A Domain Partition-Based Trust Model for Unreliable Clouds

Cloud computing has become an important scientific computing and commercial application paradigm. Many computing resources and data exist in clouds, and face various trust issues. Malicious providers may provide poor services to users, while malicious users may give good providers unfaithful trust evaluations. Hence, it is important to detect these malicious nodes that can be providers and users. Current studies on trust management do not sufficiently address the issues of minimizing trust management overhead and maximizing the ability to detect malicious nodes. This paper proposes a new trust model and related algorithm to decrease trust management overhead and improve malicious node detection ability based on domain partition. Partitioning nodes into domains is helpful for decreasing the overhead of trust management in terms of trust storage and computation. Domain and cross-domain sliding-windows are proposed and utilized to store the most recent trust values. Then, an algorithm is designed to compute domain and cross-domain trust values for nodes, and a filter procedure is adopted to remove malicious trust evaluations and malicious nodes from a domain. Simulation results show that the proposed model and algorithm outperform two updated methods, i.e., one based on fuzzy mathematics and another based on authenticated trust and reputation calculation and management, in terms of speed and accuracy of trust computation and malicious node detection.

[1]  WenAn Tan,et al.  A Trust Service-Oriented Scheduling Model for Workflow Applications in Cloud Computing , 2014, IEEE Systems Journal.

[2]  Meng Joo Er,et al.  A New Trust Evaluation Algorithm Between Cloud Entities Based on Fuzzy Mathematics , 2016, Int. J. Fuzzy Syst..

[3]  Vijay Varadharajan,et al.  Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Seungmin Rho,et al.  Trust model at service layer of cloud computing for educational institutes , 2015, The Journal of Supercomputing.

[5]  Aida Shojaee,et al.  A trust evaluation model for selecting service provider in cloud environment , 2014, 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE).

[6]  Xiao Chen,et al.  A Cloud-Based Trust Management Framework for Vehicular Social Networks , 2017, IEEE Access.

[7]  Yu Peng,et al.  Review on cyber-physical systems , 2017, IEEE/CAA Journal of Automatica Sinica.

[8]  Junping Du,et al.  Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing , 2013, IET Inf. Secur..

[9]  Fei Tao,et al.  A trust evaluation model towards cloud manufacturing , 2016 .

[10]  Mohammad Zulkernine,et al.  TRUST-CAP: A Trust Model for Cloud-Based Applications , 2017, 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC).

[11]  Ramkumar Thirunavukarasu,et al.  A fuzzy logic based trust evaluation model for the selection of cloud services , 2017, 2017 International Conference on Computer Communication and Informatics (ICCCI).

[12]  Mario Macı́as,et al.  Analysis of a trust model for SLA negotiation and enforcement in cloud markets , 2016, Future Gener. Comput. Syst..

[13]  Hamidreza Navidi,et al.  Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model , 2017, The Journal of Supercomputing.

[14]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[15]  MengChu Zhou,et al.  Dynamic Cloud Task Scheduling Based on a Two-Stage Strategy , 2018, IEEE Transactions on Automation Science and Engineering.

[16]  Unmesha Punyamurthula Cloudarmor: Supporting Reputation-Based Trust Management for Cloud Services , 2018 .

[17]  Quan Z. Sheng,et al.  Trust as a Service: A Framework for Trust Management in Cloud Environments , 2011, WISE.

[18]  Manel Mrabet,et al.  A new trust evaluation approach for cloud computing environments , 2016, 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN).

[19]  M. Anwar Hasan,et al.  Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.

[20]  Zhang Pei Web Services Trust Computation Based on Social Network Dynamic Feedback , 2013 .

[21]  Ravishankar K. Iyer Application-Aware Reliability and Security: The Trusted ILLIAC Approach , 2006, NCA.

[22]  Zahir Tari,et al.  Trusting Cloud Service Providers: Trust Phases and a Taxonomy of Trust Factors , 2017, IEEE Cloud Computing.

[23]  Xiaomin Zhu,et al.  FESTAL: Fault-Tolerant Elastic Scheduling Algorithm for Real-Time Tasks in Virtualized Clouds , 2015, IEEE Transactions on Computers.

[24]  Hiroyuki Sato,et al.  A Cloud Trust Model in a Security Aware Cloud , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.

[25]  Iraklis Varlamis,et al.  A Trust-Aware System for Personalized User Recommendations in Social Networks , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[26]  MengChu Zhou,et al.  Toward cloud computing QoS architecture: analysis of cloud systems and cloud services , 2017, IEEE/CAA Journal of Automatica Sinica.

[27]  Giancarlo Fortino,et al.  Integration of agent-based and Cloud Computing for the smart objects-oriented IoT , 2014, Proceedings of the 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[28]  Imad M. Abbadi,et al.  Towards Trustworthy Resource Scheduling in Clouds , 2013, IEEE Transactions on Information Forensics and Security.

[29]  Mohamed Adel Serhani,et al.  De-Centralized Reputation-Based Trust Model to Discriminate between Cloud Providers Capable of Processing Big Data , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[30]  Jun Liu,et al.  Analysis of malware application based on massive network traffic , 2016, China Communications.

[31]  Guangjie Han,et al.  A Trust Model Based on Cloud Theory in Underwater Acoustic Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.

[32]  Feng Zhou,et al.  T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services , 2015, IEEE Transactions on Information Forensics and Security.

[33]  Sunju Park,et al.  Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[34]  Sohail Jabbar,et al.  A novel trust model for selection of Cloud Service Provider , 2014, 2014 World Symposium on Computer Applications & Research (WSCAR).

[35]  C. Cachin,et al.  A cloud you can trust , 2011, IEEE Spectrum.

[36]  Sushma Jain,et al.  A trust model in cloud computing based on fuzzy logic , 2016, 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).

[37]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[38]  Karl Aberer,et al.  Guest Editorial: Special issue on privacy and trust management in cloud and distributed systems , 2013, IEEE Trans. Inf. Forensics Secur..

[39]  Paul D. Manuel,et al.  A trust model of cloud computing based on Quality of Service , 2015, Ann. Oper. Res..

[40]  Wu Quan-yuan,et al.  Robust Feedback Credibility-Based Distributed P2P Trust Model , 2009 .

[41]  Huiling Jia,et al.  Trust Evaluation via Large-Scale Complex Service-Oriented Online Social Networks , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[42]  MengChu Zhou,et al.  Stochastic Modeling and Quality Evaluation of Infrastructure-as-a-Service Clouds , 2015, IEEE Transactions on Automation Science and Engineering.

[43]  Max Mühlhäuser,et al.  Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source , 2014, Secur. Commun. Networks.

[44]  Victor C. M. Leung,et al.  An Authenticated Trust and Reputation Calculation , 2017 .

[45]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.