Skip to main content

Research and Development of Trust Mechanism in Cloud Computing

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9483))

Included in the following conference series:

Abstract

As a flexible security mechanism, trust mechanism is widely used in various complex application scenarios. The research on trust and its spread mechanism has become a new hotspot in the fields of E-commerce, Internet of things and Cloud computing. In this paper, we first deeply analyzed the relationship between trust mechanism and cloud computing security, and pointed out the existing problems of current models. We then surveyed some typical trust mechanism according to different mathematic theories of trust computation. We also summarized the latest research achievements of trust model and trust calculation method in cloud computing environment. Based on these studies, we forecasted the direction of further research on trust mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mell, P., Grance, T.: The NIST definition of cloud computing. Nat. Inst. Stand. Technol. 53, 50 (2009)

    Google Scholar 

  2. Chuang, L., Wen-Bo, S.: Cloud Computing Security: Architecture, Mechanism and Modeling. Chin. J. Comput. 36, 1765–1784 (2013) (in Chinese)

    Google Scholar 

  3. Almorsy, M., Grundy, J., Müller, I.: An analysis of the cloud computing security problem. In: Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30 November 2010

    Google Scholar 

  4. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)

    Article  Google Scholar 

  5. Feng, D.G., Zhang, M., Zhang, Y., Zhen, X.U.: Study on cloud computing security. J. Softw. 22, 71–83 (2011)

    Article  Google Scholar 

  6. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International World Wide Web Conference, WWW 2003 (2003)

    Google Scholar 

  7. Kai, H., Zhou, R.: PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans. Parallel Distrib. Syst. 18, 460–473 (2007)

    Article  Google Scholar 

  8. Li, X.: Liu, L.: PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16, 843–857 (2004)

    Article  Google Scholar 

  9. Jun-Sheng, C., Huai-Ming, W.: DyTrust: A time-frame based dynamic trust model for P2P systems. Chin. J. Comput. 29, 1301–1307 (2006) (in Chinese)

    Google Scholar 

  10. Shao-Jie. W., Hong-Song, C.: An improved DyTrust trust model. J. Univ. Sci. Technol. Beijing, 30, 685–689 (2008) (in Chinese)

    Google Scholar 

  11. Zhi-Guo, Z., Qiong, C., Min-Sheng, T.: Trust model based on improved DyTrust in P2P network. Comput. Technol. Dev. 174–177 (2014) (in Chinese)

    Google Scholar 

  12. Despotovic, Z., Aberer, K.: Maximum likelihood estimation of peers; performance in P2P networks. In: The Second Workshop on the Economics of Peer-to-Peer Systems (2004)

    Google Scholar 

  13. Haller, J., Josang, A.: Dirichlet reputation systems. In: 2012 Seventh International Conference on Availability, Reliability and Security, 112–119 (2007)

    Google Scholar 

  14. Schmidt, S., Steele, R., Dillon, T.S., Chang, E.: Fuzzy trust evaluation and credibility development in multi-agent systems. Appl. Soft Comput. 7, 492–505 (2007)

    Article  Google Scholar 

  15. Song, S., Kai, H., Zhou, R., Kwok, Y.K.: Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Comput. 2005, 24–34 (2005)

    Article  Google Scholar 

  16. Javanmardi, S., Shojafar, M., Shariatmadari, S., Ahrabi, S.S.: FRTRUST: a fuzzy reputation based model for trust management in semantic P2p grids. Int. J. Grid Util. Comput. 6, (2014)

    Google Scholar 

  17. Tian, C., Yang, B.: A D-S evidence theory based fuzzy trust model in file-sharing P2P networks. Peer Peer Netw. Appl. 7, 332–345 (2014)

    Article  Google Scholar 

  18. Kuter, U.: Using probabilistic confidence models for trust inference in web-based social networks. ACM Trans. Int. Technol. Toit Homepage 10, 890–895 (2010)

    Google Scholar 

  19. Tang, J., Lou, T., Kleinberg, J.: Inferring social ties across heterogeneous networks. In: WSDM 2012, 743–752 (2012)

    Google Scholar 

  20. Rettinger, A., Nickles, M., Tresp, V.: Statistical relational learning of trust. Mach. Learn. 82, 191–209 (2011)

    Article  MathSciNet  Google Scholar 

  21. Khiabani, H., Idris, N.B., Manan, J.L.A.: A Unified trust model for pervasive environments – simulation and analysis. KSII Trans. Int. Inf. Syst. (TIIS) 7, 1569–1584 (2013)

    Google Scholar 

  22. Liu, H., Lim, E.P., Lauw, H.W., Le, M.T., Sun, A., Srivastava, J., Kim, Y.A.: Predicting trusts among users of online communities: an epinions case study. In: Ec 2008 Proceedings of ACM Conference on Electronic Commerce, pp. 310–319 (2008)

    Google Scholar 

  23. Zolfaghar, K., Aghaie, A.: A syntactical approach for interpersonal trust prediction in social web applications: Combining contextual and structural data. Knowl. Based Syst. 26, 93–102 (2012)

    Article  Google Scholar 

  24. Tang, J., Gao, H., Hu, X.: Exploiting homophily effect for trust prediction. In: Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, 53–62 (2013)

    Google Scholar 

  25. Ying, Wang, Xin, Wang, Wan-Li, Zuo: Trust prediction modeling based on social theories. J. Softw. 12, 2893–2904 (2014). (in Chinese)

    Google Scholar 

  26. Cruz, Z.B., Fernández-Alemán, J.L., Toval, A.: Security in cloud computing: a mapping study. Comput. Sci. Inf. Syst. 12, 161–184 (2015)

    Article  Google Scholar 

  27. Zheng-Ji, Z., Li-Fa, W., Zheng, H.: Trust based trustworthiness attestation model of virtual machines for cloud computing. J. Southeast Univ. (Nat. Sci. Ed.) 45(1), 31–35 (2015) (in Chinese)

    Google Scholar 

  28. Tan, W., Sun, Y., Li, L.X., Lu, G.Z., Wang, T.: A trust service-oriented scheduling model for workflow applications in cloud computing. IEEE Syst. J. 8, 868–878 (2014)

    Article  Google Scholar 

  29. Sidhu, J., Singh, S.: Peers feedback and compliance based trust computation for cloud computing. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, B. (eds.) Security in Computing and Communications, vol. 467, pp. 68–80. Springer, Heidelberg (2014)

    Google Scholar 

  30. Xiao-Lan, X., Liang, L., Peng, Z.: Trust model based on double incentive and deception detection for cloud computing. J. Electron. Inf. Technol. 34(4), 812–817 (2012) (in Chinese)

    Google Scholar 

  31. Jaiganesh, M., Aarthi, M., Kumar, A.V.A.: Fuzzy ART-based user behavior trust in cloud computing. In: Suresh, L.P., Dash, S.S., Panigrahi, B.K. (eds.) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, vol. 324, pp. 341–348. Springer, India (2015)

    Google Scholar 

  32. Yan-Xia, L., Li-Qin, T., Shan-Shan, S.: Trust evaluation and control analysis of FANP-based user behavior in cloud computing environment. Comput. Sci. 40, 132–135 (2013) (in Chinese)

    Google Scholar 

  33. Guo-Feng, S., Chang-Yong, L.: A security access control model based on user behavior trust under cloud environment. Chin. J. Manag. Sci. 52, 669–676 (2013) (in Chinese)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the China Aviation Science Foundation (NO. 20101952021) and the Fundamental Research Funds for the Central Universities (NO. NZ2013306).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Xu, J., Xu, F., Chang, W., Lai, H. (2015). Research and Development of Trust Mechanism in Cloud Computing. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds) Cloud Computing and Security. ICCCS 2015. Lecture Notes in Computer Science(), vol 9483. Springer, Cham. https://doi.org/10.1007/978-3-319-27051-7_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27051-7_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27050-0

  • Online ISBN: 978-3-319-27051-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics