Cloud Service Selection based on the Credibility persistency of Users’ Feedbacks

Document Type : Persian Original Article

Authors

1 Computer Engineering Department, University of Applied Science & Technology, Tehran, Iran

2 Computer Engineering Department, Iran University of Science and Technology, Tehran, Iran

Abstract

Nowadays, trust is a major topic under discussion in the cloud computing environments. The existence of a mechanism for building and preserving trust among service consumers and providers is a critical component in the success of providing cloud services. Therefore, computational trust in cloud computing environments has turned into a considerable concern. The lack of trust among service providers and consumers may result in the reduction of the general appeal for the acceptance of cloud services among users. In other words, even though the services provided by each vendor maybe similar in terms of functionality, they may vastly differ in terms of quality of service. For this reason, a false choice in selecting a service may have devastating impacts on the requirements and goals of the end-user. To this aim, in this paper, a computational trust model based on the credibility of users’ feedbacks for the calculation of services’ trustworthiness is introduced. The proposed model, not only takes into account the existing experiences that other users have with a service provider, but also considers the credibility of such feedbacks as well as the persistency of correct and constructive feedbacks through time. In the end, the efficiency of the proposed model is investigated through a series of evaluation scenarios and it is shown that the proposed model is capable of accurately calculating the trustworthiness of the system. Such accuracy is maintained even in the presence of malicious users.

Keywords


[1]           A. S. Tanenbaum and M. Van Steen, Distributed Systems: Principles and Paradigms, Prentice-Hall, 2007.
[2]           R. K. Ko et al., "TrustCloud: A framework for accountability and trust in cloud computing," in Proceedings of the 2011 IEEE World Congress on Services (SERVICES), U.S, Washington, 04-09 July, 2011, pp. 584-588.
[3]           J. W. Rittinghouse and J. F. Ransome, Cloud Computing: Implementation, Management, and Security, CRC press, 2016.
[4]           I. Foster, Y. Zhao, I. Raicu, and S. Lu, "Cloud computing and grid computing 360-degree compared," in Proceedings of the IEEE Grid Computing Environments Workshop(GCE'08), U.S, Austin, 16-18 November, 2008, pp. 1-10.
[5]           M. Almorsy, J. Grundy and I. Müller, "An analysis of the cloud computing security problem," arXiv preprint, arXiv:1609.01107, 2016.
[6]           K. Hildrum, J. D. Kubiatowicz, S. Rao, and B. Y. Zhao, "Distributed object location in a dynamic network," Theory of Computing Systems, vol. 37, no. 3, pp. 405-440, 2004.
[7]           S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A Scalable Content-addressable Network, in Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, U.S, California, October 2001, pp.161-172.
[8]           X. Sun, G. Chang, and F. Li, "A trust management model to enhance security of cloud computing environments," in Proceedings of the 2nd International Conference on Networking and Distributed Computing (ICNDC), China, Beiging, 21-24 September, 2011, pp. 244-248.
[9]           H. Yu, Z. Shen, C. Leung, C. Miao, and V. R. Lesser, "A survey of multi-agent trust management systems," IEEE Access, vol. 1, no. 2, pp. 35-50, 2013.
[10]         D. Zissis and D. Lekkas, "Addressing cloud computing security issues," Future Generation Computer Systems, vol. 28, no. 3, pp. 583-592, 2012.
[11]         Z. Raghebi and M. R. Hashemi, "A new trust evaluation method based on reliability of customer feedback for cloud computing," in Proceedings of the 10th International ISC Conference on Information Security and Cryptology (ISCISC), Iran, Yazd,29-30 August, 2013, pp. 1-6.
[12]         W. Viriyasitavat and A. Martin, "A survey of trust in workflows and relevant contexts," IEEE Communications Surveys & Tutorials, vol. 14, no. 3, pp. 911-940, 2012.
[13]         J. Song and Q. Song, "Research and application on recommendation trust model in distributed network system," Applied Mechanics and Materials, 2014, vol. 687, pp. 2063-2066.
[14]         N. H. Hussein and A. Khalid, "A survey of cloud computing security challenges and solutions," International Journal of Computer Science and Information Security, vol. 14, no. 1, p. 52, 2016.
[15]         S. M. Habib, S. Ries, and M. Muhlhauser, "Towards a trust management system for cloud computing," in Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), China, Shanghai, 16-18 November, 2011, pp. 933-939.
[16]         S. Pearson and A. Benameur, "Privacy, security and trust issues arising from cloud computing," in Proceedings of the IEEE 2nd International Conference on Cloud Computing, Technology and Science (CloudCom),U.S, Indiana, 30 November - 03 December, 2010, pp. 693-702.
[17]         K. Gokulnath and R. Uthariaraj, "A Survey on Trust Models in Cloud Computing," Indian Journal of Science and Technology, vol. 9, no. 47, 2016.
[18]         J. Huang and D. M. Nicol, "Trust mechanisms for cloud computing," Journal of Cloud Computing: Advances, Systems and Applications, vol. 2, no. 1, pp. 1-9, 2013.
[19]         G. D’Angelo, S. Rampone, F. Palmieri, "Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification," Soft Computing, vol. 21, no. 21, pp. 6297-6315, 2017.
[20]         J. Jiang, G. Han, L. Shu, "A Trust model based on cloud theory in underwater acoustic sensor networks” IEEE Transactions on Industrial Informatics, vol. 13, no. 1, pp. 342-350, 2017.
[21]         R. Costa Cardoso, A. Gomes, M. Freire, "A user trust system for online games: A subjective logic approach for trust inference” IEEE Transactions on Computational Intelligence and AI in Games, vol. 9, no. 4, pp. 354-368, 2017.
[22]         S. Muhammad, L.Wang, B. Yamin, " Trust model based uncertainty analysis between multi-path routes in MANET using subjective logic," in Proceedings of the China Conference on Wireless Sensor Networks, China, Tianjin, 12-14 October, 2011, pp. 319-332.
[23]         A. Koster, A. Bazzan, M. Souza, "Liar liar, pants on fire; or how to use subjective logic and argumentation to evaluate information from untrustworthy sources” Artificial Intelligence Review, vol. 48, no. 2, pp. 219-235, 2017.
[24]         W. Zhang et al., "A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks” The Journal of Supercomputing, vol. 74, no. 4, pp. 1779-1801, 2018.
[25]         V. Busi Reddy, S.Venkataraman, A. Negi, " Communication and data trust for wireless sensor networks using D–S theory” IEEE Sensor Journal, vol. 17, no. 12, pp. 3921-3929, 2017.
[26]         K. Sharma et al., "Trust computation in VANET using TOEFV” International Journal of Trust Management in Computing and Communications, vol. 4, no. 1, https://doi.org/10.1504/IJTMCC.2017.089591, 2017.
[27]         A. Kumai Jain, V. Tokekar, S. Shrivastava "Security enhancement in MANETs using fuzzy-based trust computation against black hole attacks” Advances in Intelligent Systems and Computing Book Series, vol. 5, no. 3, pp.39-47, 2017.
[28]         K. Singh, A. Kumar Verma, " A fuzzy-based trust model for flying ad hoc networks ( FANETs)” International Journal of Communication Systems, vol. 31, no. 6, pp. 341-453, 2018.
[29]         Z.Yang, J. Luo, " A behavior trust model based on fuzzy logiv in cloud environments ” International Journal of Performability Engineering, vol. 14, no. 4, pp. 665-672, 2018.
[30]         J. Cho, I.R. Chen, " PROVEST: Provenance-based trust model for delay tolerant networks ” IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 1, pp. 151-165, 2018.
[31]         S. Das et al., " A Markov-based model for information security risk assesment in healthcare MANETs ” Information Systems Frontiers, https://doi.org/10.1007/s10796-017-9809-4, pp. 1-19, 2017.
[32]         Z. Yan, P. Zhang, and A. V. Vasilakos, "A security and trust framework for virtualized networks and software‐defined networking," Security and Communication Networks, vol. 9, no. 16, pp. 3059-3069, 2016.
[33]         H. Toumi, A. Talea, B. Marzak, A. Eddaoui, and M. Talea, "Cooperative trust framework for cloud computing based on mobile agents," International Journal of Communication Networks and Information Security, vol. 7, no. 2, p. 106, 2015.
[34]         A. Rowstron and P. Druschel, "Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems," in Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms and Open Distributed Processing, U.S, New York, 4-7 April, 2001, pp. 329-350.
[35]         T. Noor and Q. Sheng, "Trust as a service: A framework for trust management in cloud environments," Web Information System Engineering, pp. 314-321, 2011.
[36]         T. H. Noor, Q. Z. Sheng, A. H. Ngu, A. Alfazi, and J. Law, "Cloud armor: a platform for credibility-based trust management of cloud services," in Proceedings of the 22nd  ACM International Conference on Information & Knowledge Management, U.S, San Fransisco, 27 October - 01 November, 2013, pp. 2509-2512.
[37]         T. H. Noor, Q. Z. Sheng, and A. Alfazi, "Reputation attacks detection for effective trust assessment among cloud services," in Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Austrailia, Melbourne, 16-18 July,2013, pp. 469-476.
[38]         Z. Malik and A. Bouguettaya, "RATEWeb: Reputation Assessment for Trust Establishment among Web Services,” The VLDB Journal, vol. 18, No. 4, 2009, pp. 885-911.