Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model

Cloud computing trust management has become an important subject in recent years. Trust management is a difficult and complicated work in cloud computing due to features such as distributed, dynamic and non-transparent environment. Since most trust management frameworks predict trust values based on received feedbacks, the validation and authenticity of feedback are highly necessary. In this paper, two new methods are presented to identify fake feedbacks. One is feedback evaluation component and the other is Bayesian game model. The feedback evaluation component is used to examine the received feedback and identify its probable fake identity. Our results reveal that the feedback evaluation component can correctly identify and rectify fake feedbacks. Bayesian game model is presented to detect malicious users and prevent their feedbacks. Simulation results coincided well with analytical results, indicating that our Bayesian game model can correctly recognize malicious user. Received feedbacks from malicious user are identified as fake feedbacks. Eventually, two new methods were compared.

[1]  Rajkumar Buyya,et al.  InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services , 2010, ICA3PP.

[2]  Kai Hwang,et al.  Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.

[3]  Krishnendu Roy,et al.  An SLA-based Framework for Estimating Trustworthiness of a Cloud , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[4]  Athman Bouguettaya,et al.  RATEWeb: Reputation Assessment for Trust Establishment among Web services , 2009, The VLDB Journal.

[5]  Klara Nahrstedt,et al.  A trust management framework for service-oriented environments , 2009, WWW '09.

[6]  Sung Jin Hur,et al.  Improved trust-aware recommender system using small-worldness of trust networks , 2010, Knowl. Based Syst..

[7]  Antonio F. Gómez-Skarmeta,et al.  Taxonomy of trust relationships in authorization domains for cloud computing , 2014, The Journal of Supercomputing.

[8]  Seungmin Rho,et al.  Trust model at service layer of cloud computing for educational institutes , 2015, The Journal of Supercomputing.

[9]  Erich Schikuta,et al.  SLA Validation in Layered Cloud Infrastructures , 2010, GECON.

[10]  Shanshan Song,et al.  Fuzzy Trust Integration for Security Enforcement in Grid Computing , 2004, NPC.

[11]  Jane Yung-jen Hsu,et al.  Parameter learning of personalized trust models in broker-based distributed trust management , 2006, Inf. Syst. Frontiers.

[12]  Tharam S. Dillon,et al.  SLA-Based Trust Model for Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.

[13]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2013, The Journal of Supercomputing.

[14]  Siani Pearson,et al.  Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[15]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[16]  Imad M. Abbadi A framework for establishing trust in Cloud provenance , 2012, International Journal of Information Security.

[17]  Rajkumar Buyya,et al.  Market-Oriented Cloud Computing: Vision, Hype, and Reality of Delivering Computing as the 5th Utility , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[18]  Mário M. Freire,et al.  Security issues in cloud environments: a survey , 2014, International Journal of Information Security.

[19]  Qianping Wang,et al.  A Fuzzy Logic-Based Trust Model in Grid , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[20]  Ruidong Li,et al.  Requirements and design for neutral trust management framework in unstructured networks , 2010, The Journal of Supercomputing.

[21]  Harry G. Perros,et al.  A novel trust management framework for multi-cloud environments based on trust service providers , 2014, Knowl. Based Syst..

[22]  Vladimiro Sassone,et al.  A Bayesian Model for Event-based Trust , 2022 .

[23]  Wanlei Zhou,et al.  Trust, security and privacy for pervasive applications , 2013, The Journal of Supercomputing.

[24]  Ahmad Habibizad Navin,et al.  Resource discovery mechanisms in grid systems: A survey , 2014, J. Netw. Comput. Appl..

[25]  Jiqiang Liu,et al.  Selecting a trusted cloud service provider for your SaaS program , 2015, Comput. Secur..

[26]  肖鹏,et al.  An Energy-Aware Heuristic Scheduling for Data-Intensive Workflows in Virtualized Datacenters , 2013 .

[27]  Andrew P. Martin,et al.  Trust in the Cloud , 2011, Inf. Secur. Tech. Rep..

[28]  Anne H. H. Ngu,et al.  Identifying Fake Feedback for Effective Trust Management in Cloud Environments , 2012, ICSOC Workshops.

[29]  Mehran Mohsenzadeh,et al.  Proposed platform for improving grid security by trust management system , 2009, ArXiv.

[30]  Quan Z. Sheng,et al.  Trust as a Service: A Framework for Trust Management in Cloud Environments , 2011, WISE.

[31]  Shanlin Yang,et al.  A novel two-stage model for cloud service trustworthiness evaluation , 2014, Expert Syst. J. Knowl. Eng..

[32]  Ahmad Habibizad Navin,et al.  Expert Cloud: A Cloud-based framework to share the knowledge and skills of human resources , 2015, Comput. Hum. Behav..