Abstract
With the development of ubiquitous computing technology, users are using mobile devices which are for producing and accessing information. Due to the limited computing capability and storage, however, mobile cloud computing technology are emerging research issues in the architecture, design, and implementation. This paper proposes the trust management approach by analyzing user behavioral patterns for reliable mobile cloud computing. For this, we suggest a method to quantify a one-dimensional trusting relation based on the analysis of telephone call data from mobile devices. After that, we integrate inter-user trust relationship in mobile cloud environment. As a result, trustworthiness of data in data production, management, overall application, is enhanced.
Similar content being viewed by others
References
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7–18 (2010)
Katsaros, D., Mehra, P., Pallis, G., Vakali, A.: Cloud computing: distributed Internet computing for IT and scientific research. IEEE Internet Comput. 13(5), 10–13 (2009)
Gnanasekar, J.M., Ponmagal, R.S., Anbalagan, P.: In: Integration of Wireless Sensor Network with Cloud, International Conference on Recent Trends in Information, Telecommunication and Computing, pp. 321–323 (2010)
Bubendorfer, K., Caton, S., Rana, O.F.: Social cloud computing: a vision for socially motivated resource sharing. IEEE Trans. Serv. Comput. 5(4), 551–563 (2012)
Pallis, G.: Cloud computing: the new frontier of Internet computing. IEEE Internet Comput. 14(5), 70–73 (2010)
Dinh, H.T., Lee, C., Niyato, D., Wang, P.: A survey of mobile cloud computing: architecture, applications and approaches. Wirel. Commun. Mob. Comput. Published Online (2011). doi:10.1002/wcm.1203
Yeo, S., Venugopal, S., Chu, X., Buyya, R.: Autonomic metered pricing for a utility computing service. Future Gener. Comput. Syst. 26, 1368–1380 (2010)
Heurta-Canepa, G., Lee, D.: A virtual cloud computing provider for mobile devices. In: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services, p. 6 (2010)
Christensen, J.H.: Using RESTful web-services and cloud computing to create next generation mobile applications. In: Proceedings of the 24th ACM SIGPLAN Conference Companion on Object Oriented Programming Systems Languages and Applications, pp. 627–634 (2009)
Rimal, B.P.: A taxonomy and survey of Cloud computing systems. In: Fifth International Joint Conference on INC, IMS and IDC, pp. 44–51 (2009)
Takabi, H.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)
Amazon, W.: Services EC2. http://aws.amazon.com/ec2/
Amazon Simple Storage Service(Amazon S3), http://aws.amazon.com/s3/
Google App Engine: https://developers.google.com/appengine/
Microsoft Azure: http://www.windowsazure.com
OpenSocial: http://www.opensocial.org/
PolarGrid: http://www.polargrid.org/
OpenID: http://openid.net/
Kim, M., Seo, J., Noh, S., Han, S.: Identity management-based social trust model for mediating information sharing and privacy enhancement. Secur. Commun. Netw. 5(8), 887–897 (2012)
Kim, M., Park, S.: Group affinity based social trust model for an intelligent movie recommender system. Multimed. Tools Appl. 64(2), 505–516 (2013)
Kim, S., Han, S.: The method of inferring trust in web-based social network using fuzzy logic. In: International Workshop on Machine Intelligence Research (2009)
Barabasi, A.L., Jeong, H., Neda, Z., Ravasz, E., Schubert, A., Vicsek, T.: Evolution of the social network of scientific collaborations. Physica A 311(3–4), 590–614 (2002)
Dorogovtsev, S.N., Mendes, J.F.F.: Evolution of networks. Adv. Phys. 51(4), 1079–1187 (2002)
Kuada, E., Olesen, H.: A social network approach to provisioning and management of cloud computing services for enterprises. In: Proc. of Cloud Computing, pp. 98–104 (2011)
Balasubramaniyan, V.A., Ahamad, M., Park, H.: CallRank: combating SPIT using call duration, social networks and global reputation. In: Proceedings of Fourth Conference on Email and Anti-Spam (2007)
Eagle, N., Pentland, A.S., Lazer, D.: Inferring friendship network structure by using mobile phone data. Proc. Natl. Acad. Sci. USA 106(36), 15274–15278 (2009)
Ankolekar, A., Szabo, G., Luon, Y., Huberman, B.A.: Friendlee: a mobile application for your social life. In: Proceedings of the 11st International Conference on Human-Computer Interaction with Mobile Devices and Services (2009). doi:10.1145/1613858.1613893
Huang, J., Nicol, D.: A calculus of trust and its application to PKI and identity management. In: Proceedings of the Symposium on Identity and Trust on the Internet (2009)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, M., Park, S.O. Trust management on user behavioral patterns for a mobile cloud computing. Cluster Comput 16, 725–731 (2013). https://doi.org/10.1007/s10586-013-0248-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-013-0248-9