Abstract
Fog computing has been recognized as a new paradigm of distributed environment which is the result of cloud computing extension. Fog layer is located between cloud data center layer and Internet of Things device layer to provide data storage, processing through executing applications on the network edges. However, security is the main challenge of fog technologies from various aspects due to processing, managing and storing private information by fog servers. Therefore, adopting a trust management system in accordance with determined criteria by trustor is the main issue of fog computing technology to address the level of trustworthiness of trustee. The efficient metrics on trustworthiness value, including Quality of Service (QoS), social relationship, and past experience such as reputation, conflict with each other which is considered as a multi criteria decision making problem. Therefore, the determination of priority and contribution level of effective metrics on trustworthiness value is an important issue that must be addressed. In this paper, a complete set of effective criteria on secure service selection in a fog computing environment is identified. Moreover, an efficient multi-criteria decision making method with corporation of fuzzy and Best Worst Method are utilized to determine the contribution level of each metric on trust level considering uncertainty of metrics. The results indicate that QoS has the great impact on secure service selection with a degree of 0.470. Furthermore, central information of security including access control, integrity and confidentiality are ranked as the most effective metrics on secure service selection with degrees of 0.109, 0.099 and 0.088. Moreover, honesty from the social relationship criteria has high impact on secure service provision with a degree of 0.074. Also, the proposed framework outperforms convergence and accuracy of trust value with 30% and 5%, respectively compared to two-way trust management framework. Besides, the proposed framework outperforms the percentage of bad fog servers selected as service providers with 25% in comparison with two-way trust management systems.
Similar content being viewed by others
References
Yousefpour A, Fung C, Nguyen T, Kadiyala K, Jalali F, Niakanlahiji A, Kong J, Jue JP (2019) All one needs to know about fog computing and related edge computing paradigms: a complete survey. J Syst Architect 98:289–330
Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: a top-down survey. Comput Netw 141:199–221
Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. J Netw Comput Appl 88:10–28
Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. In: 2015 International conference on wireless algorithms, systems, and applications. Springer, pp 685–695
Mukherjee M, Matam R, Shu L, Maglaras L, Ferrag MA, Choudhury N, Kumar V (2017) Security and privacy in fog computing: challenges. IEEE Access 5:19293–19304
Ni J, Zhang K, Lin X, Shen X (2018) Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun Surv Tutor 20(1):601–628
Guan Y, Shao J, Wei G, Xie M (2018) Data security and privacy in fog computing. IEEE Netw 32(5):106–111
Tariq N, Asim M, Al-Obeidat F, Zubair Farooqi M, Baker T, Hammoudeh M, Ghafir I (2019) The security of big data in fog-enabled IoT applications including blockchain: a survey. Sensors 19(8):1788
Adewuyi AA, Cheng H, Shi Q, Cao J, MacDermott A, Wang X (2019) Ctrust: a dynamic trust model for collaborative applications in the internet of things. IEEE Internet Things J 6(3):5432–5445
Alemneh E, Senouci SM, Brunet P, Tegegne T (2020) A two-way trust management system for fog computing. Futur Gener Comput Syst 106:206–220
Al-khafajiy M, Baker T, Al-Libawy H, Maamar Z, Aloqaily M, Jararweh Y (2019) Improving fog computing performance via fog-2-fog collaboration. Future Gener Comput Syst 100:266–280
Junejo AK, Komninos N, Sathiyanarayanan M, Chowdhry BS (2019) Trustee: a trust management system for fog-enabled cyber physical systems. In: IEEE transactions on emerging topics in computing, p 1
Wang T, Qiu L, Sangaiah AK, Xu G, Liu A (2020) Energy-efficient and trustworthy data collection protocol based on mobile fog computing in internet of things. IEEE Trans Ind Inf 16(5):3531–3539
Ogundoyin SO, Kamil IA (2020) A Fuzzy-AHP based prioritization of trust criteria in fog computing services. Appl Soft Comput 97:106789
Gomez Marmol F, Martinez Perez G (2012) Trip, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. J Netw Comput Appl 35(3):934–941 (special Issue on Trusted Computing and Communications)
Soleymani SA, Abdullah AH, Zareei M, Anisi MH, Vargas-Rosales C, Khurram Khan M, Goudarzi S (2017) A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing. IEEE Access 5:15619–15629
Chen D, Chang G, Sun D, Li J, Jia J, Wang X (2011) TRM-IoT: a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(4):1207–1228
Bao F, Chen I (2012) Trust management for the internet of things and its application to service composition. In: 2012 IEEE international symposium on a world of wireless, mobile and multimedia networks (WoWMoM), pp 1–6
Bao F, Chen I, Guo J (2013) Scalable, adaptive and survivable trust management for community of interest based internet of things systems. In: 2013 IEEE eleventh international symposium on autonomous decentralized systems (ISADS), pp 1–7
Chen I, Guo J, Bao F (2014) Trust management for service composition in SOA-based IoT systems. In: IEEE wireless communications and networking conference (WCNC), pp 3444–3449
Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134
Jayasinghe U, Truong NB, Lee GM, Um T (2016) RPR: a trust computation model for social internet of things. In: 2016 International IEEE conferences on ubiquitous intelligence computing, advanced and trusted computing, scalable computing and communications, cloud and big data computing, internet of people, and smart world congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), pp 930–937
Guo J, Chen IR, Tsai JJ (2017) A survey of trust computation models for service management in internet of things systems. Comput Commun 97:1–14
Javaid S, Afzal H, Arif F, Iltaf N, Abbas H, Iqbal W (2019) CATSWoTS: context aware trustworthy social web of things system. Sensors 19(14):3076
Huang J, Nicol D (2013) Trust mechanisms for cloud computing. J Cloud Comput 2:1–14
Manuel P (2013) A trust model of cloud computing based on quality of service. Ann Oper Res 233:1–12
Hajizadeh R, Navimipour N (2017) A method for trust evaluation in the cloud environments using a behavior graph and services grouping. Kybernetes 46:00–00
Chen I, Guo J, Wang D, Tsai JJP, Al-Hamadi H, You I (2019) Trust-based service management for mobile cloud IoT systems. IEEE Trans Netw Serv Manage 16:246–263
Alrawais A, Alhothaily A, Hu C, Cheng X (2017) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21(2):34–42
Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680–698
Rahman FH, Au TW, Newaz SS, Suhaili WS, Lee GM (2020) Find my trustworthy fogs: a fuzzy-based trust evaluation framework. Future Gener Comput Syst 109:562–572
Wang Q, Chen D, Zhang N, Ding Z, Qin Z (2017) PCP: a privacy-preserving content-based publish-subscribe scheme with differential privacy in fog computing. IEEE Access 5:17962–17974
Abdel-Basset M, Manogaran G, Mohamed M (2019) A neutrosophic theory based security approach for fog and mobile-edge computing. Comput Netw 157:122–132
Rezaei J (2015) Best-worst multi-criteria decision-making method. Omega 53:49–57
Rezaei J, Nispeling T, Sarkis J, Tavasszy L (2016) A supplier selection life cycle approach integrating traditional and environmental criteria using the best worst method. J Clean Prod 135:577–588
Hussain A, Chun J, Khan M (2020) A novel customer-centric methodology for optimal service selection (MOSS) in a cloud environment. Future Gener Comput Syst 105:562–580
Tran VX, Tsuji H, Masuda R (2009) A new QoS ontology and its QoS-based ranking algorithm for web services. Simul Model Practi Theory 17(8):1378–1398 (Dependable service-orientated computing systems)
Princy Bathla SV (2014) Sla aware cost based service ranking in cloud computing. Int J Appl Innov Eng Manag (IJAIEM) 3(7):257–268
Karamoozian A, Hafid A, Boushaba M, Afzali M (2016) QoS-aware resource allocation for mobile media services in cloud environment. In: 2016 13th IEEE annual consumer communications networking conference (CCNC), pp 732–737
Buyya G, Bukozkan R, Goccer F, Feyziouglu O (2018) Cloud computing technology selection based on interval-valued intuitionistic fuzzy MCDM methods. Soft Comput 22(15):5091–5114
Li LGYMC, Hang J (2017) Using an integrated group decisionmethod based on SVM, TFN-RS-AHP, and TOPSIS-CD for cloud service supplier selection. Math Probl Eng, 1–14
Zanni A, Forsstrom S, Jennehag U, Bellavista P (2018) Elastic provisioning of internet of things services using fog computing: An experience report. In: 2018 6th IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud), pp 17–22
Kumar RR, Mishra S, Kumar C (2017) Prioritizing the solution of cloud service selection using integrated MCDM methods under fuzzy environment. J Supercomput 73(11):4652–4682
Lee S, Seo KK (2016) A hybrid multi-criteria decision-making model for a cloud service selection problem using BSC, fuzzy Delphi method and fuzzy AHP. Wirel Pers Commun 86(1):57–75
Rady M, Abdelkader T, Ismail R (2019) Integrity and confidentiality in cloud outsourced data. Ain Shams Eng J 10(2):275–285
Sun L, Dong H, Hussain FK, Hussain OK, Ma J, Zhang Y (2014) A hybrid fuzzy framework for cloud service selection. In: 2014 IEEE international conference on web services, pp 313–320
Mansouri W, Ali KB, Zarai F, Obaidat M (2015) Radio resource management for heterogeneous wireless networks: schemes and simulation analysis. In: Modeling and simulation of computer networks and systems: methodologies and applications, pp 767–792
Garg SK, Versteeg S, Buyya R (2013) A framework for ranking of cloud computing services. Future Gener Comput Syst 29(4):1012–1023
Mehak F, Masood R, Ghazi Y, Shibli A, Khan S (2014) Security aspects of database-as-a-service (DBaaS) in cloud computing. Springer, Berlin, pp 297–324
Mahmud M, Buyya R (2016) Fog computing: a taxonomy, survey and future directions
Deng R, Lu R, Lai C, Luan TH, Liang H (2016) Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption. IEEE Internet Things J 3(6):1171–1181
Do CT, Tran NH, Chuan Pham, Alam MGR, Jae Hyeok Son, Hong CS (2015) A proximal algorithm for joint resource allocation and minimizing carbon footprint in geo-distributed fog computing. In: 2015 international conference on information networking (ICOIN), pp 324–329
Al Faruque MA, Vatanparvar K (2016) Energy management as a service over fog computing platform. IEEE Internet Things J 3(2):161–169
Atzori L, Iera A, Morabito G (2011) Siot: giving a social structure to the internet of things. IEEE Commun Lett 15(11):1193–1195
Bao F, Chen I (2012) Dynamic trust management for internet of things applications. pp 1–6
Bao F, Chen I, Chang M, Cho J (2011) Trust-based intrusion detection in wireless sensor networks. In: 2011 IEEE international conference on communications (ICC), pp 1–6
Chen I, Guo J (2014) Dynamic hierarchical trust management of mobile groups and its application to misbehaving node detection. In: 2014 IEEE 28th international conference on advanced information networking and applications, pp 49–56
Zadeh L (1975) The concept of a linguistic variable and its application to approximate reasoning. Inf Sci 8(3):199–249
Guo S, Zhao H (2017) Fuzzy best-worst multi-criteria decision-making method and its applications. Knowl Based Syst 121:23–31
Chen S, Hsieh C (2000) Representation, ranking, distance, and similarity of LR type fuzzy number and application. Aust J Intell Process Syst 6:217–229
Author information
Authors and Affiliations
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Afzali, M., Pourmohammadi, H. & Mohammad Vali Samani, A. An efficient framework for trust evaluation of secure service selection in fog computing based on QoS, reputation, and social criteria. Computing 104, 1643–1675 (2022). https://doi.org/10.1007/s00607-022-01053-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00607-022-01053-w