Byzantine resistant reputation-based trust management

Cloud computing is very useful for improving distributed applications performance. However, it is difficult to manage risks related to trust when collaborating with unknown and potentially malicious peers. Besides, trust evaluation is the target of dishonest behaviors trying to disturb the control process. In this paper, reputation-based trust management models for cloud computing are proposed. These Peer-to-Peer (P2P) reputation models are based on the interaction between peers. Using evaluations and feedbacks, a central entity can estimate the trust of a given peer. Three approaches are proposed to estimate the trust: PerronTrust, CredTrust and CredTrust-trust. They are studied, simulated and compared between them and to two existing methods for trust under several attack scenarios. Our analysis clearly shows that the third approach CredTrust-trust combining the concepts of trust and credibility in an appropriate way is the most efficient to avoid malicious behaviors and to guide and advise future executions in the open cloud in term of selecting the dependable and reliable peers in cloud environment.

[1]  Hsinchun Chen,et al.  Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering , 2004, TOIS.

[2]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[3]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[4]  Lior Rokach,et al.  Introduction to Recommender Systems Handbook , 2011, Recommender Systems Handbook.

[5]  Lingdi Ping,et al.  Trust Model to Enhance Security and Interoperability of Cloud Environment , 2009, CloudCom.

[6]  Shanshan Song,et al.  Fuzzy Trust Integration for Security Enforcement in Grid Computing , 2004, NPC.

[7]  S. Thamarai Selvi,et al.  Trust management system for grid and cloud resources , 2009, 2009 First International Conference on Advanced Computing.

[8]  Xuezeng Pan,et al.  Use trust management module to achieve effective security mechanisms in cloud environment , 2010, 2010 International Conference on Electronics and Information Engineering.

[9]  Vijay Varadharajan,et al.  Enhancing grid security with trust management , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.

[10]  Gheorghe Cosmin Silaghi,et al.  Reputation-based trust management systems and their applicability to grids , 2007 .

[11]  Tao Yu,et al.  A reputation and trust management broker framework for Web applications , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.

[12]  Huajun Chen,et al.  A Social Network-Based Trust Model for the Semantic Web , 2006, ATC.

[13]  Jose L. Muñoz,et al.  A game theoretic trust model for on-line distributed evolution of cooperation inMANETs , 2011, J. Netw. Comput. Appl..

[14]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[15]  Tae Kyung Kim,et al.  A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .

[16]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[17]  Hossam Afifi,et al.  Enforcing Trust-Based Intrusion Detection in Cloud Computing Using Algebraic Methods , 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[18]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[19]  Leonard Barolli,et al.  Survey of Trust Management on Various Networks , 2011, 2011 International Conference on Complex, Intelligent, and Software Intensive Systems.

[20]  Nael B. Abu-Ghazaleh,et al.  Location verification and trust management for resilient geographic routing , 2007, J. Parallel Distributed Comput..

[21]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[22]  Antonio Puliafito,et al.  Volunteer Computing and Desktop Cloud: The Cloud@Home Paradigm , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.

[23]  Zhong Chen,et al.  CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks , 2007, ATC.

[24]  Muthucumaru Maheswaran,et al.  Towards Trust-Aware Resource Management in Grid Computing Systems , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).

[25]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[26]  Abhishek Chandra,et al.  Nebulas: Using Distributed Voluntary Resources to Build Clouds , 2009, HotCloud.