A New Trust Model in Cloud Computing Environments

Trust management is fundamental to identify malicious, selfish and compromised nodes which have been authenticated. It has been widely studied in many network environments such as peer-to-peer networks, grid and pervasive computing and so on. In the paper, we propose a trust model (TM) based on fuzzy logic inferences, which can better handle uncertainty, fuzziness, and incomplete information in cloud trust reports. The experiments are performed in order to test the accuracy of the TM as compared to a data storage system where no trust model is implemented.

[1]  Kai Hwang,et al.  Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.

[2]  Humberto Bustince,et al.  On averaging operators for Atanassov's intuitionistic fuzzy sets , 2011, Inf. Sci..

[3]  Weize Wang,et al.  Intuitionistic Fuzzy Information Aggregation Using Einstein Operations , 2012, IEEE Transactions on Fuzzy Systems.

[4]  Lotfi A. Zadeh,et al.  Fuzzy Sets , 1996, Inf. Control..

[5]  Jiuping Xu,et al.  Fuzzy Set Theory , 2011 .

[6]  Huang Liu-sheng,et al.  An improved trusted cloud computing platform model based on DAA and privacy CA scheme , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[7]  Khaled M. Khan,et al.  Establishing Trust in Cloud Computing , 2010, IT Professional.

[8]  Jiann-Min Yang,et al.  Analysis on Cloud-Based Security Vulnerability Assessment , 2010, 2010 IEEE 7th International Conference on E-Business Engineering.

[9]  Jemal H. Abawajy,et al.  Establishing Trust in Hybrid Cloud Computing Environments , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[10]  Radko Mesiar,et al.  Triangular norms. Position paper I: basic analytical and algebraic properties , 2004, Fuzzy Sets Syst..

[11]  Chang Liu,et al.  A collaborative trust model of firewall-through based on Cloud Computing , 2010, The 2010 14th International Conference on Computer Supported Cooperative Work in Design.

[12]  K. Popovic,et al.  Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.

[13]  Etienne E. Kerre,et al.  On the relationship between some extensions of fuzzy set theory , 2003, Fuzzy Sets Syst..

[14]  Yu Guo,et al.  A trusted computing environment model in cloud architecture , 2010, 2010 International Conference on Machine Learning and Cybernetics.