Skip to main content

Trust Management as a Service for RFID Based Applications in Edge Enabled Cloud

  • Conference paper
  • First Online:
Computer Networks and IoT (IAIC 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 2060))

Included in the following conference series:

  • 239 Accesses

Abstract

The incremental development of the Internet of Things (IoT) technologies and the rapid popularization of IoT based applications has promoted the rapid integration of edge computing and cloud computing into an innovation service paradigm, edge cloud service (ECS). As one of the most important technologies in IoT scenarios, radio frequency identification (RFID) has been widely used for object identification and tracking. Since RFID devices with limited resources are unable to process large amounts of data, it tends to employ ECS to address the issues of insufficient computing and storage resources. However, due to the diversity, uncertainty and dynamic of quality of service (QoS) in edge enabled cloud context, it brings well-known trust concern and has become one of the most challenging issues for RFID based application to adopt ECS. To this end, a novel trust management framework for RFID based application in edge enabled cloud context is proposed. Such a framework can facilitate RFID application developers to evaluate and choose a trustworthy ECS based on their specific QoS requirements. In addition, a trust level evaluation model is proposed, which can effectively evaluates the trust level of various ECSs based on dynamic QoS. The experimental result of a case study using a real-world dataset shows that the proposed framework can effectively evaluate the trust level of various ECSs with multiple and dynamic QoS attributes to improve the availability of RFID applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Chen, D., Mao, X., Qin, Z., Wang, W., Li, X.-Y., Qin, Z.: Wireless device authentication using acoustic hardware fingerprints. In: Wang, Yu., Xiong, H., Argamon, S., Li, X.Y., Li, J.Z. (eds.) BigCom 2015. LNCS, vol. 9196, pp. 193–204. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22047-5_16

    Chapter  Google Scholar 

  2. Lee, S.K., Bae, M., Kim, H.: Future of IoT networks: a survey. Appl. Sci. 7(10), 1072 (2017)

    Article  Google Scholar 

  3. Chen, D., Zhang, N., Wu, H., Zhang, K., Lu, R., Guizani, M.: Audio-based security techniques for secure device-to-device communications. IEEE Netw. 36(6), 54–59 (2022)

    Article  Google Scholar 

  4. Su, J., Sheng, Z., Leung, V.C.M., Chen, Y.: Energy efficient tag identification algorithms for RFID: survey, motivation and new design. IEEE Wirel. Commun. 26(3), 118–124 (2019)

    Article  Google Scholar 

  5. Khalid, N., Mirzavand, R., Iyer, A.K.: A survey on battery-less RFID-based wireless sensors. Micromachines 12, 819 (2021)

    Article  Google Scholar 

  6. Li, X., Jin, X., Wang, Q., Cao, M., Chen, X.: SCCAF: a secure and compliant continuous assessment framework in cloud-based IoT context. In: Wireless Communications and Mobile Computing 2018 (2018)

    Google Scholar 

  7. Chen, D., Wang, H., Zhang, N., et al.: Privacy-preserving encrypted traffic inspection with symmetric cryptographic techniques in IoT. IEEE Internet Things J. 9(18), 17265–17279 (2022)

    Article  Google Scholar 

  8. Habib, S.M., Hauke, S., Ries, S., Mühlhäuser, M.: Trust as a facilitator in cloud computing: a survey. J. Cloud Comput. Adv. Syst. App. 1(1), 1–18 (2012)

    Google Scholar 

  9. Al-Masri, E., H., Q.M.: Discovering the best web service: a neural network-based solution. In: 2009 IEEE International Conference on Systems, Man and Cybernetics, pp. 4250–4255 (2009)

    Google Scholar 

  10. Alabool, H., Kamil, A., Arshad, N., Alarabiat, D.: Cloud service evaluation method-based multi-criteria decision-making: a systematic literature review. J. Syst. Softw. 139, 161–188 (2018)

    Article  Google Scholar 

  11. Hayyolalam, V., Kazem, A.A.P.: A systematic literature review on QOS-aware service composition and selection in cloud environment. J. Netw. Comput. Appl. 110, 52–74 (2018)

    Article  Google Scholar 

  12. ISO/IEC-JTC-1/SC-38: Information technology-Cloud computing-Service level agreement (SLA) framework-Part 1: Overview and Concepts (2016). https://www.iso.org/standard/67545.html 2021

  13. Jatoth, C., Gangadharan, G.R., Fiore, U., Buyya, R.: Selcloud: a hybrid multi-criteria decision-making model for selection of cloud services. Soft. Comput. 23(13), 4701–4715 (2019)

    Article  Google Scholar 

  14. Kumar, R.R., Kumari, B., Kumar, C.: CCS-OSSR: a framework based on hybrid MCDM for optimal service selection and ranking of cloud computing services. Clust. Comput. 24(2), 867–883 (2021)

    Article  Google Scholar 

  15. Kumar, R.R., Mishra, S., Kumar, C.: A novel framework for cloud service evaluation and selection using hybrid MCDM methods. Arab. J. Sci. Eng. 43(12), 7015–7030 (2018)

    Article  Google Scholar 

  16. Kumar, R.R., Shameem, M., Kumar, C.: A computational framework for ranking prediction of cloud services under fuzzy environment. Enterprise Inf. Syst. 16, 1–21 (2021)

    Google Scholar 

  17. Li, X., Wang, Q., Lan, X., Chen, X., Zhang, N., Chen, D.: Enhancing cloud-based IoT security through trustworthy cloud service: an integration of security and reputation approach. IEEE Access 7, 9368–9383 (2019)

    Article  Google Scholar 

  18. Li, X., Yang, R., Chen, X., Liu, Y., Wang, Q.: Assessment model of cloud service security level based on standardized security metric hierarchy. Adv. Eng. Sci. 52, 159–167 (2020). https://doi.org/10.15961/j.jsuese.201900429

    Article  Google Scholar 

  19. Mahmud, K., Usman, M.: Trust establishment and estimation in cloud services: a systematic literature review. J. Netw. Syst. Manage. 27(2), 489–540 (2019). https://doi.org/10.1007/s10922-018-9475-y

    Article  Google Scholar 

  20. Noor, T.H., Sheng, Q.Z., Maamar, Z., Zeadally, S.: Managing trust in the cloud: state of the art and research challenges. Computer 49(2), 34–45 (2016). https://doi.org/10.1109/MC.2016.57

    Article  Google Scholar 

  21. Patre, S.R.: Passive chipless RFID sensors: concept to applications-a review. IEEE J. Radio Freq. Identif. 6, 64–76 (2022). https://doi.org/10.1109/JRFID.2021.3114104

    Article  Google Scholar 

  22. Sidhu, J., Singh, S.: Design and comparative analysis of MCDM-based multi-dimensional trust evaluation schemes for determining trustworthiness of cloud service providers. J. Grid Comput. 15(2), 197–218 (2017)

    Article  Google Scholar 

  23. Silva, A., Silva, K., Rocha, A., Queiroz, F.: Calculating the trust of providers through the construction weighted SEC-SLA. Future Gener. Comput. Syst. 97, 873–886 (2019)

    Article  Google Scholar 

  24. Somu, N., Kirthivasan, K., Shankar Sriram, V.S.: A computational model for ranking cloud service providers using hypergraph based techniques. Future Gener. Comput. Syst. 68, 14–30 (2017)

    Article  Google Scholar 

  25. Sun, L., Dong, H., Hussain, O.K., Hussain, F.K., Liu, A.X.: A framework of cloud service selection with criteria interactions. Future Gener. Comput. Syst. 94, 749–764 (2019)

    Article  Google Scholar 

  26. Xu, Z.: A deviation-based approach to intuitionistic fuzzy multiple attribute group decision making. Group Decis. Negot. 19(1), 57–76 (2010)

    Article  Google Scholar 

  27. Yadav, N., Goraya, M.S.: Two-way ranking based service mapping in cloud environment. Future Gener. Comput. Syst. 81, 53–66 (2018)

    Article  Google Scholar 

  28. Yang, Y., Peng, X., Fu, D.: A framework of cloud service selection based on trust mechanism. Int. J. Ad Hoc Ubiquit. Comput. 25(3), 109–119 (2017)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by Research on the construction of intelligent full-process laboratory system based on RFID (Radio frequency identification) technology (No. YCIC-YF-2022-05), and Research on dynamic monitoring and remote control technology of environmental laboratory (No. JKYZLX-2021-23).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Feng Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sun, W., Peng, G., Pan, W., Deng, J., Cui, X., Lin, F. (2024). Trust Management as a Service for RFID Based Applications in Edge Enabled Cloud. In: Jin, H., Pan, Y., Lu, J. (eds) Computer Networks and IoT. IAIC 2023. Communications in Computer and Information Science, vol 2060. Springer, Singapore. https://doi.org/10.1007/978-981-97-1332-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-1332-5_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-1331-8

  • Online ISBN: 978-981-97-1332-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics