Skip to main content

A Memoryless Trust Computing Mechanism for Cloud Computing

  • Conference paper
Networked Digital Technologies (NDT 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 293))

Included in the following conference series:

Abstract

Trust management systems play an important role in identifying the quality of service in distributed systems. In cloud computing, trust systems can be used to identify service providers who would meet the requirements of customers. Several trust computing mechanisms have been proposed in literature based on various trust metrics. Most of these systems compute the trust scores incrementally from the previous values. This is major vulnerability that can be exploited by adversaries to attack the system forcing the trust scores towards extreme values. In this paper, the authors present a memoryless trust computing mechanism which is immune to such attacks. The proposed mechanism does not depend on the previous trust scores hence it cannot be forced towards extreme values by repeated requests. The simulations experiments conducted show that the trust scores computed using the proposed mechanism are more representative and stable in the face of attacks compared to other systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Future Generation Computer Systems 25(6), 599–616 (2009)

    Article  Google Scholar 

  2. Firdhous, M., Ghazali, O., Hassan, S., Harun, N.Z., Abas, A.: Honey Bee based Trust Management System for Cloud Computing. In: 3rd International Conference on Computing and Informatics (ICOCI 2011), pp. 327–332. Universiti Utara Malaysia, Malaysia (2011)

    Google Scholar 

  3. An, B., Lesser, V., Irwin, D., Zink, M.: Automated Negotiation with Decommitment for Dynamic Resource Allocation in Cloud Computing. In: 9th International Conference on Autonomous Agents and Multiagent System (AAMAS 2010), pp. 981–988. ACM Press, New York (2010)

    Google Scholar 

  4. Zaman, S., Grosu, D.: Combinatorial Auction-based Allocation of Virtual Machine Iinstances in Clouds. In: 2nd IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2010), pp. 127–134. IEEE Press, New York (2010)

    Chapter  Google Scholar 

  5. Vecchiola, C., Pandey, S., Buyya, R.: High-Performance Cloud Computing: A View of Scientific Applications. In: 10th International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN), pp. 4–16. IEEE Press, New York (2009)

    Chapter  Google Scholar 

  6. Firdhous, M., Ghazali, O., Hassan, S.: A Trust Computing Mechanism for Cloud Computing with Multilevel Thresholding. In: 6th International Conference on Industrial and Information Systems (ICIIS 2011), pp. 457–461. IEEE Press, New York (2011)

    Chapter  Google Scholar 

  7. Zhao, F., Jiang, Y., Xiang, G., Jin, H., Jiang, W.: VRFPS: A Novel Virtual Machine-based Real-time File Protection System. In: 7th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2009), pp. 217–224. IEEE Press, New York (2009)

    Chapter  Google Scholar 

  8. Rimal, B.P., Choi, E., Lumb, I.: A Taxonomy and Survey of Cloud Computing Systems. In: 5th Joint International Conference on INC, IMS and IDC, pp. 44–51. IEEE Press, New York (2009)

    Chapter  Google Scholar 

  9. Prodan, R., Ostermann, S.: A Survey and Taxonomy of Infrastructure as a Service and Web Hosting Cloud Providers. In: 10th IEEE/ACM International Conference on Grid Computing, pp. 17–25. IEEE Press, New York (2009)

    Chapter  Google Scholar 

  10. Kong, L., Li, Q., Zheng, X.: A Novel Model Supporting Customization Sharing in SaaS Applications. In: International Conference on Multimedia Information Networking and Security, pp. 225–229. IEEE Press, New York (2010)

    Chapter  Google Scholar 

  11. Firdhous, M., Ghazali, O., Hassan, S.: A Trust Computing Mechanism for Cloud Computing. In: 4th ITU Kaleidoscope Academic Conference, pp. 199–205. IEEE Press, New York (2011)

    Google Scholar 

  12. Zhou, M., Zhang, R., Zeng, D., Qian, W.: Services in the Cloud Computing Era: A Survey. In: 4th International Universal Communication Symposium (IUCS), pp. 40–46. IEEE Press, New York (2010)

    Chapter  Google Scholar 

  13. Mikkilineni, R., Sarath, V.: Cloud Computing and the Lessons from the Past. In: 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2009), pp. 57–62. IEEE Press, New York (2009)

    Chapter  Google Scholar 

  14. Cai, B., Li, Z., Cheng, Y., Fu, D., Cheng, L.: Trust Decision Making in Structured P2P Network. In: International Conference on Communication Software and Networks, pp. 679–683. IEEE Press, New York (2009)

    Google Scholar 

  15. Vijayakumar, V., Banu, R.S.D.W.: Security for Resource Selection in Grid Computing based on Trust and Reputation Responsiveness. Int. J. Computer Science and Network Security 8(11), 107–115 (2008)

    Google Scholar 

  16. Mishra, S., Kushwaha, D.S., Misra, A.K.: A Cooperative Trust Management Framework for Load Balancing in Cluster Based Distributed Systems. In: International Conference on Recent Trends in Information, Telecommunication and Computing, pp. 121–125. IEEE Press, New York (2010)

    Chapter  Google Scholar 

  17. Tae, K.K., Hee, S.S.: A Trust Model using Fuzzy Logic in Wireless Sensor Network. World Academy of Science, Engineering and Technology 42(13), 63–66 (2008)

    Google Scholar 

  18. Carbone, M., Nielsen, M., Sassone, V.: A Formal Model for Trust in Dynamic Networks. In: 1st International Conference on Software Engineering and Formal Methods (SEFM 2003), pp. 54–61. IEEE Press, New York (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Firdhous, M., Ghazali, O., Hassan, S. (2012). A Memoryless Trust Computing Mechanism for Cloud Computing. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30507-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30507-8_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30506-1

  • Online ISBN: 978-3-642-30507-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics