Skip to main content
Log in

Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Cloud computing trust management has become an important subject in recent years. Trust management is a difficult and complicated work in cloud computing due to features such as distributed, dynamic and non-transparent environment. Since most trust management frameworks predict trust values based on received feedbacks, the validation and authenticity of feedback are highly necessary. In this paper, two new methods are presented to identify fake feedbacks. One is feedback evaluation component and the other is Bayesian game model. The feedback evaluation component is used to examine the received feedback and identify its probable fake identity. Our results reveal that the feedback evaluation component can correctly identify and rectify fake feedbacks. Bayesian game model is presented to detect malicious users and prevent their feedbacks. Simulation results coincided well with analytical results, indicating that our Bayesian game model can correctly recognize malicious user. Received feedbacks from malicious user are identified as fake feedbacks. Eventually, two new methods were compared.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Jafari Navimipour N, Rahmani AM, Habibizad Navin A, Hosseinzadeh M (2015) Expert cloud: a cloud-based framework to share the knowledge and skills of human resources. Comput Hum Behav 46:57–74

    Article  Google Scholar 

  2. Buyya R (2009) Market-oriented cloud computing: vision”, hype, and reality of delivering computing as the 5th utility. In: Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, vol 1. IEEE Computer Society

  3. Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53:50–58

    Article  Google Scholar 

  4. Jafari Navimipour N, Rahmani AM, Habibizad Navin A, Hosseinzadeh M (2014) Resource discovery mechanisms in grid systems: a survey. J Netw Comput Appl 41:389–410

    Article  Google Scholar 

  5. Buyya R, Ranjan R, Calheiros RN (2010) InterCloud: utility-oriented federation of cloud computing environments for scaling of application services. In: Proceedings of the 10th International Conference on Algorithms and Architectures for Parallel Processing, vol Part I, pp 13–31

  6. Xiao P, Hu ZG, Zhang Y (2013) An energy-aware heuristic scheduling for data-intensive workflows in virtualized datacenters. J Comput Sci Technol 28:948–961

    Article  Google Scholar 

  7. Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63:561–592

    Article  Google Scholar 

  8. Hwang K, Li D (2010) Trusted cloud computing with secure resources and data coloring. Internet Comput IEEE 14:14–22

    Article  Google Scholar 

  9. Noor T, Talal H, Sheng Q (2011) Trust as a service: a framework for trust management in cloud environments. Web Inf Syst Eng WISE 2011:314–321

    Google Scholar 

  10. Pearson S, Benameur A (2010) Privacy, security and trust issues arising from cloud computing, cloud computing technology and science (CloudCom). In: 2010 IEEE Second International Conference, pp 693–702

  11. Fernandes Diogo AB, Soares Liliana FB, Gomes João V, Freire Mário M, Inácio Pedro RM (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13:13–170

    Google Scholar 

  12. Li R, Li J (2013) Requirements and design for neutral trust management framework in unstructured networks. J Supercomput 64:702–716

    Article  Google Scholar 

  13. Perez JMM, Bernabe JB, Calero JMA, Clemente FJG, Perez GM, Skarmeta AFG (2014) Taxonomy of trust relationships in authorization domains for cloud computing. J Supercomput 70:1075–1099

  14. Abbadi ImadM (2013) A framework for establishing trust in cloud provenance. Int J Inf Secur 12:111–128

    Article  Google Scholar 

  15. Abbadi IM, Martin A (2011) Trust in the cloud. Inf Secur Tech Rep 16:108–114

    Article  Google Scholar 

  16. Wang G, Zhou W, Yang LT (2013) Trust, security and privacy for pervasive applications. J Supercomput 64:661–663

    Article  Google Scholar 

  17. Jabbar1 S, Naseer K, Gohar M, Rho S, Chang H (2015) Trust model at service layer of cloud computing for educational institutes. J Supercomput 72:58–83

  18. Tang C, Liu J (2015) Selecting a trusted cloud service provider for your SaaS program. Comput Secur 50:60–73

    Article  Google Scholar 

  19. Ul Haq I, Brandic I, Schikuta E (2010) SLA validation in layered cloud infrastructures. Econ Grids Clouds Syst Serv 6296:153–164

    Article  Google Scholar 

  20. Conner w, Iyengar A, Mikalsen T, Rouvellou R, Nahrstedt K (2009) A trust management framework for service-oriented environments. In: Proceedings of the 18th International Conference on World Wide Web, pp 891–900

  21. Malik Z, Bouguettaya A (2009) RATEWeb: reputation assessment for trust establishment among web services. VLDB J 18:885–911

    Article  Google Scholar 

  22. Fan W, Yang S, Pei J (2014) A novel two-stage model for cloud service trustworthiness evaluation. Expert Syst 31:136–153

    Article  Google Scholar 

  23. siadat S, Rahmani AM, Mohsenzadeh M (2009) Proposed platform for improving grid security by trust management system. Int J Comput Sci Inf Secur Tech Rep 6:143–148

  24. Hsu J, Lin K, Chang T, Ho C, Huang H, Jih W (2006) Parameter learning of personalized trust models in broker-based distributed trust management. Inf Syst Front 8:321–333

    Article  Google Scholar 

  25. Alhamad M, Dillon T, Chang E (2010) SLA-based trust model for cloud computing, network-based information systems (NBiS). In: 2010 13th International Conference, pp 321–324

  26. Chakraborty S, Roy K (2012) An SLA-based framework for estimating trustworthiness of a cloud, trust. In: Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference, pp 937–942

  27. Fan W, Perros H (2014) A novel trust management framework for multi-cloud environments based on trust service providers. Knowl-Based Syst 70:392–406

    Article  Google Scholar 

  28. Nielsen M, Krukow K, Sassone V (2007) A Bayesian model for event-based trust. Electron Notes Theor Comput Sci 172:499–521

    Article  MathSciNet  MATH  Google Scholar 

  29. Song S, Hwang K, Macwan M (2004) Fuzzy trust integration for security enforcement in grid computing. Netw Parallel Comput 3222:9–21

    Article  Google Scholar 

  30. Hongmei L, Qianping W, Guoxin L (2009) A fuzzy logic-based trust model in grid, networks security, wireless communications and trusted computing. In: NSWCTC ’09. International Conference, vol 1, pp 608–614

  31. Yuan W, Guan D, Lee Y, Lee S, Hur S (2010) Improved trust-aware recommender system using small-worldness of trust networks. Knowl-Based Syst 23:232–238

    Article  Google Scholar 

  32. Noor T, Sheng Q, Alfazi A, Law J, Jeriel, Ngu AH (2013) Identifying fake feedback for effective trust management in cloud environments. In: Service-Oriented Computing—ICSOC 2012 Workshops, vol 7759, pp 47–58

  33. http://www.public.asu.edu/~jtang20/datasetcode/truststudy.htm

  34. http://www.gambit-project.org/gambit13/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amir Masoud Rahmani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Siadat, S., Rahmani, A.M. & Navid, H. Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model. J Supercomput 73, 2682–2704 (2017). https://doi.org/10.1007/s11227-016-1950-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-016-1950-1

Keywords

Navigation