and Exposition(DISCWEX Ⅲ),2003-04.

DOI: 10.1109/discex.2003.1194885

Google Scholar

[6] Wang Y, Vassileva J. Bayesian network-based trust model. Proceedings of IEEE/ WIC International Conference on Web Intelligence (WI'2003) . (2003).

DOI: 10.1109/wi.2003.1241218

Google Scholar

[7] E.W.T. Ngai F.K.T. Wat. Fuzzy decision support system for risk analysis in e-commerce development. Decision Support . (2005).

DOI: 10.1016/j.dss.2003.12.002

Google Scholar

[8] Brammer, Stephen J, Pavelin, Stephen. Corporate Reputation and Social Performance: The Importance of Fit. Journal of Management . (2006).

Google Scholar

[9] Kinateder M. A Privacy-Enhanced Peer-to-Peer Reputation System. Proceedings of the 4th International Conference on Electronic Commerce and Web Technologies . (2003).

DOI: 10.1007/978-3-540-45229-4_21

Google Scholar

[10] Barnett M. L, Jermier J. M, Lafferty B. A. Corporate reputation: The definitional landscape[J]. Corporate Reputation Review . (2006).

DOI: 10.1057/palgrave.crr.1550012

Google Scholar