Abstract
Where IoT and Cloud Computing are revolutionizing today’s ecosystem, they also cause alarming security and privacy issues. As a continuum of devices and objects are interconnected with each other in order to share data and information. It is really important to evaluate the trustworthiness of these devices/objects, whether they are trustworthy or malicious. In this work, we propose a novel Trust and Reputation (TR) based model to outsource malicious users in a Fog-based IoT (FIoT). In our model, we used a multi-source trust evaluation by taking into account of the reputation of participating nodes. We use the feedback system to make the trust system reliable and trustworthy. We evaluate our model with simulations and the result shows the effectiveness of TRFIoT.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Fog Computing. https://www.webopedia.com/TERM/F/Fog-computing.html
Fog Computing and the Internet of Things Extend the Cloud to Where the Things Are. https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf
The NIST Definition of Fog Computing. https://csrc.nist.gov/csrc/media/publications/sp/800-191/draft/documents/sp800-191-draft.pdf
Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 4662(c), 1 (2017)
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on Internet of Things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4662(c), 1 (2017)
Wang, S., Hu, X., Yu, P.S., Li, Z.: MMRate: inferring multi-aspect diffusion networks with multi-pattern cascades. In: KDD, pp. 1246–1255 (2014)
Wang, S., Xie, S., Zhang, X., Li, Z., Yu P.S., Shu, X.: Future influence ranking of scientific literature. In: SDM, pp. 749–757 (2014)
Chiang, M., Zhang, T.: Fog and IoT an overview of research opportunities. IEEE Internet Things J. 3(6), 854–864 (2016)
Jalali, F., Khodadustan, S., Gray, C., Hinton, K., Suits, F.: Greening IoT with fog a survey. In: IEEE International Conference Edge Computing, pp. 25–31. IEEE (2017)
Wang, S., He, L., Stenneth, L., Yu, P.S., Li, Z., Huang, Z.: Estimating urban traffic congestions with multi-sourced data. In: MDM, pp. 82–91 (2016)
Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: Federated Conference on Computer Science and Information Systems, Warsaw, pp. 1–8 (2014)
Alhamad, M., Dillon, T., Chang, E.: SLA-based trust model for cloud computing. In: 13th International Conference Network-Based Information System, pp. 321–324 (2010)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. In: Future Generation Computer Systems, vol. 28, no. 3, pp. 583–592 (2012)
Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7–18 (2010)
Xiao, H., Sidhu, N., Christianson, B.: Guarantor and reputation based trust model for social Internet of Things. In: International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, pp. 600–605 (2015)
Kokoris-Kogias, E., Voutyras, O., Varvarigou, T.: TRM-SIoT: a scalable hybrid trust and reputation model for the social Internet of Things. In: IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), Berlin, pp. 1–9 (2016)
Fang, W., Zhang, C., Shi, Z., Zhao, Q., Shan, L.: BTRES Beta-based Trust and Reputation Evaluation System for wireless sensor networks. J. Netw. Comput. Appl. 59, 88–94 (2016)
Chen, I.R., Guo, J., Bao, F.: Trust management for SOA-based IoT and its application to service composition. IEEE Trans. Serv. Comput. 9(3), 482–495 (2016)
Xiong L., Liu L., Society I. C.: Peertrust supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16(7), 843–857 (2004)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Proceeding 12th International Conference World Wide Web, no. 03, p. 640 (2003)
McKnight, D.H., Chervany, N.L.: The Meanings of Trust. In: Technical Report MISRC Working Paper Series, pp. 96–04. University of Minnesota, Management Information Systems Research Center (1996)
Gambetta, D.: Can we trust trust?. In: Trust Making and Breaking Cooperative Relations, pp. 213–238 . Basil Blackwell, Oxford (1990)
Audun, J., Roslan, I., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)
Hu, P., Ning, H., Qiu, T., Song, H., Wang, Y., Yao, X.: Security and privacy preservation scheme of face identification and resolution model using fog computing in Internet of Things. IEEE Internet Things J. 4, 113 (2017)
Ibrahim, M.H.: Octopus an edge-fog mutual authentication scheme. Int. J. Netw. Secur. 18(6), 1089–1101 (2016)
Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking bringing order to the web. World Wide Web Internet Web Inf. Syst. 54(199966), 117 (1998)
Acknowledgments
I would like to thank, Professor Zhiqiu Huang and Professor Wang Sen Zhang for their valuable inputs in my research. Without their kind suggestions, it wouldn’t have been possible for me to finish this Work.
This work was supported by National Natural Science Foundation of China (Grant nos. 61602262 and 61602237), Jiangsu Natural Science Foundation of China (Grant no. BK20170809), Tech R&D Program of China (2015AA015303).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Hussain, Y., Huang, Z. (2018). TRFIoT: Trust and Reputation Model for Fog-based IoT. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11068. Springer, Cham. https://doi.org/10.1007/978-3-030-00021-9_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-00021-9_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00020-2
Online ISBN: 978-3-030-00021-9
eBook Packages: Computer ScienceComputer Science (R0)