A Review on Various Applications of Reputation Based Trust Management

The extremely vibrant, scattered, and non–transparent nature of cloud computing formulate trust management a significant challenge. According to scholars the trust and security are the two issues that are in the topmost obstacles for adopting cloud computing. Also, SLA (Service Level Agreement) alone is not necessary to build trust between cloud because of vague and unpredictable clauses. Getting feedback from the consumers is the best way to know the trustworthiness of the cloud services, which will help them improve in the future. Several researchers have stated the necessity of building a robust management system and suggested many ideas to manage trust based on consumers' feedback. This paper has reviewed various reputation-based trust management systems, including trust management in cloud computing, peer-to-peer system, and Adhoc system.

[1]  Liang Gu,et al.  Rectifying Prejudicial Feedback Ratings in Reputation based Trust Management , 2007, IEEE International Conference on Services Computing (SCC 2007).

[2]  Osman Ghazali,et al.  Cloud-Based Global Online Marketplaces Review on Trust and Security , 2019, Int. J. Interact. Mob. Technol..

[3]  M. Sasitharagai,et al.  Trust based communication in unstructured P2P networks using reputation management and self certification mechanism , 2012, 2012 IEEE International Conference on Engineering Education: Innovative Practices and Future Trends (AICERA).

[4]  Osman Ghazali,et al.  Trust Management in Cloud Computing: A Critical Review , 2012, ArXiv.

[5]  A. Banerjee,et al.  Reputation based trust management system for MANET , 2012, 2012 Third International Conference on Emerging Applications of Information Technology.

[6]  Morris Sloman,et al.  Trust Management Tools for Internet Applications , 2003, iTrust.

[7]  Nima Jafari Navimipour,et al.  A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll entities , 2016, Comput. Hum. Behav..

[8]  Quan Z. Sheng,et al.  Credibility-Based Trust Management for Services in Cloud Environments , 2011, ICSOC.

[9]  N. Sateesh,et al.  Cloud shield: Backing honor based trust authority for cloud utility , 2016 .

[10]  Unmesha Punyamurthula Cloudarmor: Supporting Reputation-Based Trust Management for Cloud Services , 2018 .

[11]  Mahantesh N. Birje,et al.  Trust management in cloud computing , 2017, 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon).

[12]  Arjan Durresi,et al.  A Trust Management Framework for Cloud Computing Platforms , 2017, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).

[13]  Reem Bahgat,et al.  DiReCT: Dirichlet-based Reputation and Credential Trust management , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).

[14]  Anne H. H. Ngu,et al.  CSCE: A Crawler Engine for Cloud Services Discovery on the World Wide Web , 2013, 2013 IEEE 20th International Conference on Web Services.

[15]  Latha Tamilselvan,et al.  Client Aware Scalable Cloudlet to Augment Edge Computing with Mobile Cloud Migration Service , 2020, Int. J. Interact. Mob. Technol..

[16]  Eugine Tafadzwa Maziriri,et al.  Antecedents That Influence the Intention to Use the Uber Mobile Application: Customer Perspectives in South Africa , 2020, Int. J. Interact. Mob. Technol..

[17]  Khaled Aldiabat,et al.  The Effect of Mobile Banking Application on Customer Interaction in the Jordanian Banking Industry , 2019, Int. J. Interact. Mob. Technol..

[18]  Sherali Zeadally,et al.  Trust management of services in cloud environments: Obstacles and solutions , 2013, CSUR.

[19]  Gennaro Costagliola,et al.  Towards a trust, reputation and recommendation meta model , 2014, J. Vis. Lang. Comput..

[20]  Ersin Uzun,et al.  A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..

[21]  Quan Z. Sheng,et al.  Trust as a Service: A Framework for Trust Management in Cloud Environments , 2011, WISE.

[22]  Quan Z. Sheng,et al.  Detecting Occasional Reputation Attacks on Cloud Services , 2013, ICWE.

[23]  Hossam Afifi,et al.  Byzantine resistant reputation-based trust management , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[24]  Anne H. H. Ngu,et al.  Identifying Fake Feedback for Effective Trust Management in Cloud Environments , 2012, ICSOC Workshops.

[25]  Khaled Shaalan,et al.  Understanding the Quality Determinants that Influence the Intention to Use the Mobile Learning Platforms: A Practical Study , 2019, Int. J. Interact. Mob. Technol..

[26]  Lina Yao,et al.  CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services , 2016, IEEE Transactions on Parallel and Distributed Systems.

[27]  Sherali Zeadally,et al.  Managing Trust in the Cloud: State of the Art and Research Challenges , 2016, Computer.

[28]  Anne H. H. Ngu,et al.  Analysis of Web-Scale Cloud Services , 2014, IEEE Internet Computing.

[29]  Ayman I. Kayssi,et al.  Fuzzy reputation-based trust model , 2011, Appl. Soft Comput..

[30]  P. M. Rubesh Anand,et al.  A secure and reputation based recommendation framework for cloud services , 2016, 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC).

[31]  Anne H. H. Ngu,et al.  Cloud Armor: a platform for credibility-based trust management of cloud services , 2013, CIKM.

[32]  Quan Z. Sheng,et al.  Reputation Attacks Detection for Effective Trust Assessment among Cloud Services , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[33]  Samuel Pierre,et al.  Reputation based trust management using TCG in Mobile Ad-Hoc Networks (RTA) , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).

[34]  Li Xu,et al.  A New Reputation-Based Trust Management Strategy for Clustered Ad Hoc Networks , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[35]  N. Jaisankar,et al.  A Review on Various Trust Models in Cloud Environment , 2017 .