Cloud service evaluation model based on trust and privacy-aware

Abstract In order to select an efficient cloud service, it can be trust and meet the user’s privacy protection requirements. This paper proposes a cloud service evaluation model based on trust and privacy-aware. The model introduces the time decay factor to solve the problem that the trust dynamic change over time, taking into account different transaction amount given different weights, it designs the direct trust calculation method based on service attributes and combining weights, reflecting the direct trust timeliness, rationality. In order to protect the privacy of the feedback node, a data protection method based on normal cloud model to data privacy protection, at the same time, the introduction of customer satisfaction, decay time, transaction amount, penalty factor for dynamic trust updates, so the trust value is more accurate. Simulation results show that the cloud service evaluation model can not only adapt to the dynamic changes in the environment, but also to ensure that the actual quality of service, fraud and malicious evaluation of malicious entities have a certain ability to resist.

[1]  T. Vengattaraman,et al.  Data privacy breach prevention framework for the cloud service , 2015, Secur. Commun. Networks.

[2]  Minglu Li,et al.  Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing , 2014, Comput. Secur..

[3]  Lingdi Ping,et al.  CLOUD SERVICE DISCOVERY ALGORITHM BASED ON TRUST FUZZY COMPREHENSIVE EVALUATION , 2012 .

[4]  Liang Guo,et al.  Trust evaluation model of cloud manufacturing service platform , 2014 .

[5]  Jinjun Chen,et al.  HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications , 2015, IEEE Transactions on Parallel and Distributed Systems.

[6]  Wen-Guey Tzeng,et al.  Preserving user query privacy in cloud-based security services , 2014, J. Comput. Secur..

[7]  Jingsha He,et al.  Trust Based Service Optimization Selection for Cloud Computing , 2015, MUE 2015.

[8]  Zhiqiang Yao,et al.  A hybrid push protocol for resource monitoring in cloud computing platforms , 2016 .

[9]  Félix J. García Clemente,et al.  Precise: Privacy-aware recommender based on context information for cloud service environments , 2014, IEEE Communications Magazine.

[10]  Shanlin Yang,et al.  A multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning approach , 2015, Int. J. Autom. Comput..

[11]  Tian Jun-feng Zhang Huan-guo Du Rui-zhong Cloud service selection model based on trust and personality preferences , 2013 .

[12]  Yu Yang,et al.  A Cloud Model Based Trust Evaluation Model for Defense Agent , 2015 .

[13]  Jingsha He,et al.  A Service-oriented Identity Authentication Privacy Protection Method in Cloud Computing , 2013 .

[14]  Liu Yao Approach of service evaluation based on trust reasoning for cloud computing , 2011 .

[15]  Ming Li,et al.  Toward privacy-assured and searchable cloud data storage services , 2013, IEEE Network.