skip to main content
10.1145/2905055.2905330acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

Feedback based Trust Management for Cloud Environment

Published: 04 March 2016 Publication History

Abstract

Trust is most challenging issue for the growth and adoption of cloud computing but the trust management systems are becoming apparent and promising technology to better the e-commerce providers and consumers relationship. Various trust models are proposed for managing trust feedbacks but reliability of trust feedback is generally ignored. It is very difficult to maintain trust feedback due to dynamic nature of cloud and unpredictable number of cloud users for service. Although it is very important to find the reliability of trust feedbacks because unreliable trust feedback can generate inaccurate trust results. This paper introduces the challenges and threats that can compromise the trust system. We proposed the trust management framework that can effectively filter out the unreliable feedback based on the behavior of cloud users, ageing factor, majority feedbacks and exogenous method and measure the trustworthiness of service provider. This proposed framework can produce accurate trust results and valuated and compared with existing system.

References

[1]
Sheikh Mahbub Habib, Sebastian Ries, Max Muhlhauser, Towards a Trust Management System for Cloud Computing, IEEE Trust, Security and Privacy in computing and Communications(TrustCom), Pages 933--939, 2013
[2]
B.Kezia Rani, Dr.B.Padmaja Rani, Dr. A. Vinaya Babu, Cloud Computing and Inter-Clouds-Types, Topologies and Research Issues, ELSEVIER, Volume 50, Pages 24--29, 2015
[3]
Sheikh Mahbub Habib, Sascha Hauke, Sebastian Ries and Max Muhlhauser, Trust as a Facilitator in Cloud Computing: A survey, Journal of Cloud Computing, 1:19, 2012
[4]
Rajkumar Buyya, Christian Vecchiola, Thamarai Selvi, Mastering in Cloud Computing, Morgan Kaufmann, May 2013
[5]
Maricela-Georgiana Avram, Advantages and challenges of adopting cloud computing from an enterprise perspective, ELSEVIER, Volume 12, Pages 529--534, 2014
[6]
Soon-Keow Chong, Jemal Abawajy, Masitah Ahmad, Isredza Rahmi, Enhancing Trust Management in Cloud Environment, ELSEVIER, Volume 129, Pages 314--321, 2014
[7]
Dawei Sun, Guran Chang, Lina Sun, Xingwei Wang, Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments, ELSEVIER, Volume 15, Pages 2852--2856, 2011
[8]
Khald M. Khan and Qutalbah Malluhi, Establishing Trust in cloud computing, Qatar University, IEEE IT professional, Volume 12(5), 2010
[9]
Talal H. Noor and Quan Z. Sheng, Trust as Service: A framework for Trust Management in Cloud Environments, Springer, Volume 6997, Pages 314--321,2011
[10]
Rizwanna Shaikh, Dr. M. Sashikumar, Trust Model for Measuring Security Strength of Cloud Computing Service, ELSEVIER, Volume 45, Pages 380--389, 2015
[11]
Paul Manuel, Thamarai Selvi Somasundaram, A Novel Trust management System for Cloud Computing -- IaaS Providers, ResearchGate Journal of Combinatorial Mathematics and Combinatorial Computing, 79:3--22, 2011
[12]
Soon-Keow Chong, Jemal Abawajy, Isredza Rahmi A. Hamid, Masitah Ahmad, A Multilevel Trust Management Framework for Service Oriented Environment, Elsevier, 129:396--405, 2013
[13]
Dongxia Wang, Tim Mullerr, Yang Liu and Jie Zhang, Towards Robust and Effective Trust Management for Security: A Survey, ACM, 2014
[14]
Satyajeet N Srujan Kotikela, Mahadevan Gomathisankaran, CTrust: A framework for Secure and Trustworthy application execution in Cloud Computing, International Conference on Cyber Security", 2012
[15]
Manoj Kumar Muchahari, Smriti Kumar Sinha, A New Trust Management Architecture for Cloud Computing Environments, IEEE International Symposium on Cloud and Services Computing (ISCOS0), 2012
[16]
Edna Dias, de Sousa, R T, de Carvalho, R.R., de Oliveira Albuquerque R., Trust Model for Private Cloud, IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensic(CyberSec), 2012
[17]
Talal H. Noor, Quan Z. Sheng, Lina Yao, Schahram Dustdar, Anne H.H. Ngu, CloudArmor: Supporting Reputation-based Trust Management for Cloud Services, IEEE Transactions on parallel and Distributed Systems, 2014
[18]
L. Xiong and L. Liu, Peertrust: Supporting Reputation-based Trust for Peer-to-Peer Electronic Communications, IEEE Transactions on Knowledge and Data Engineering, volume 16, no. 7, pp. 843--857, 2004
[19]
A. A. Irissappane, S. Jiang, and J. Zhang, A Biclustering-based approach to filter dishonest advisors in multi-criteria e-marketplace, In Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, pages 1385--1386, 2014
[20]
S. Liu, J. Zhang, C. Miao, Y. L. Theng, and A. C. Kot, An integrated clustering-based approach to improve the robustness of reputation systems, In Proceeding s of the 10th International Conference on Autonomous Agents and Multi agent System, Volume 3, pages 1151--1152, 2011
[21]
Y. L. Sun, Z. Han, W.Yu and K. R. Liu, A trust evaluation framework in distributed networks: Vulnerability analysis and defence against attacks, In Proceeding s of the 25th International Conference on Computer Communication, IEEE, pages 1--13, 2006
[22]
L. Xiong and L. Liu, Peertrust: Supporting Reputation-based trust for peerr-to-peer electronic communities, 16(7):843--857, 2004
[23]
Rizwana Shaikh, M. Sasikumar, Trust Framework for Calculating Security Strength of Cloud Service, IEEE International Conference on Communication, Information & Computing Technology, 2012
[24]
Whitby, a. Josang A. & Indulska, J., Filtering out malicious ratings in Bayesian reputation system. In proceeding 7th Int. workshop on Trust in Agent Societies.
[25]
Lin Guoyuan, Wang Danru, Bie Yuyu, LEI Min, MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing, IEEE, 154--162, 2014
[26]
Josang, A. and Quattroiocchi, Advanced features in Bayesian reputation systems, Trust, Privacy and Secuirty in Digital Business, Vol. 5695, Heidelberg: Springer, pp. 105--114,2009
[27]
Child, I.: The Psychological Meaning of Aesthestic Judgments. Visual Arts Research 9(2(18)),51--59 (1983)

Cited By

View all
  • (2023)Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systemsService Oriented Computing and Applications10.1007/s11761-023-00377-517:4(239-257)Online publication date: 21-Sep-2023
  • (2021)FFED: a novel strategy based on fast entropy to detect attacks against trust computing in cloudCluster Computing10.1007/s10586-021-03233-324:3(1945-1954)Online publication date: 1-Sep-2021
  • (2020)Incremental collusive fraud detection in large-scale online auction networksThe Journal of Supercomputing10.1007/s11227-020-03170-9Online publication date: 25-Jan-2020
  • Show More Cited By
  1. Feedback based Trust Management for Cloud Environment

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
    March 2016
    843 pages
    ISBN:9781450339629
    DOI:10.1145/2905055
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 March 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cloud Computing
    2. Malicious Feedback
    3. Trust Management

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICTCS '16

    Acceptance Rates

    Overall Acceptance Rate 97 of 270 submissions, 36%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)10
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 02 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systemsService Oriented Computing and Applications10.1007/s11761-023-00377-517:4(239-257)Online publication date: 21-Sep-2023
    • (2021)FFED: a novel strategy based on fast entropy to detect attacks against trust computing in cloudCluster Computing10.1007/s10586-021-03233-324:3(1945-1954)Online publication date: 1-Sep-2021
    • (2020)Incremental collusive fraud detection in large-scale online auction networksThe Journal of Supercomputing10.1007/s11227-020-03170-9Online publication date: 25-Jan-2020
    • (2020)Trustworthy Cloud ComputingData Privacy and Trust in Cloud Computing10.1007/978-3-030-54660-1_7(129-145)Online publication date: 14-Oct-2020
    • (2019)Trust Establishment and Estimation in Cloud ServicesJournal of Network and Systems Management10.1007/s10922-018-9475-y27:2(489-540)Online publication date: 1-Apr-2019
    • (2018)Classifying Cloud Computing Challenges: A Taxonomy ProposalTrends and Advances in Information Systems and Technologies10.1007/978-3-319-77703-0_85(877-886)Online publication date: 2018
    • (2017)Feedback Entropy: A New Metric to Detect Unfair Rating Attacks for Trust Computing in Cloud Environments2017 IEEE Trustcom/BigDataSE/ICESS10.1109/Trustcom/BigDataSE/ICESS.2017.282(538-545)Online publication date: Aug-2017
    • (2017)A Trust Reputation Architecture for Cloud Computing Environment2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA)10.1109/AICCSA.2017.31(614-621)Online publication date: Oct-2017

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media