Skip to main content
Log in

FFED: a novel strategy based on fast entropy to detect attacks against trust computing in cloud

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Trust management systems give way to trustworthy interactions in cloud computing. However, malicious cloud users can intentionally provide unfair ratings to benefit or reduce a cloud provider’s reputation. This paper proposes a novel detection strategy to supervise cloud users’ feedback and detect unfair rating attacks for cloud environments based on the Fast Entropy metric and named Feedback Fast Entropy-based Detection strategy (FFED). The provided detection system monitors users’ ratings in successive short periods, detects the unfair rating attacks rapidly in real-time using fast entropy algorithm and permits the scale effectively. Through the performed experimental tests, we prove the good performances of the introduced system and its advantages.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Gobi, N., Rathinavelu, A.: Analyzing cloud based reviews for product ranking using feature based clustering algorithm. Clust. Comput. 22(S3), 6977–6984 (2018). https://doi.org/10.1007/s10586-018-1996-3

    Article  Google Scholar 

  2. Alhanahnah, M., Bertok, P., Tari, Z., Alouneh, S.: Context-aware multifaceted trust framework for evaluating trustworthiness of cloud providers. Future Gener. Comput. Syst. 79, 488–499 (2018). https://doi.org/10.1016/j.future.2017.09.071

    Article  Google Scholar 

  3. Kumar, R.R., Kumari, B., Kumar, C.: CCS-OSSR: a framework based on hybrid MCDM for optimal service selection and ranking of cloud computing services. Clust. Comput. (2020). https://doi.org/10.1007/s10586-020-03166-3

    Article  Google Scholar 

  4. Ruan, Y., Durresi, A.: A trust management framework for clouds. Comput. Commun. 144, 124–131 (2019). https://doi.org/10.1016/j.comcom.2019.05.018

    Article  Google Scholar 

  5. Neeraj, G.M.S., Singh, D.: Satisfaction aware QoS-based bidirectional service mapping in cloud environment. Clust. Comput. 23(4), 2991–3011 (2020). https://doi.org/10.1007/s10586-020-03065-7

    Article  Google Scholar 

  6. Sun, L.: An influence diagram based cloud service selection approach in dynamic cloud marketplaces. Clust. Comput. 22(S3), 7369–7378 (2017). https://doi.org/10.1007/s10586-017-1438-7

    Article  Google Scholar 

  7. Jatoth, C., Gangadharan, G.R., Fiore, U., Buyya, R.: SELCLOUD: a hybrid multi-criteria decision-making model for selection of cloud services. Soft. Comput. 23(13), 4701–4715 (2018). https://doi.org/10.1007/s00500-018-3120-2

    Article  Google Scholar 

  8. Chong, S.K., Abawajy, J., Ahmad, M., Hamid, I.R.A.: Enhancing trust management in cloud environment. Procedia Soc. Behav. Sci. 129, 314–321 (2014). https://doi.org/10.1016/j.sbspro.2014.03.682

    Article  Google Scholar 

  9. Machhi, S., Jethava, G.B.: Feedback based trust management for cloud environment. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies. pp. 1–5 (2016)

  10. Wang, D., Muller, T., Liu, Y., Zhang, J.:Towards robust and effective trust management for security: A survey. In: Proceedings of the IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. pp. 1–6. https://doi.org/10.1109/trustcom.2014.65(2014)

  11. Fan, W., Perros, H.: A reliability-based trust management mechanism for cloud services. In: Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. pp. 1–6. https://doi.org/10.1109/trustcom.2013.194(2013)

  12. Abdullah, A.M., Ali, H.A., Haikal, A.Y.: A reliable, TOPSIS-based multi-criteria, and hierarchical load balancing method for computational grid. Clust. Comput. 22(4), 1085–1106 (2019). https://doi.org/10.1007/s10586-018-02888-9

    Article  Google Scholar 

  13. Chiregi, M., Navimipour, N.J.: A comprehensive study of the trust evaluation mechanisms in the cloud computing. J. Serv. Sci. Res. 9(1), 1–30 (2017). https://doi.org/10.1007/s12927-017-0001-7

    Article  Google Scholar 

  14. Wang, M., Wang, G., Tian, J., Zhang, H., Zhang, Y.: An accurate and multi-faceted reputation scheme for cloud computing. Procedia Comput. Sci. 34, 466–473 (2014). https://doi.org/10.1016/j.procs.2014.07.021

    Article  Google Scholar 

  15. Noor, T. H., Sheng, Q.Z.: Credibility-based trust management for services in cloud environments. In: Proceedings of the Service-Oriented Computing. pp. 328–343. https://doi.org/10.1007/978-3-642-25535-9_22(2011)

  16. Qu, L., Wang, Y., Orgun, M.A.: Cloud service selection based on the aggregation of user feedback and quantitative performance assessment. In: Proceedings of the 2013 IEEE International Conference on Services Computing pp. 11–17. https://doi.org/10.1109/scc.2013.92(2013)

  17. Nivethitha, S., Raman, M.R.G., Gireesha, O., Kannan, K., Sriram, V.S.S.: An improved rough set approach for optimal trust measure parameter selection in cloud environments. Soft Comput. 23(22), 11979–11999 (2019). https://doi.org/10.1007/s00500-018-03753-y

    Article  Google Scholar 

  18. Qu, L., Wang, Y., Orgun, M., Wong, D.S., Bouguettaya, A.: Evaluating cloud users’ credibility of providing subjective assessment or objective assessment for cloud services. In: Proceedings of the Service-Oriented Computing. pp. 453–461 (2014)

  19. Lu, L., Yuan, Y.: A novel TOPSIS evaluation scheme for cloud service trustworthiness combining objective and subjective aspects. J. Syst. Softw. 143, 71–86 (2018). https://doi.org/10.1016/j.jss.2018.05.004

    Article  Google Scholar 

  20. Jiang, S.:Towards the design of robust trust and reputation systems. In: Proceedings of the 23rd International Joint Conference on Artificial Intelligence, in IJCAI 2013. pp. 3–10. Beijing, China (2013)

  21. Hussain, A., Chun, J., Khan, M.: A novel framework towards viable cloud service selection as a service (CSSaaS) under a fuzzy environment. Future Gener. Comput. Syst. 104, 74–91 (2020). https://doi.org/10.1016/j.future.2019.09.043

    Article  Google Scholar 

  22. Qu, L., Wang, Y., Orgun, M.:An uncertain assessment compatible incentive mechanism for eliciting continual and truthful assessments of cloud services. In: Proceedings of the Service-Oriented Computing. pp. 335–351. 10.1007/978-3-319-46295-0\_21 (2016)

  23. Wickremasinghe, B., Prof, A., Contents, R.B.: Cloudanalyst: A cloudsim-based tool for modelling and analysis of large scale cloud computing environments. In: Proceedings of the International Conference on Advanced Information Networking and Applications. pp. 11–17 (2010)

  24. Liu, S., Zhang, J., Miao, C., Theng, Y.L., Kot, A.C.: iclub: An integrated clustering-based approach to improve the robustness of reputation systems. In: Proceedings of the The 10th International Conference on Autonomous Agents and Multiagent Systems pp 1151–1152, http://dl.acm.org/citation.cfm?id=2034396.2034462 (2011)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Houda Guesmi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Guesmi, H., Kalghoum, A., Ghazel, C. et al. FFED: a novel strategy based on fast entropy to detect attacks against trust computing in cloud. Cluster Comput 24, 1945–1954 (2021). https://doi.org/10.1007/s10586-021-03233-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-021-03233-3

Keywords

Navigation