Skip to main content
Log in

Trust management on user behavioral patterns for a mobile cloud computing

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

With the development of ubiquitous computing technology, users are using mobile devices which are for producing and accessing information. Due to the limited computing capability and storage, however, mobile cloud computing technology are emerging research issues in the architecture, design, and implementation. This paper proposes the trust management approach by analyzing user behavioral patterns for reliable mobile cloud computing. For this, we suggest a method to quantify a one-dimensional trusting relation based on the analysis of telephone call data from mobile devices. After that, we integrate inter-user trust relationship in mobile cloud environment. As a result, trustworthiness of data in data production, management, overall application, is enhanced.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  2. Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7–18 (2010)

    Article  Google Scholar 

  3. Katsaros, D., Mehra, P., Pallis, G., Vakali, A.: Cloud computing: distributed Internet computing for IT and scientific research. IEEE Internet Comput. 13(5), 10–13 (2009)

    Article  Google Scholar 

  4. Gnanasekar, J.M., Ponmagal, R.S., Anbalagan, P.: In: Integration of Wireless Sensor Network with Cloud, International Conference on Recent Trends in Information, Telecommunication and Computing, pp. 321–323 (2010)

    Google Scholar 

  5. Bubendorfer, K., Caton, S., Rana, O.F.: Social cloud computing: a vision for socially motivated resource sharing. IEEE Trans. Serv. Comput. 5(4), 551–563 (2012)

    Article  Google Scholar 

  6. Pallis, G.: Cloud computing: the new frontier of Internet computing. IEEE Internet Comput. 14(5), 70–73 (2010)

    Article  Google Scholar 

  7. Dinh, H.T., Lee, C., Niyato, D., Wang, P.: A survey of mobile cloud computing: architecture, applications and approaches. Wirel. Commun. Mob. Comput. Published Online (2011). doi:10.1002/wcm.1203

    Google Scholar 

  8. Yeo, S., Venugopal, S., Chu, X., Buyya, R.: Autonomic metered pricing for a utility computing service. Future Gener. Comput. Syst. 26, 1368–1380 (2010)

    Article  Google Scholar 

  9. Heurta-Canepa, G., Lee, D.: A virtual cloud computing provider for mobile devices. In: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services, p. 6 (2010)

    Google Scholar 

  10. Christensen, J.H.: Using RESTful web-services and cloud computing to create next generation mobile applications. In: Proceedings of the 24th ACM SIGPLAN Conference Companion on Object Oriented Programming Systems Languages and Applications, pp. 627–634 (2009)

    Chapter  Google Scholar 

  11. Rimal, B.P.: A taxonomy and survey of Cloud computing systems. In: Fifth International Joint Conference on INC, IMS and IDC, pp. 44–51 (2009)

    Chapter  Google Scholar 

  12. Takabi, H.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)

    Article  Google Scholar 

  13. Amazon, W.: Services EC2. http://aws.amazon.com/ec2/

  14. Amazon Simple Storage Service(Amazon S3), http://aws.amazon.com/s3/

  15. Google App Engine: https://developers.google.com/appengine/

  16. Microsoft Azure: http://www.windowsazure.com

  17. OpenSocial: http://www.opensocial.org/

  18. PolarGrid: http://www.polargrid.org/

  19. OpenID: http://openid.net/

  20. Kim, M., Seo, J., Noh, S., Han, S.: Identity management-based social trust model for mediating information sharing and privacy enhancement. Secur. Commun. Netw. 5(8), 887–897 (2012)

    Article  Google Scholar 

  21. Kim, M., Park, S.: Group affinity based social trust model for an intelligent movie recommender system. Multimed. Tools Appl. 64(2), 505–516 (2013)

    Article  Google Scholar 

  22. Kim, S., Han, S.: The method of inferring trust in web-based social network using fuzzy logic. In: International Workshop on Machine Intelligence Research (2009)

    Google Scholar 

  23. Barabasi, A.L., Jeong, H., Neda, Z., Ravasz, E., Schubert, A., Vicsek, T.: Evolution of the social network of scientific collaborations. Physica A 311(3–4), 590–614 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  24. Dorogovtsev, S.N., Mendes, J.F.F.: Evolution of networks. Adv. Phys. 51(4), 1079–1187 (2002)

    Article  Google Scholar 

  25. Kuada, E., Olesen, H.: A social network approach to provisioning and management of cloud computing services for enterprises. In: Proc. of Cloud Computing, pp. 98–104 (2011)

    Google Scholar 

  26. Balasubramaniyan, V.A., Ahamad, M., Park, H.: CallRank: combating SPIT using call duration, social networks and global reputation. In: Proceedings of Fourth Conference on Email and Anti-Spam (2007)

    Google Scholar 

  27. Eagle, N., Pentland, A.S., Lazer, D.: Inferring friendship network structure by using mobile phone data. Proc. Natl. Acad. Sci. USA 106(36), 15274–15278 (2009)

    Article  Google Scholar 

  28. Ankolekar, A., Szabo, G., Luon, Y., Huberman, B.A.: Friendlee: a mobile application for your social life. In: Proceedings of the 11st International Conference on Human-Computer Interaction with Mobile Devices and Services (2009). doi:10.1145/1613858.1613893

    Google Scholar 

  29. Huang, J., Nicol, D.: A calculus of trust and its application to PKI and identity management. In: Proceedings of the Symposium on Identity and Trust on the Internet (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sang Oh Park.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kim, M., Park, S.O. Trust management on user behavioral patterns for a mobile cloud computing. Cluster Comput 16, 725–731 (2013). https://doi.org/10.1007/s10586-013-0248-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-013-0248-9

Keywords

Navigation