Abstract
Cloud computing trust management has become an important subject in recent years. Trust management is a difficult and complicated work in cloud computing due to features such as distributed, dynamic and non-transparent environment. Since most trust management frameworks predict trust values based on received feedbacks, the validation and authenticity of feedback are highly necessary. In this paper, two new methods are presented to identify fake feedbacks. One is feedback evaluation component and the other is Bayesian game model. The feedback evaluation component is used to examine the received feedback and identify its probable fake identity. Our results reveal that the feedback evaluation component can correctly identify and rectify fake feedbacks. Bayesian game model is presented to detect malicious users and prevent their feedbacks. Simulation results coincided well with analytical results, indicating that our Bayesian game model can correctly recognize malicious user. Received feedbacks from malicious user are identified as fake feedbacks. Eventually, two new methods were compared.


















Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Jafari Navimipour N, Rahmani AM, Habibizad Navin A, Hosseinzadeh M (2015) Expert cloud: a cloud-based framework to share the knowledge and skills of human resources. Comput Hum Behav 46:57–74
Buyya R (2009) Market-oriented cloud computing: vision”, hype, and reality of delivering computing as the 5th utility. In: Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, vol 1. IEEE Computer Society
Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53:50–58
Jafari Navimipour N, Rahmani AM, Habibizad Navin A, Hosseinzadeh M (2014) Resource discovery mechanisms in grid systems: a survey. J Netw Comput Appl 41:389–410
Buyya R, Ranjan R, Calheiros RN (2010) InterCloud: utility-oriented federation of cloud computing environments for scaling of application services. In: Proceedings of the 10th International Conference on Algorithms and Architectures for Parallel Processing, vol Part I, pp 13–31
Xiao P, Hu ZG, Zhang Y (2013) An energy-aware heuristic scheduling for data-intensive workflows in virtualized datacenters. J Comput Sci Technol 28:948–961
Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63:561–592
Hwang K, Li D (2010) Trusted cloud computing with secure resources and data coloring. Internet Comput IEEE 14:14–22
Noor T, Talal H, Sheng Q (2011) Trust as a service: a framework for trust management in cloud environments. Web Inf Syst Eng WISE 2011:314–321
Pearson S, Benameur A (2010) Privacy, security and trust issues arising from cloud computing, cloud computing technology and science (CloudCom). In: 2010 IEEE Second International Conference, pp 693–702
Fernandes Diogo AB, Soares Liliana FB, Gomes João V, Freire Mário M, Inácio Pedro RM (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13:13–170
Li R, Li J (2013) Requirements and design for neutral trust management framework in unstructured networks. J Supercomput 64:702–716
Perez JMM, Bernabe JB, Calero JMA, Clemente FJG, Perez GM, Skarmeta AFG (2014) Taxonomy of trust relationships in authorization domains for cloud computing. J Supercomput 70:1075–1099
Abbadi ImadM (2013) A framework for establishing trust in cloud provenance. Int J Inf Secur 12:111–128
Abbadi IM, Martin A (2011) Trust in the cloud. Inf Secur Tech Rep 16:108–114
Wang G, Zhou W, Yang LT (2013) Trust, security and privacy for pervasive applications. J Supercomput 64:661–663
Jabbar1 S, Naseer K, Gohar M, Rho S, Chang H (2015) Trust model at service layer of cloud computing for educational institutes. J Supercomput 72:58–83
Tang C, Liu J (2015) Selecting a trusted cloud service provider for your SaaS program. Comput Secur 50:60–73
Ul Haq I, Brandic I, Schikuta E (2010) SLA validation in layered cloud infrastructures. Econ Grids Clouds Syst Serv 6296:153–164
Conner w, Iyengar A, Mikalsen T, Rouvellou R, Nahrstedt K (2009) A trust management framework for service-oriented environments. In: Proceedings of the 18th International Conference on World Wide Web, pp 891–900
Malik Z, Bouguettaya A (2009) RATEWeb: reputation assessment for trust establishment among web services. VLDB J 18:885–911
Fan W, Yang S, Pei J (2014) A novel two-stage model for cloud service trustworthiness evaluation. Expert Syst 31:136–153
siadat S, Rahmani AM, Mohsenzadeh M (2009) Proposed platform for improving grid security by trust management system. Int J Comput Sci Inf Secur Tech Rep 6:143–148
Hsu J, Lin K, Chang T, Ho C, Huang H, Jih W (2006) Parameter learning of personalized trust models in broker-based distributed trust management. Inf Syst Front 8:321–333
Alhamad M, Dillon T, Chang E (2010) SLA-based trust model for cloud computing, network-based information systems (NBiS). In: 2010 13th International Conference, pp 321–324
Chakraborty S, Roy K (2012) An SLA-based framework for estimating trustworthiness of a cloud, trust. In: Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference, pp 937–942
Fan W, Perros H (2014) A novel trust management framework for multi-cloud environments based on trust service providers. Knowl-Based Syst 70:392–406
Nielsen M, Krukow K, Sassone V (2007) A Bayesian model for event-based trust. Electron Notes Theor Comput Sci 172:499–521
Song S, Hwang K, Macwan M (2004) Fuzzy trust integration for security enforcement in grid computing. Netw Parallel Comput 3222:9–21
Hongmei L, Qianping W, Guoxin L (2009) A fuzzy logic-based trust model in grid, networks security, wireless communications and trusted computing. In: NSWCTC ’09. International Conference, vol 1, pp 608–614
Yuan W, Guan D, Lee Y, Lee S, Hur S (2010) Improved trust-aware recommender system using small-worldness of trust networks. Knowl-Based Syst 23:232–238
Noor T, Sheng Q, Alfazi A, Law J, Jeriel, Ngu AH (2013) Identifying fake feedback for effective trust management in cloud environments. In: Service-Oriented Computing—ICSOC 2012 Workshops, vol 7759, pp 47–58
http://www.public.asu.edu/~jtang20/datasetcode/truststudy.htm
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Siadat, S., Rahmani, A.M. & Navid, H. Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model. J Supercomput 73, 2682–2704 (2017). https://doi.org/10.1007/s11227-016-1950-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-016-1950-1