Abstract
Trust management systems give way to trustworthy interactions in cloud computing. However, malicious cloud users can intentionally provide unfair ratings to benefit or reduce a cloud provider’s reputation. This paper proposes a novel detection strategy to supervise cloud users’ feedback and detect unfair rating attacks for cloud environments based on the Fast Entropy metric and named Feedback Fast Entropy-based Detection strategy (FFED). The provided detection system monitors users’ ratings in successive short periods, detects the unfair rating attacks rapidly in real-time using fast entropy algorithm and permits the scale effectively. Through the performed experimental tests, we prove the good performances of the introduced system and its advantages.
Similar content being viewed by others
References
Gobi, N., Rathinavelu, A.: Analyzing cloud based reviews for product ranking using feature based clustering algorithm. Clust. Comput. 22(S3), 6977–6984 (2018). https://doi.org/10.1007/s10586-018-1996-3
Alhanahnah, M., Bertok, P., Tari, Z., Alouneh, S.: Context-aware multifaceted trust framework for evaluating trustworthiness of cloud providers. Future Gener. Comput. Syst. 79, 488–499 (2018). https://doi.org/10.1016/j.future.2017.09.071
Kumar, R.R., Kumari, B., Kumar, C.: CCS-OSSR: a framework based on hybrid MCDM for optimal service selection and ranking of cloud computing services. Clust. Comput. (2020). https://doi.org/10.1007/s10586-020-03166-3
Ruan, Y., Durresi, A.: A trust management framework for clouds. Comput. Commun. 144, 124–131 (2019). https://doi.org/10.1016/j.comcom.2019.05.018
Neeraj, G.M.S., Singh, D.: Satisfaction aware QoS-based bidirectional service mapping in cloud environment. Clust. Comput. 23(4), 2991–3011 (2020). https://doi.org/10.1007/s10586-020-03065-7
Sun, L.: An influence diagram based cloud service selection approach in dynamic cloud marketplaces. Clust. Comput. 22(S3), 7369–7378 (2017). https://doi.org/10.1007/s10586-017-1438-7
Jatoth, C., Gangadharan, G.R., Fiore, U., Buyya, R.: SELCLOUD: a hybrid multi-criteria decision-making model for selection of cloud services. Soft. Comput. 23(13), 4701–4715 (2018). https://doi.org/10.1007/s00500-018-3120-2
Chong, S.K., Abawajy, J., Ahmad, M., Hamid, I.R.A.: Enhancing trust management in cloud environment. Procedia Soc. Behav. Sci. 129, 314–321 (2014). https://doi.org/10.1016/j.sbspro.2014.03.682
Machhi, S., Jethava, G.B.: Feedback based trust management for cloud environment. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies. pp. 1–5 (2016)
Wang, D., Muller, T., Liu, Y., Zhang, J.:Towards robust and effective trust management for security: A survey. In: Proceedings of the IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. pp. 1–6. https://doi.org/10.1109/trustcom.2014.65(2014)
Fan, W., Perros, H.: A reliability-based trust management mechanism for cloud services. In: Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. pp. 1–6. https://doi.org/10.1109/trustcom.2013.194(2013)
Abdullah, A.M., Ali, H.A., Haikal, A.Y.: A reliable, TOPSIS-based multi-criteria, and hierarchical load balancing method for computational grid. Clust. Comput. 22(4), 1085–1106 (2019). https://doi.org/10.1007/s10586-018-02888-9
Chiregi, M., Navimipour, N.J.: A comprehensive study of the trust evaluation mechanisms in the cloud computing. J. Serv. Sci. Res. 9(1), 1–30 (2017). https://doi.org/10.1007/s12927-017-0001-7
Wang, M., Wang, G., Tian, J., Zhang, H., Zhang, Y.: An accurate and multi-faceted reputation scheme for cloud computing. Procedia Comput. Sci. 34, 466–473 (2014). https://doi.org/10.1016/j.procs.2014.07.021
Noor, T. H., Sheng, Q.Z.: Credibility-based trust management for services in cloud environments. In: Proceedings of the Service-Oriented Computing. pp. 328–343. https://doi.org/10.1007/978-3-642-25535-9_22(2011)
Qu, L., Wang, Y., Orgun, M.A.: Cloud service selection based on the aggregation of user feedback and quantitative performance assessment. In: Proceedings of the 2013 IEEE International Conference on Services Computing pp. 11–17. https://doi.org/10.1109/scc.2013.92(2013)
Nivethitha, S., Raman, M.R.G., Gireesha, O., Kannan, K., Sriram, V.S.S.: An improved rough set approach for optimal trust measure parameter selection in cloud environments. Soft Comput. 23(22), 11979–11999 (2019). https://doi.org/10.1007/s00500-018-03753-y
Qu, L., Wang, Y., Orgun, M., Wong, D.S., Bouguettaya, A.: Evaluating cloud users’ credibility of providing subjective assessment or objective assessment for cloud services. In: Proceedings of the Service-Oriented Computing. pp. 453–461 (2014)
Lu, L., Yuan, Y.: A novel TOPSIS evaluation scheme for cloud service trustworthiness combining objective and subjective aspects. J. Syst. Softw. 143, 71–86 (2018). https://doi.org/10.1016/j.jss.2018.05.004
Jiang, S.:Towards the design of robust trust and reputation systems. In: Proceedings of the 23rd International Joint Conference on Artificial Intelligence, in IJCAI 2013. pp. 3–10. Beijing, China (2013)
Hussain, A., Chun, J., Khan, M.: A novel framework towards viable cloud service selection as a service (CSSaaS) under a fuzzy environment. Future Gener. Comput. Syst. 104, 74–91 (2020). https://doi.org/10.1016/j.future.2019.09.043
Qu, L., Wang, Y., Orgun, M.:An uncertain assessment compatible incentive mechanism for eliciting continual and truthful assessments of cloud services. In: Proceedings of the Service-Oriented Computing. pp. 335–351. 10.1007/978-3-319-46295-0\_21 (2016)
Wickremasinghe, B., Prof, A., Contents, R.B.: Cloudanalyst: A cloudsim-based tool for modelling and analysis of large scale cloud computing environments. In: Proceedings of the International Conference on Advanced Information Networking and Applications. pp. 11–17 (2010)
Liu, S., Zhang, J., Miao, C., Theng, Y.L., Kot, A.C.: iclub: An integrated clustering-based approach to improve the robustness of reputation systems. In: Proceedings of the The 10th International Conference on Autonomous Agents and Multiagent Systems pp 1151–1152, http://dl.acm.org/citation.cfm?id=2034396.2034462 (2011)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Guesmi, H., Kalghoum, A., Ghazel, C. et al. FFED: a novel strategy based on fast entropy to detect attacks against trust computing in cloud. Cluster Comput 24, 1945–1954 (2021). https://doi.org/10.1007/s10586-021-03233-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-021-03233-3