Abstract
The incremental development of the Internet of Things (IoT) technologies and the rapid popularization of IoT based applications has promoted the rapid integration of edge computing and cloud computing into an innovation service paradigm, edge cloud service (ECS). As one of the most important technologies in IoT scenarios, radio frequency identification (RFID) has been widely used for object identification and tracking. Since RFID devices with limited resources are unable to process large amounts of data, it tends to employ ECS to address the issues of insufficient computing and storage resources. However, due to the diversity, uncertainty and dynamic of quality of service (QoS) in edge enabled cloud context, it brings well-known trust concern and has become one of the most challenging issues for RFID based application to adopt ECS. To this end, a novel trust management framework for RFID based application in edge enabled cloud context is proposed. Such a framework can facilitate RFID application developers to evaluate and choose a trustworthy ECS based on their specific QoS requirements. In addition, a trust level evaluation model is proposed, which can effectively evaluates the trust level of various ECSs based on dynamic QoS. The experimental result of a case study using a real-world dataset shows that the proposed framework can effectively evaluate the trust level of various ECSs with multiple and dynamic QoS attributes to improve the availability of RFID applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chen, D., Mao, X., Qin, Z., Wang, W., Li, X.-Y., Qin, Z.: Wireless device authentication using acoustic hardware fingerprints. In: Wang, Yu., Xiong, H., Argamon, S., Li, X.Y., Li, J.Z. (eds.) BigCom 2015. LNCS, vol. 9196, pp. 193–204. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22047-5_16
Lee, S.K., Bae, M., Kim, H.: Future of IoT networks: a survey. Appl. Sci. 7(10), 1072 (2017)
Chen, D., Zhang, N., Wu, H., Zhang, K., Lu, R., Guizani, M.: Audio-based security techniques for secure device-to-device communications. IEEE Netw. 36(6), 54–59 (2022)
Su, J., Sheng, Z., Leung, V.C.M., Chen, Y.: Energy efficient tag identification algorithms for RFID: survey, motivation and new design. IEEE Wirel. Commun. 26(3), 118–124 (2019)
Khalid, N., Mirzavand, R., Iyer, A.K.: A survey on battery-less RFID-based wireless sensors. Micromachines 12, 819 (2021)
Li, X., Jin, X., Wang, Q., Cao, M., Chen, X.: SCCAF: a secure and compliant continuous assessment framework in cloud-based IoT context. In: Wireless Communications and Mobile Computing 2018 (2018)
Chen, D., Wang, H., Zhang, N., et al.: Privacy-preserving encrypted traffic inspection with symmetric cryptographic techniques in IoT. IEEE Internet Things J. 9(18), 17265–17279 (2022)
Habib, S.M., Hauke, S., Ries, S., Mühlhäuser, M.: Trust as a facilitator in cloud computing: a survey. J. Cloud Comput. Adv. Syst. App. 1(1), 1–18 (2012)
Al-Masri, E., H., Q.M.: Discovering the best web service: a neural network-based solution. In: 2009 IEEE International Conference on Systems, Man and Cybernetics, pp. 4250–4255 (2009)
Alabool, H., Kamil, A., Arshad, N., Alarabiat, D.: Cloud service evaluation method-based multi-criteria decision-making: a systematic literature review. J. Syst. Softw. 139, 161–188 (2018)
Hayyolalam, V., Kazem, A.A.P.: A systematic literature review on QOS-aware service composition and selection in cloud environment. J. Netw. Comput. Appl. 110, 52–74 (2018)
ISO/IEC-JTC-1/SC-38: Information technology-Cloud computing-Service level agreement (SLA) framework-Part 1: Overview and Concepts (2016). https://www.iso.org/standard/67545.html 2021
Jatoth, C., Gangadharan, G.R., Fiore, U., Buyya, R.: Selcloud: a hybrid multi-criteria decision-making model for selection of cloud services. Soft. Comput. 23(13), 4701–4715 (2019)
Kumar, R.R., Kumari, B., Kumar, C.: CCS-OSSR: a framework based on hybrid MCDM for optimal service selection and ranking of cloud computing services. Clust. Comput. 24(2), 867–883 (2021)
Kumar, R.R., Mishra, S., Kumar, C.: A novel framework for cloud service evaluation and selection using hybrid MCDM methods. Arab. J. Sci. Eng. 43(12), 7015–7030 (2018)
Kumar, R.R., Shameem, M., Kumar, C.: A computational framework for ranking prediction of cloud services under fuzzy environment. Enterprise Inf. Syst. 16, 1–21 (2021)
Li, X., Wang, Q., Lan, X., Chen, X., Zhang, N., Chen, D.: Enhancing cloud-based IoT security through trustworthy cloud service: an integration of security and reputation approach. IEEE Access 7, 9368–9383 (2019)
Li, X., Yang, R., Chen, X., Liu, Y., Wang, Q.: Assessment model of cloud service security level based on standardized security metric hierarchy. Adv. Eng. Sci. 52, 159–167 (2020). https://doi.org/10.15961/j.jsuese.201900429
Mahmud, K., Usman, M.: Trust establishment and estimation in cloud services: a systematic literature review. J. Netw. Syst. Manage. 27(2), 489–540 (2019). https://doi.org/10.1007/s10922-018-9475-y
Noor, T.H., Sheng, Q.Z., Maamar, Z., Zeadally, S.: Managing trust in the cloud: state of the art and research challenges. Computer 49(2), 34–45 (2016). https://doi.org/10.1109/MC.2016.57
Patre, S.R.: Passive chipless RFID sensors: concept to applications-a review. IEEE J. Radio Freq. Identif. 6, 64–76 (2022). https://doi.org/10.1109/JRFID.2021.3114104
Sidhu, J., Singh, S.: Design and comparative analysis of MCDM-based multi-dimensional trust evaluation schemes for determining trustworthiness of cloud service providers. J. Grid Comput. 15(2), 197–218 (2017)
Silva, A., Silva, K., Rocha, A., Queiroz, F.: Calculating the trust of providers through the construction weighted SEC-SLA. Future Gener. Comput. Syst. 97, 873–886 (2019)
Somu, N., Kirthivasan, K., Shankar Sriram, V.S.: A computational model for ranking cloud service providers using hypergraph based techniques. Future Gener. Comput. Syst. 68, 14–30 (2017)
Sun, L., Dong, H., Hussain, O.K., Hussain, F.K., Liu, A.X.: A framework of cloud service selection with criteria interactions. Future Gener. Comput. Syst. 94, 749–764 (2019)
Xu, Z.: A deviation-based approach to intuitionistic fuzzy multiple attribute group decision making. Group Decis. Negot. 19(1), 57–76 (2010)
Yadav, N., Goraya, M.S.: Two-way ranking based service mapping in cloud environment. Future Gener. Comput. Syst. 81, 53–66 (2018)
Yang, Y., Peng, X., Fu, D.: A framework of cloud service selection based on trust mechanism. Int. J. Ad Hoc Ubiquit. Comput. 25(3), 109–119 (2017)
Acknowledgments
This work is supported by Research on the construction of intelligent full-process laboratory system based on RFID (Radio frequency identification) technology (No. YCIC-YF-2022-05), and Research on dynamic monitoring and remote control technology of environmental laboratory (No. JKYZLX-2021-23).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sun, W., Peng, G., Pan, W., Deng, J., Cui, X., Lin, F. (2024). Trust Management as a Service for RFID Based Applications in Edge Enabled Cloud. In: Jin, H., Pan, Y., Lu, J. (eds) Computer Networks and IoT. IAIC 2023. Communications in Computer and Information Science, vol 2060. Springer, Singapore. https://doi.org/10.1007/978-981-97-1332-5_4
Download citation
DOI: https://doi.org/10.1007/978-981-97-1332-5_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-1331-8
Online ISBN: 978-981-97-1332-5
eBook Packages: Computer ScienceComputer Science (R0)