Skip to main content
Log in

A comprehensive study of the trust evaluation mechanisms in the cloud computing

  • Research Papers
  • Published:
Journal of Service Science Research

Abstract

Cloud computing is a new model to enable convenient and on-demand access to the pool of configurable computing resources. In this kind of computing platform, the confidences are insufficient for the customers to identify the trustworthy cloud service providers. Therefore, one of the most important challenges in this environment is to evaluate the trust value to enable users for selecting the trustworthy resources, however, to the best of our knowledge, the comprehensive and detailed review of the most important techniques in this field is very rare. Hence, in this paper, the comprehensive and detailed study and survey of the state of the art techniques and mechanisms in this field are provided. Also, we discuss the trust evaluating mechanisms in the cloud computing and categorize them into two main groups including centralized and distributed mechanisms. Furthermore, we defined trust characteristics such as integrity, security, availability, reliability, dependability, safety, dynamicity, confidentiality and scalability, and we discuss the trust applications including monitoring and tracking. Also, this survey paper provides a discussion of differences between considered techniques in terms of integrity, security, availability, reliability, dependability, safety, dynamicity, confidentiality and scalability as well as directions for future research.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Abbadi IM & Alawneh M (2012) A framework for establishing trust in the Cloud. Computers & Electrical Engineering 38(5):1073–1087.

    Article  Google Scholar 

  • Abbadi IM (2013) A framework for establishing trust in Cloud provenance. International Journal of Information Security 12:111–128.

    Article  Google Scholar 

  • Adjei JK, Blackman C & Blackman C (2015) Explaining the role of trust in cloud computing services. info 17.

    Google Scholar 

  • Alamir P, Jafari Navimipour N, Ramage M, Ramage M, & Ramage M (2016) Trust evaluation between the users of social networks using the quality of service requirements and call log histories. Kybernetes 45(10).

  • Anselmi, J, Ardagna D, & Passacantando M (2014) Generalized Nash equilibria for SaaS/ PaaS Clouds. European Journal of Operational Research 236:326–339.

    Article  Google Scholar 

  • Avram MG (2014) Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology 12:529–534.

    Article  Google Scholar 

  • Aznoli F & and Navimipour NJ (2017) Cloud services recommendation: Reviewing the recent advances and suggesting the future research directions. Journal of Network and Computer Applications 77:73–86.

    Article  Google Scholar 

  • Chahal RK & Singh S (2016) Fuzzy Rule-Based Expert System for Determining Trustworthiness of Cloud Service Providers. International Journal of Fuzzy Systems 19(2):338–354.

    Article  Google Scholar 

  • Chiregi M & Navimipour NJ (2016a) A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders’ entities and removing the effect of troll entities. Computers in Human Behavior 60:280–292.

    Article  Google Scholar 

  • Chiregi M & Navimipour NJ (2016b) Trusted services identification in the cloud environment using the topological metrics. Karbala International Journal of Modern Science 2:203–210.

    Article  Google Scholar 

  • Dykstra J & Sherman AT (2012) Acquiring forensic evidence from infrastructure-as-aservice cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation 9:S90–S98.

    Article  Google Scholar 

  • Emeakaroha V, Fatema K, Vanderwerff L, Healy P, Lynn T, & Morrison J (2016) A Trust Label System for Communicating Trust in Cloud Services. IEEE Transactions on Services.

    Google Scholar 

  • Espadas J, Molina A, Jiménez G, Molina M, Ramírez R, & Concha D (2013) A tenant-based resource allocation model for scaling Software-as-a-Service applications over cloud computing infrastructures. Future Generation Computer Systems 29:273–286.

    Article  Google Scholar 

  • Fouladi P & Navimipour JN (2017) Human resources ranking in a cloud-based knowledge sharing framework using the quality control criteria. Kybernetes.

    Google Scholar 

  • Gajbhiye A & Shrivastva KMP (2014) Cloud computing: Need, enabling technology, architecture, advantages and challenges. in Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference:1-7.

    Google Scholar 

  • Gani A, Nayeem GM, Shiraz M, Sookhak M, Whaiduzzaman M, & Khan S (2014) A review on interworking and mobility Techniques for seamless connectivity In Mobile Cloud Computing. Journal of Network and Computer Applications 43:84–102.

    Article  Google Scholar 

  • Ghosh S & ME DR (2014) Enhanced Distributed Accountability Framework with Indexing In the Cloud and Its Security Analysis. The International Journal of Engineering and Science 3(3):1–6.

    Google Scholar 

  • Goel A & Goel S (2012) Security Issues in Cloud Computing. International Journal of Application or Innovation in Engineering & Management 1:121–124.

    Google Scholar 

  • Gupta HV, Brookshire DS, Tidwell VC, & Boyle DP (2013) A basis for linking policy to adaptive water management. Water Policy in New Mexico: Addressing the Challenge of an Uncertain Future 9.

    Google Scholar 

  • abib SM, Hauke S, Ries S, & Mühlhäuser M (2012), Trust as a facilitator in cloud computing: a survey. Journal of Cloud Computing 1:1–18.

    Article  Google Scholar 

  • Habib SM, Ries S, Mühlhäuser M, & Varikkattu P (2014) Towards a trust management system for cloud computing marketplaces: using caiq as a trust information source. Security and Communication Networks 7:2185–2200.

    Article  Google Scholar 

  • Jabbar S, Naseer K, Gohar M, Rho S, & Chang H (2016) Trust model at service layer of cloud computing for educational institutes. The Journal of Supercomputing 72(1):58–83.

    Article  Google Scholar 

  • Jadeja Y & Modi K (2012) Cloud computing-concepts, architecture and challenges. in Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on:877-880.

    Google Scholar 

  • afari Navimipour N, Masoud Rahmani A, Habibizad Navin A, & Hosseinzadeh M (2014) Job scheduling in the Expert Cloud based on genetic algorithms. Kybernetes 43:1262–1275.

    Article  Google Scholar 

  • afari Navimipour N, Rahmani AM, Habibizad Navin A, & Hosseinzadeh M (2015) Expert Cloud. Computers in Human Behavior 46:57–74.

    Article  Google Scholar 

  • afari Navimipour N, Rahmani AM, Navin AH, & Hosseinzadeh M (2015) Expert Cloud: A Cloud-based framework to share the knowledge and skills of human resources. Computers in Human Behavior 46:57–74.

    Article  Google Scholar 

  • Jaiganesh M, Aarthi M, & Kumar AVA (2015) Fuzzy ART-Based User Behavior Trust in Cloud Computing. in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, ed: Springer:341–348.

    Google Scholar 

  • Januzaj Y, Ajdari J, & Selimi B (2015) DBMS as a Cloud service: Advantages and Disadvantages. Procedia-Social and Behavioral Sciences 195:1851–1859.

    Article  Google Scholar 

  • Juan D & Zheng Q (2014) Cloud and open BIM-based building information interoperability research. Journal of Service Science and Management 2014.

    Google Scholar 

  • Keshanchi B & Navimipour NJ (2016) Priority-Based Task Scheduling in the Cloud Systems Using a Memetic Algorithm. Journal of Circuits, Systems and Computers:1650119.

    Google Scholar 

  • Keshanchi B, Souri A, & Navimipour NJ (2017) An improved genetic algorithm for task scheduling in the cloud environments using the priority queues: formal verification, simulation, and statistical testing. Journal of Systems and Software 124:1–21.

    Article  Google Scholar 

  • Khethavath P, Thomas J, Chan-Tin E, & Liu H (2013) Introducing aDistributed Cloud Architecture with Efficient Resource Discovery and Optimal Resource Allocation. in Services (SERVICES), 203 IEEE Ninth World Congress on:386-392.

    Google Scholar 

  • Ko RK, Jagadpramana P, Mowbray M, Pearson S, Kirchberg M, Liang Q (2011) TrustCloud: A framework for accountability and trust in cloud computing. in Services (SERVICES), 2011 IEEE World Congress on:584-588.

    Google Scholar 

  • Kumar R & Charu S (2015) An Importance of Using Virtualization Technology in Cloud Computing. Global Journal of Computers & Technology 1.

    Google Scholar 

  • Kumarga NP & Sireesha D (2014) Ensuring Data Integrity in Cloud Computing. International Journal of Computer Science & Network Security 14(9):34–38.

    Google Scholar 

  • Li X, Ma H, Zhou F, & Gui X (2015) Service operator-aware trust scheme for resource matchmaking across multiple clouds. IEEE Transactions on Parallel and Distributed Systems 26:1419–1429.

    Article  Google Scholar 

  • Li Z, De Souza R, & Goh M (2016) Supply Chain Orchestration Leveraging on MNC Networks and Local Resources: Approach Strategies. Journal of Service Science and Management 9:303.

    Article  Google Scholar 

  • Lin G, Wang D, Bie Y, & Lei M (2014) MTBAC: A mutual trust based access control model in cloud computing. China Communications 11:154–162.

    Google Scholar 

  • Liu YC, Ma YT, Zhang HS, Li DY, & Chen GS (2011) A method for trust management in cloud computing: Data coloring by cloud watermarking. International journal of automation and computing 8: 280–285.

    Article  Google Scholar 

  • Lynn T, van der Werff L, Hunt G, & Healy P (2016) Development of a Cloud Trust Label: A Delphi Approach. Journal of Computer Information Systems 56:185–193.

    Article  Google Scholar 

  • Manuel P (2013) A trust model of cloud computing based on Quality of Service. Annals of Operations Research:1–12.

    Google Scholar 

  • Matos R, Marques C, & Sargento S (2014) Context-aware control of user-centric virtual networks: Centralized vs distributed approaches. Computer Networks 74:4–21.

    Article  Google Scholar 

  • Mei S, Wang Z, Cheng Y, Ren J, Wu J, & Zhou J (2012) Trusted bytecode virtual machine module: a novel method for dynamic remote attestation in cloud computing. International Journal of Computational Intelligence Systems 5(5):924–932.

    Article  Google Scholar 

  • Mendes C, Almeida M, & Da Silva MM (2013) Applying DEMO-based SLAs to cloud services. Journal of Service Science Research 5:95–123.

    Article  Google Scholar 

  • Milani AS & Navimipour NJ (2016) Load balancing mechanisms and techniques in the cloud environments: Systematic literature review and future trends. Journal of Network and Computer Applications.

    Google Scholar 

  • ohammad Aghdam S & Jafari Navimipour N (2016) Opinion leaders selection in the social networks based on trust relationships propagation. Karbala International Journal of Modern Science 2(2):88–97.

    Article  Google Scholar 

  • Mohammadi SZ & Navimipour JN (2017) Invalid cloud providers’ identification using the support vector machine. International Journal of Next-Generation Computing.

    Google Scholar 

  • Moyano F, Fernandez-Gago C, & Lopez J (2013) A framework for enabling trust requirements in social cloud applications. Requirements Engineering 18:321–341.

    Article  Google Scholar 

  • Mpofu N & van Staden WJ (2014) A survey of trust issues constraining the growth of Identity Management-as-a-Service (IdMaaS). in Information Security for South Africa (ISSA) 2014:1–6.

    Google Scholar 

  • Navimipour NJ (2015) A formal approach for the specification and verification of a Trustworthy Human Resource Discovery mechanism in the Expert Cloud. Expert Systems with Applications 42:6112–6131.

    Article  Google Scholar 

  • Navimipour NJ (2015) Task scheduling in the cloud environments based on an artificial bee colony algorithm. in Proceedings of the Paper Presented at the International Conference on Image Processing, Production and Computer Science, Istanbul (Turkey).

    Google Scholar 

  • Navimipour NJ, Rahmani AM, Navin AH, & Hosseinzadeh M (2014) Resource discovery mechanisms in grid systems: A survey. Journal of Network and Computer Applications 41:389–410.

    Article  Google Scholar 

  • Noor TH, Sheng QZ, & Bouguettaya A (2014) Trust Management in Cloud Services: Springer.

    Book  Google Scholar 

  • Noor TH, Sheng QZ, Maamar Z, & Zeadally S (2016) Managing Trust in the Cloud: State of the Art and Research Challenges. Computer 49:34–45.

    Article  Google Scholar 

  • Noor TH, Sheng QZ, Yao L, Dustdar S, & Ngu AH (2016) CloudArmor: Supporting reputation-based trust management for cloud services. IEEE transactions on parallel and distributed systems 27:367–380.

    Article  Google Scholar 

  • Paquette S, Jaeger PT, & Wilson SC (2010) Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly 27:245–253.

    Article  Google Scholar 

  • Patel N & Chauhan S (2015) A Survey On Load Balancing and Scheduling in cloud computing. International Journal for Scientific Research and Development 1:185–189.

    Google Scholar 

  • Pathan ASK & Mohammed MM (2015) Building Customer trust in cloud computing with an ICT-enabled global regulatory body. Wireless Personal Communications 85:77–99.

    Article  Google Scholar 

  • Patil P (2015) Cloud Security Issues. Journal of Information Engineering and Applications 5: 31–34.

    Google Scholar 

  • Perez JMM, Bernabe JB, Calero JMA, Clemente FJG, Perez GM, & Skarmeta AFG (2014) Taxonomy of trust relationships in authorization domains for cloud computing. The Journal of Supercomputing 70:1075–1099.

    Article  Google Scholar 

  • Puthal D, Sahoo B, Mishra S, & Swain S (2015) Cloud computing features, issues, and challenges: a big picture. in Computational Intelligence and Networks (CINE), 2015 International Conference on:116-123.

    Google Scholar 

  • Rajendran VV & Swamynathan S (2015) Hybrid model for dynamic evaluation of trust in cloud services. Wireless Networks 22(6): 807–1818.

    Google Scholar 

  • Sadashiv N & Kumar SD (2011) Cluster, grid and cloud computing: A detailed comparison. in Computer Science & Education (ICCSE), 2011 6th International Conference on: 477-482.

    Google Scholar 

  • Salot P (2013) A Survey Of Various Scheduling Algorithm In Cloud Computing Environment. International Journal of research and engineering Technology (IJRET) 2.

    Google Scholar 

  • Selvaraj A & Sundararajan S (2017) Evidence-Based Trust Evaluation System for Cloud Services Using Fuzzy Logic. International Journal of Fuzzy Systems 19(2):329–337.

    Article  Google Scholar 

  • Shahzad F (2014) State-of-the-art survey on cloud computing security Challenges, approaches and solutions. Procedia Computer Science 37:357–362.

    Article  Google Scholar 

  • Sheikholeslami F & Navimipour JN (2017) Service allocation in the cloud environments using multi-objective particle swarm optimization algorithm based on crowding distance. Swarm and Evolutionary Computation.

    Google Scholar 

  • Sidhu J & Singh S (2016) Improved TOPSIS Method Based Trust Evaluation Framework for Determining Trustworthiness of Cloud Service Providers. Journal of Grid Computing: 1–25.

    Google Scholar 

  • So K (2011) Cloud computing security issues and challenges. International Journal of Computer Networks 3.

    Google Scholar 

  • Srinivasan S (2014) Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments:IGI Global.

    Book  Google Scholar 

  • Subashini S & Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34:1–11.

    Article  Google Scholar 

  • Sun D, Chang G, Sun L, & Wang X (2011) Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Engineering 15:2852–2856.

    Article  Google Scholar 

  • Takabi H, Joshi JB, & Ahn GJ (2010) Security and Privacy Challenges in Cloud Computing Environments. IEEE Security & Privacy 8:24–31.

    Article  Google Scholar 

  • Tan W, Sun Y, Li LX, Lu G, & Wang T (2014) A trust service-oriented scheduling model for workflow applications in cloud computing. IEEE Systems Journal 8:868–878.

    Article  Google Scholar 

  • Tang M, Dai X, Liu J, & Chen J (2016) Towards a trust evaluation middleware for cloud service selection. Future Generation Computer Systems.

    Google Scholar 

  • Tchifilionova V (2011) Security and privacy implications of cloud computing-Lost in the cloud. in Open Research Problems in Network Security, ed: Springer:149–158.

    Chapter  Google Scholar 

  • Tian LQ, Lin C, & Ni Y (2010) Evaluation of user behavior trust in cloud computing. in 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

    Google Scholar 

  • Vakili A & Navimipour NJ (2017) Comprehensive and systematic review of the service composition mechanisms in the cloud environments. Journal of Network and Computer Applications 81:24–36.

    Article  Google Scholar 

  • Vaquero LM, Rodero-Merino L, & Morán D (2011) Locking the sky: a survey on IaaS cloud security. Computing 91:93–118.

    Article  Google Scholar 

  • Wang W, Zeng G, Tang D, & Yao J (2012) Cloud-DLS: Dynamic trusted scheduling for Cloud computing. Expert Systems with Applications 39:2321–2329.

    Article  Google Scholar 

  • Wang Y, Chandrasekhar S, Singhal M, & Ma J (2016) A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing. Cluster Computing 19(2):647–662.

    Article  Google Scholar 

  • Wu L, Kumar Garg S, & Buyya R (2012) SLA-based admission control for a Software-as-a-Service provider in Cloud computing environments. Journal of Computer and System Sciences 78:1280–1299.

    Article  Google Scholar 

  • Wu X, Zhang R, Zeng B, & Zhou S (2013) A trust evaluation model for cloud computing. Procedia Computer Science 17:1170–1177.

    Article  Google Scholar 

  • Xie X, Liu R, Cheng X, Hu X, & Ni J (2016) Trust-Driven and PSO-SFLA based job scheduling algorithm on Cloud. Intelligent Automation & Soft Computing 22(4):1–6.

    Article  Google Scholar 

  • Yang Z, Qiao L, Liu C, Yang C, & Wan G (2010) A collaborative trust model of firewall through based on Cloud Computing. in Computer Supported Cooperative Work in Design (CSCWD), 2010 14th International Conference on:329-334.

    Google Scholar 

  • Zhou L, Varadharajan V, & Hitchens M (2015) Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage. IEEE Transactions on Information Forensics and Security 10:2381–2395.

    Article  Google Scholar 

  • Zissis D & Lekkas D (2012) Addressing cloud computing security issues. Future Generation Computer Systems 28:583–592.

    Article  Google Scholar 

  • Zou D, Zhang W, Qiang W, Xiang G, Yang LT, Jin H, & Hu K (2013) Design and implementation of a trusted monitoring framework for cloud platforms. Future Generation Computer Systems 29:2092–2102.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nima Jafari Navimipour.

Additional information

Matin Chiregi received her B.S. in software engineer from Ahrar Branch, Rasht, Iran, in 2011; the M.S. in software engineer, from Tabriz Branch, Islamic Azad University, Tabriz, Iran, in 2015. Her research interests include cloud computing.

Nima Jafari Navimipour received his B.S. in computer engineering, software engineering, from Tabriz Branch, Islamic Azad University, Tabriz, Iran, in 2007; the M.S. in computer engineering, computer architecture, from Tabriz Branch, Islamic Azad University, Tabriz, Iran, in 2009; the Ph.D. in computer engineering, computer architecture, from Science and Research Branch, Islamic Azad University, Tehran, Iran in 2014. He is an assistance professor in the Department of Computer Engineering at Tabriz Branch, Islamic Azad University, Tabriz, Iran. He has published more than 100 papers in various journals and conference proceedings. His research interests include Cloud Computing, Social Networks, Fault-Tolerance Software, Computational Intelligence, Evolutionary Computing, and Network on Chip.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chiregi, M., Navimipour, N.J. A comprehensive study of the trust evaluation mechanisms in the cloud computing. J Serv Sci Res 9, 1–30 (2017). https://doi.org/10.1007/s12927-017-0001-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12927-017-0001-7

Keywords

Navigation