Analysing and evaluating malicious trust in cloud computing environments from a statistical perspective

High security issue is one of the major obstacles for opening up the new cloud computing era. Trust, as a soft social security philosophy, can fight against such security threats and consequently offers a high trustworthiness cloud computing environments. In this paper, the definition of trust in clouds is given and the properties of trust are systematically analysed by referring to the social science theories. A malicious trust analysis and evaluation model is put forward, which includes: a analysing malicious trust information from the popularity, activity, and cooperation among trust entities, and acquiring the trustworthiness recommendations; and b evaluating the malicious nodes at the data level by similarity strategy, and evaluating malicious trust information at the overall level by individual and moving range control chart strategy. Simulation results conclusively demonstrate that this malicious trust analysis and evaluation model accurately detects and prevents malicious and faulty recommendations.

[1]  Rajkumar Buyya,et al.  CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..

[2]  Vijay Varadharajan,et al.  MobileTrust: a trust enhanced security architecture for mobile agent systems , 2010, International Journal of Information Security.

[3]  Chuang Lin,et al.  Model-Driven Dependability Analysis of Virtualization Systems , 2009, 2009 Eighth IEEE/ACIS International Conference on Computer and Information Science.

[4]  Wen-Chen Hu,et al.  Trust Computing for Social Networking , 2009, 2009 Sixth International Conference on Information Technology: New Generations.

[5]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[6]  Baomin Xu,et al.  Job scheduling algorithm based on Berger model in cloud environment , 2011, Adv. Eng. Softw..

[7]  Ghalem Belalem,et al.  Approaches to Improve the Resources Management in the Simulator CloudSim , 2010, ICICA.

[8]  Félix Gómez Mármol,et al.  Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems , 2010, Comput. Stand. Interfaces.

[9]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[10]  Feniosky Peña-Mora,et al.  A Decentralized Trust Model to Reduce Information Unreliability in Complex Disaster Relief Operations , 2006, EG-ICE.

[11]  Dhananjay S. Phatak,et al.  Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing , 2010, TRUST.

[12]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[13]  Indrajit Ray,et al.  An interoperable context sensitive model of trust , 2009, Journal of Intelligent Information Systems.

[14]  Subhajyoti Bandyopadhyay,et al.  Cloud computing - The business perspective , 2011, Decis. Support Syst..

[15]  Naima Iltaf,et al.  A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment , 2009, ISA.

[16]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[17]  Dan Xing,et al.  A P2P Trust Model Based on Multi-Dimensional Trust Evaluation , 2007, LSMS.

[18]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[19]  Saeedeh Shekarpour,et al.  Modeling and evaluation of trust with an extension in semantic web , 2010, J. Web Semant..