Skip to main content
Log in

Trust management in online computing environment: a complete review

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Nowadays, trust management plays a significant role in different applications like commercial applications, Internet of Things (IoT) based applications, social networking applications, cloud computing-based applications, sensor networks, online services, and many more. Thus, it is an important research area for industry and engineering research communities. The concept of trust is mainly derived from long-term sociological and psychological human behaviour. It is used for decision-making purposes in different contexts and perspectives. Many growing research studies address the development of trust computation models using different approaches in different areas, such as cloud computing, P2P networks, online social network, etc. Still, most of the prior work does not provide a comprehensive systematic review of different trust management systems nor provide sufficient details about the computation process. In this paper, we have discussed a systematic review of the existing trust management systems by indicating the limitation of previous works. A systematic review started with research question identification, followed by searching and filtration of relevant works, and ended with a comparison and final report. A detailed comparative study of trust computational models will help understand the security and privacy aspects of trust. This survey provides a detailed study of each trust taxonomy and computation model in different online computing environments. The survey result finds several trust computation techniques. The results also say that trust in the online computing environment provides greater security and protection against several threats and attacks. Despite the potential benefits of trust, the results also included challenges and open research issues that are still opportunities for new researchers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Abrams MD, Joyce MV (1995) Trusted system concepts. Comput Secur 14(1):45–56

    Article  Google Scholar 

  • Adali S, Escriva R, Goldberg MK, Hayvanovych M, Magdon-Ismail M, Szymanski BK, Wallace WA, Williams G (2010) Measuring behavioral trust in social networks. In: 2010 IEEE international conference on intelligence and security informatics, pp 150–152

  • Al-Hamadi H, Chen R (2017) Trust-based decision making for health IoT systems. IEEE Internet Things J 4(5):1408–1419

    Article  Google Scholar 

  • Ali A, Ahmed M, Khan A, Ilyas M, Razzaq MS (2017) A trust management system model for cloud. In: 2017 International symposium on networks, computers and communications (ISNCC), May 2017, pp 1–6

  • Almendra VSS, Schwabe D (2006) Trust policies for semantic web repositories. In: Proceedings of 2nd international semantic web policy workshop (SWPW’06), at the 5th international semantic web conference (ISWC 2006), pp 17–31

  • Alnasser A, Sun H, Jiang J (2020) Recommendation-based trust model for vehicle-to-everything (V2X). IEEE Internet Things J 7(1):440–450

    Article  Google Scholar 

  • Alruwaythi M, Kambhampaty K, Nygard KE (2019) User behavior and trust evaluation in cloud computing. In: Proceedings of 34th international conference, vol 58. pp 378–386

  • Alshehri MD, Hussain FK (2015) A comparative analysis of scalable and context-aware trust management approaches for internet of things. In: Arik S, Huang T, Lai WK, Liu Q (eds) Neural information processing. Springer, Cham, pp 596–605

    Chapter  Google Scholar 

  • Altaf A, Abbas H, Iqbal F, Derhab A (2019) Trust models of internet of smart things: a survey, open issues, and future directions. J Netw Comput Appl 137:93–111

    Article  Google Scholar 

  • Amin M, Ryu K, Cobanoglu C, Nizam A (2021) Determinants of online hotel booking intentions: website quality, social presence, affective commitment, and e-trust. J Hosp Mark Manag 30:1–26

    Google Scholar 

  • Anguraj DK, Smys S (2019) Trust-based intrusion detection and clustering approach for wireless body area networks. Wirel Pers Commun 104(1):1–20

    Article  Google Scholar 

  • Aringhieri R, Damiani E, De Capitani S, Vimercati D, Paraboschi S, Samarati P (2006) Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems. J Am Soc Inf Sci Technol 57(4):528–537

    Article  Google Scholar 

  • Artz D, Gil Y (2007) A survey of trust in computer science and the semantic web. J Web Semant 5(2):58–71

    Article  Google Scholar 

  • Ashtiani M, Azgomi MA (2016a) A formulation of computational trust based on quantum decision theory. Inf Syst Front 18(4):735–764

    Article  Google Scholar 

  • Ashtiani M, Azgomi MA (2016b) Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR. Soft Comput 20(1):399–421

    Article  Google Scholar 

  • Ashtiani M, Azgomi MA (2019) A novel trust evolution algorithm based on a quantum-like model of computational trust. Cogn Technol Work 21(2):201–224

    Article  Google Scholar 

  • Atlam HF, Wills GB (2019) An efficient security risk estimation technique for risk-based access control model for IoT. Internet Things 6:100052

    Article  Google Scholar 

  • Bachmann R, Inkpen AC (2011) Understanding institutional-based trust building processes in inter-organizational relationships. Org Stud 32(2):281–301

    Article  Google Scholar 

  • Bahtiyar Ş, Çağlayan MU (2014) Trust assessment of security for e-health systems. Electron Commer Res Appl 13(3):164–177

    Article  Google Scholar 

  • Banerjee A, Neogy S, Chowdhury C (2012) Reputation based trust management system for manet. In: 2012 Third international conference on emerging applications of information technology. IEEE, pp 376–381

  • Behrooz S, Marsh S (2016) A trust-based framework for information sharing between mobile health care applications. In: Habib SM, Vassileva J, Mauw S, Mühlhäuser M (eds) Trust management X. Springer, Cham, pp 79–95

    Chapter  Google Scholar 

  • Bendale Y, Shah S (2013) User level trust evaluation in cloud computing. Int J Comput Appl 69(24):31–35 (full text available)

    Google Scholar 

  • Bendiab K, Shiaeles S, Boucherkha S, Ghita B (2019) FCMDT: a novel fuzzy cognitive maps dynamic trust model for cloud federated identity management. Comput Secur 86:270–290

    Article  Google Scholar 

  • Benedetti MD, Durso F, Messina F, Pappalardo G, Santoro C (2015) A hybrid model for ranking cloud services. In: 2015 10th International conference on P2P, parallel, grid, cloud and internet computing (3PGCIC), pp 504–509

  • Bennaceur J, Idoudi H, Saidane LA (2018) Trust management in cognitive radio networks: a survey. Int J Netw Manag 28(1):e1999

    Article  Google Scholar 

  • Bhuiyan T (2013) Trust for intelligent recommendation. Springer, Berlin

    Book  Google Scholar 

  • Biswas S, Dey P, Neogy S (2012) Trusted checkpointing based on ant colony optimization in manet. In: 2012 Third international conference on emerging applications of information technology, pp 433–438

  • Bo Z, Yang X, Meizi Li (2007) Integrated trust computation in semantic web. In: 2007 IEEE international conference on integration technology, pp 668–672

  • Bradshaw JM, Johnson M, Hoffman RR, Underbrink A (2013) Trust in automation. IEEE Intell Syst 28(01):84–88

    Article  Google Scholar 

  • Carbo J, Molina JM, Davila J (2003) Trust management through fuzzy reputation. Int J Cooper Inf Syst 12(01):135–155

    Article  Google Scholar 

  • Carmo LFRC, de Oliveira BG, Braga AC (2007) Trust evaluation for web applications based on behavioral analysis. In: Venter H, Eloff M, Labuschagne L, Eloff J, von Solms R (eds) New approaches for security, privacy and trust in complex environments. Springer, Boston, pp 61–72

    Chapter  Google Scholar 

  • Castelfranchi C (2006) Why we need a non-reductionist approach to trust. In: Stølen K, Winsborough WH, Martinelli F, Massacci F (eds) Trust management. Springer, Berlin, pp 1–2

    Google Scholar 

  • Castelfranchi C, Falcone R (2010) Trust theory: a socio-cognitive and computational model, vol 18. Wiley, Hoboken

    Book  Google Scholar 

  • Challagidad PS, Reshmi VS, Birje MN (2017) Reputation based trust model in cloud computing. Internet Things Cloud Comput 5(5–1):5–12

    Google Scholar 

  • Chang B, Kuo S, Liang Y, Wang D (2008) Markov chain-based trust model for analyzing trust value in distributed multicasting mobile ad hoc networks. In: 2008 IEEE Asia-Pacific services computing conference, pp 156–161

  • Chang X, Ren P, Pengfei X, Li Z, Chen X, Hauptmann A (2021) A comprehensive survey of scene graphs: generation and application. IEEE Trans Pattern Anal Mach Intell 45(1):1–26

    Article  Google Scholar 

  • Che S, Feng R, Liang X, Wang X (2015) A lightweight trust management based on Bayesian and entropy for wireless sensor networks. Secur Commun Netw 8(2):168–175

    Article  Google Scholar 

  • Chen I, Guo J, Bao F (2016) Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput 9(3):482–495

    Article  Google Scholar 

  • Chen Z, Tian L, Lin C (2018) Trust evaluation model of cloud user based on behavior data. Int J Distrib Sens Netw 14(5):1550147718776924

    Article  Google Scholar 

  • Cheng X, Li X (2018) Trust evaluation in online social networks based on knowledge graph. In: Proceedings of the 2018 international conference on algorithms, computing and artificial intelligence, ACAI 2018. ACM, New York, NY, USA, pp 23:1–23:7

  • Chiregi M, Navimipour NJ (2016) A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders’ entities and removing the effect of troll entities. Comput Hum Behav 60:280–292

    Article  Google Scholar 

  • Cho J-H, Chan K, Adali S (2015) A survey on trust modeling. ACM Comput Surv. https://doi.org/10.1145/2815595

    Article  Google Scholar 

  • Cohen A (2015) Organizational trust. Palgrave Macmillan, London, pp 51–66

    Google Scholar 

  • Costa DL, Kahn ME (2003) Civic engagement and community heterogeneity: an economist’s perspective. Perspect Polit 1(1):103–111

    Article  Google Scholar 

  • Das TK, Teng B-S (2004) The risk-based view of trust: a conceptual framework. J Bus Psychol 19(1):85–116

    Article  Google Scholar 

  • Datta P, Chatterjee S (2008) The economics and psychology of consumer trust in intermediaries in electronic markets: the EM-trust framework. Eur J Inf Syst 17(1):12–28

    Article  Google Scholar 

  • De Siqueira BD, Niemann M, Hellingrath B, De Lima Neto FB (2018) Survey on computational trust and reputation models. ACM Comput Surv 51(5):1–40

    Google Scholar 

  • Deng S, Gao X, Lu Z, Gao X (2018) Packet injection attack and its defense in software-defined networks. IEEE Trans Inf Forensics Secur 13(3):695–705

    Article  Google Scholar 

  • Deshpande S, Ingle R (2018) Evidence based trust estimation model for cloud computing services. Int J Netw Secur 20(2):291–303

    Google Scholar 

  • Despotovic Z, Aberer K (2006) Probabilistic estimation vs. social networks. Comput Netw 50(4):485–500

    Article  Google Scholar 

  • Dondio P, Longo L, Barrett S (2008) A translation mechanism for recommendations. In: Yücel K, John M, Peter H, Damsgaard JC (eds) Trust management II. Springer, Boston, pp 87–102

    Chapter  Google Scholar 

  • Dubey J, Tokekar V (2014) Bayesian network based trust model with time window for pure P2P computing systems. In: 2014 IEEE global conference on wireless computing networking (GCWCN), pp 219–223

  • DuBois T, Golbeck J, Srinivasan A (2011) Predicting trust and distrust in social networks. In 2011 IEEE third international conference on privacy, security, risk and trust and 2011 IEEE third international conference on social computing, pp 418–424

  • ElSalamouny E, Sassone V, Nielsen M (2010) HMM-based trust model. In: Degano P, Guttman JD (eds) Formal aspects in security and trust. Springer, Berlin, pp 21–35

    Chapter  Google Scholar 

  • El-Sayed H, Ignatious HA, Kulkarni P, Bouktif S (2020) Machine learning based trust management framework for vehicular networks. Veh Commun 25:100256

    Google Scholar 

  • Evans AM, Krueger JI (2009) The psychology (and economics) of trust. Soc Personal Psychol Compass 3(6):1003–1017

    Article  Google Scholar 

  • Ezenwoke A (2018) Fuzzy hybrid approach for ranking and selecting services in cloud-based marketplaces. J Artif Intell 11(1):9–17

    Article  Google Scholar 

  • Eziama E, Ahmed S, Ahmed S, Awin F, Tepe K (2019) Detection of adversary nodes in machine-to-machine communication using machine learning based trust model. In: 2019 IEEE international symposium on signal processing and information technology (ISSPIT). IEEE, pp 1–6

  • Fadhillah A, Zebua Y, Prayoga Y (2021) Analysis of information quality, trust and satisfaction on customer participation (case study on customer online shop Shopee in Rantauprapat). Bp Int Res Crit Inst J BIRCI-J 4(2):3039–3051

    Google Scholar 

  • Falasi H, Mohamed N (2015) Similarity-based trust management system for detecting fake safety messages in VANETs. In: Proceedings of the second international conference on internet of vehicles—safe and intelligent mobility, vol 9502. IOV 2015, Springer, Berlin, pp 273–284

  • Falcone R, Pezzulo G, Castelfranchi C (2003) A fuzzy approach to a belief-based trust computation. In: Falcone R, Barber S, Korba L, Singh M (eds) Trust, reputation, and security: theories and practice. Springer, Berlin, pp 73–86

    Chapter  Google Scholar 

  • Fang W, Zhang C, Shi Z, Zhao Q, Shan L (2016) BTRES: beta-based trust and reputation evaluation system for wireless sensor networks. J Netw Comput Appl 59:88–94

    Article  Google Scholar 

  • Fang W, Zhu C, Chen W, Zhang W, Rodrigues JJPC (2018) BDTMS: binomial distribution-based trust management scheme for healthcare-oriented wireless sensor network. In: 2018 14th International wireless communications mobile computing conference (IWCMC), June 2018, pp 382–387

  • Fang W, Zhang W, Chen W, Liu Y, Tang C (2019) TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing. Wirel Netw. https://doi.org/10.1007/s11276-019-02129-w

    Article  Google Scholar 

  • Feng R, Han X, Liu Q, Ning Yu (2015) A credible Bayesian-based trust management scheme for wireless sensor networks. Int J Distrib Sens Netw 11(11):678926

    Article  Google Scholar 

  • Fong S, Zhuang Y, Yu M, Ma I (2012) Quantitative analysis of trust factors on social network using data mining approach. In: The first international conference on future generation communication technologies, p 70–75

  • Gazdar T, Rachedi A, Benslimane A, Belghith A (2012) A distributed advanced analytical trust model for VANETs. In: 2012 IEEE global communications conference (GLOBECOM), pp 201–206

  • Gokulnath K, Uthariaraj R (2015) Game theory based trust model for cloud environment. Sci World J 2015:1–10

    Article  Google Scholar 

  • Golbeck J (2009) Trust and nuanced profile similarity in online social networks. ACM Trans Web 3(4):1–33

    Article  Google Scholar 

  • Golbeck J, Hendler J (2004) Accuracy of metrics for inferring trust and reputation in semantic web-based social networks. In: Motta E, Shadbolt NR, Stutt A, Gibbins N (eds) Engineering knowledge in the age of the semantic web. Springer, Berlin, pp 116–131

    Chapter  Google Scholar 

  • Golbeck JA, Hendler J (2005) Computing and applying trust in web-based social networks. PhD thesis, University of Maryland, College Park, USA (AAI3178583)

  • Golbeck J, Parsia B, Hendler J (2003) Trust networks on the semantic web. In: Klusch M, Omicini A, Ossowski S, Laamanen H (eds) Cooperative information agents VII. Springer, Berlin, pp 238–249

    Chapter  Google Scholar 

  • Gold C, Körber M, Hohenberger C, Lechner D, Bengler K (2015) Trust in automation—before and after the experience of take-over scenarios in a highly automated vehicle. Procedia Manuf 3:3025–3032. In: 6th International conference on applied human factors and ergonomics (AHFE 2015) and the affiliated conferences, AHFE 2015

  • Grabner-Kräuter S, Kaluscha EA (2003) Empirical research in on-line trust: a review and critical assessment. Int J Hum Comput Stud 58(6):783–812

    Article  Google Scholar 

  • Grandison T, Sloman M (2000) A survey of trust in internet applications. IEEE Commun Surv Tutor 3(4):2–16

    Article  Google Scholar 

  • Griffiths N, Chao K-M, Younas M (2006) Fuzzy trust for peer-to-peer systems. In: 26th IEEE International conference on distributed computing systems workshops (ICDCSW’06), pp 73–73

  • Guo J (2018) Trust-based service management of internet of things systems and its applications. PhD thesis, Virginia Tech

  • Guo J, Marshall A, Zhou B (2011a) A new trust management framework for detecting malicious and selfish behaviour for mobile ad hoc networks. In: 2011 IEEE 10th international conference on trust, security and privacy in computing and communications, pp 142–149

  • Guo Q, Sun D, Chang G, Sun L, Wang X (2011b) Modeling and evaluation of trust in cloud computing environments. In: 2011 3rd International conference on advanced computer control, Jan 2011, pp 112–116

  • Gur N, Bjørnskov C (2017) Trust and delegation: theory and evidence. J Comp Econ 45(3):644–657

    Article  Google Scholar 

  • Habib SM, Ries S, Muhlhauser M (2011) Towards a trust management system for cloud computing. In: 2011 IEEE 10th international conference on trust, security and privacy in computing and communications, Nov 2011, pp 933–93

  • Habib SM, Hauke S, Ries S, Mühlhäuser M (2012) Trust as a facilitator in cloud computing: a survey. J Cloud Comput Adv Syst Appl 1(1):1–18

    Article  Google Scholar 

  • Han G, Jiang J, Shu L, Niu J, Chao H-C (2014) Management and applications of trust in wireless sensor networks: a survey. J Comput Syst Sci 80(3):602–617

    Article  Google Scholar 

  • Hang C-W, Singh MP (2010) Trust-based recommendation based on graph similarity. In: Proceedings of the 13th international workshop on trust in agent societies (TRUST). Toronto, Canada, pp 1–11

  • Hao F, Min G, Lin M, Luo C, Yang LT (2014) MobiFuzzyTrust: an efficient fuzzy trust inference mechanism in mobile social networks. IEEE Trans Parallel Distrib Syst 25(11):2944–2955

    Article  ADS  Google Scholar 

  • Hoffman K, Zage D, Nita-Rotaru C (2009) A survey of attack and defense techniques for reputation systems. ACM Comput Surv 42(1):1–31

    Article  Google Scholar 

  • Hosseini SB, Shojaee A, Agheli N (2015) A new method for evaluating cloud computing user behavior trust. In: 2015 7th conference on information and knowledge technology (IKT), May 2015, pp 1–6

  • Huang B, Kimmig A, Getoor L, Golbeck J (2013) A flexible framework for probabilistic models of social trust. In: Greenberg AM, Kennedy WG, Bos ND (eds) Social computing, behavioral-cultural modeling and prediction. Springer, Berlin, pp 265–273

    Chapter  Google Scholar 

  • Huynh TD, Jennings NR, Shadbolt N (2004) An integrated trust and reputation model for open multi-agent systems. Auton Agents Multi-Agent Syst 13:119–154

    Article  Google Scholar 

  • Javanmardi S, Shojafar M, Shariatmadari S, Ahrabi SS (2015) FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids. Int J Grid Util Comput 6(1):57–66

    Article  Google Scholar 

  • Jayasinghe U, Lee GM, Um T-W, Shi Q (2018) Machine learning based trust computational model for IoT services. IEEE Trans Sustain Comput 4(1):39–52

    Article  Google Scholar 

  • Jensen CD (2014) The importance of trust in computer security. In: Zhou J, Gal-Oz N, Zhang J, Gudes E (eds) Trust management VIII. Springer, Berlin, pp 1–12

    Google Scholar 

  • Jia C, Xie L, Gan X, Liu W, Han Z (2012) A trust and reputation model considering overall peer consulting distribution. IEEE Trans Syst Man Cybern Part A Syst Hum 42(1):164–177

    Article  Google Scholar 

  • Jiang W, Wang G, Bhuiyan MZA, Wu J (2016) Understanding graph-based trust evaluation in online social networks: methodologies and challenges. ACM Comput Surv 49(1):10:1-10:35

    Google Scholar 

  • Jie Z, Zhang JA, Wen J (2010) Trust evaluation model based on cloud model for c2c electronic commerce. In: 2010 International conference on computer application and system modeling (ICCASM 2010), vol 8. Oct 2010, pp V8-506–V8-509

  • Jin B, Wang Y, Liu Z, Xue J (2011) A trust model based on cloud model and Bayesian networks. Procedia Environ Sci 11:452–459

    Article  Google Scholar 

  • Jingwei H, Nicol David M (2013) Trust mechanisms for cloud computing. J Cloud Comput Adv Syst Appl 2(1):9

    Article  Google Scholar 

  • Jøsang A (2001) A logic for uncertain probabilities. Int J Uncertain Fuzziness Knowl Based Syst 09(03):279–311

    Article  MathSciNet  Google Scholar 

  • Josang A, Ismail R (2002) The beta reputation system. In: Proceedings of the 15th bled electronic commerce conference, vol 5. pp 2502–2511

  • Jøsang A, Pope S (2005) Semantic constraints for trust transitivity. In: Proceedings of the 2nd Asia-Pacific conference on conceptual modelling—volume 43, APCCM’05, AUS, Australian Computer Society, Inc. pp 59–68

  • Jøsang A, Gray E, Kinateder M (2003) Analysing topologies of transitive trust. In: Proceedings of the first international workshop on formal aspects in security & trust (FAST2003), Pisa, Italy, pp 9–22

  • Jøsang A, Gray E, Kinateder M (2006) Simplification and analysis of transitive trust networks. Web Intell Agent Syst 4(2):139–161

    Google Scholar 

  • Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644 (Emerging Issues in Collaborative Commerce)

    Article  Google Scholar 

  • Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th international conference on world wide web, WWW’03. Association for Computing Machinery, New York, NY, USA, pp 640–651

  • Kant V, Bharadwaj KK (2013) Fuzzy computational models of trust and distrust for enhanced recommendations. Int J Intell Syst 28(4):332–365

    Article  Google Scholar 

  • Karthik N, Ananthanarayana VS (2017) An ontology based trust framework for sensor-driven pervasive environment. In: 2017 Asia modelling symposium (AMS), pp 147–152

  • Keele S et al (2007) Guidelines for performing systematic literature reviews in software engineering. Technical report, Citeseer

  • Kemp S (2021) Digital 2021: global overview report. http://precog.iiitd.edu.in/people/anupama. Accessed 01 Oct 2021

  • Khan ZA, Herrmann P (2017) A trust based distributed intrusion detection mechanism for internet of things. In: 2017 IEEE 31st international conference on advanced information networking and applications (AINA), pp 1169–1176

  • Khilar PM, Chaudhari V, Swain RR (2019) Trust-based access control in cloud computing using machine learning. Cloud computing for geospatial big data analytics. Springer, Berlin, pp 55–79

    Chapter  Google Scholar 

  • Kim J, Hastak M (2018) Social network analysis: characteristics of online social networks after a disaster. Int J Inf Manag 38(1):86–96

    Article  Google Scholar 

  • Kim DJ, Song YI, Braynov SB, Raghav Rao H (2005) A multidimensional trust formation model in B-to-C e-commerce: a conceptual framework and content analyses of academia/practitioner perspectives. Decis Support Syst 40(2):143–165

    Article  Google Scholar 

  • Kim Y, Kim I, Shim CY (2014) Towards a trust management for VANETs. In: The international conference on information networking 2014 (ICOIN2014), pp 583–587

  • Körber M, Baseler E, Bengler K (2018) Introduction matters: manipulating trust in automation and reliance in automated driving. Appl Ergon 66:18–31

    Article  PubMed  Google Scholar 

  • Kramer RM (1999) Trust and distrust in organizations: emerging perspectives, enduring questions. Ann Rev Psychol 50(1):569–598

    Article  CAS  Google Scholar 

  • Kravari K, Bassiliades N (2019) StoRM: a social agent-based trust model for the internet of things adopting microservice architecture. Simul Model Pract Theory 94:286–302

    Article  Google Scholar 

  • Krukow K, Nielsen M, Sassone V (2009) Probabilistic computational trust. In: Lodaya K, Mukund M, Ramanunjan R (ed) Perspectives in Concurrency Theory (01/01/09). https://eprints.soton.ac.uk/268599/

  • Kuter U, Golbeck J (2007) Sunny: a new algorithm for trust inference in social networks using probabilistic confidence models. In: Proceedings of the 22nd national conference on artificial intelligence, vol 2. AAAI’07. AAAI Press, pp 1377–1382

  • Lahno B (1999) Trust. The tacit demand. pp 433–435. JSTOR

  • Langbein JH (1995) The contractarian basis of the law of trusts. Yale Lj 105:625

    Article  Google Scholar 

  • Lee S-J, Ahn C, Song KM, Ahn H (2018) Trust and distrust in e-commerce. Sustainability 10(4):1015

    Article  Google Scholar 

  • Li X, Feng D (2014) Markov chain based trust management scheme for wireless sensor networks. J Netw 9(12):3263

    Google Scholar 

  • Li W, Ping L (2009) Trust model to enhance security and interoperability of cloud environment. In: Jaatun MG, Zhao G, Rong C (eds) Cloud computing. Springer, Berlin, pp 69–79

    Chapter  Google Scholar 

  • Li X, Zhou F, Yang X (2011) A multi-dimensional trust evaluation model for large-scale P2P computing. J Parallel Distrib Comput 71(6):837–847

    Article  Google Scholar 

  • Li M, Huang P-Y, Chang X, Hu J, Yang Y, Hauptmann A (2022) Video pivoting unsupervised multi-modal machine translation. IEEE Trans Pattern Anal Mach Intell 45:3918–3932

    Google Scholar 

  • Liang Z, Shi W (2005) PET: a personalized trust model with reputation and risk evaluation for P2P resource sharing. In: Proceedings of the 38th annual Hawaii international conference on system sciences. IEEE, pp 201b

  • Liébana-Cabanillas F, Nogueras R, Herrera LJ, Guillén A (2013) Analysing user trust in electronic banking using data mining methods. Expert Syst Appl 40(14):5439–5447

    Article  Google Scholar 

  • Liefa L, Wei S, Chaoyang L, Xiangmao M (2014) A trust model based on game theory in VANET. Comput Meas Control 4:88

    Google Scholar 

  • Lim JB, HeonChang Yu, Gil J-M (2017) Detecting sybil attacks in cloud computing environments based on fail-stop signature. Symmetry 9(3):35

    Article  ADS  Google Scholar 

  • Lin L-Y, Lu C-Y (2010) The influence of corporate image, relationship marketing, and trust on purchase intention: the moderating effects of word-of-mouth. Tour Rev 65:16–34

    Article  Google Scholar 

  • Lin G, Bie Y, Lei M, Zheng K (2014a) ACO-BTM: a behavior trust model in cloud computing environment. Int J Comput Intell Syst 7(4):785–795

    Article  Google Scholar 

  • Lin G, Wang D, Bie Y, Lei M (2014b) MTBAC: a mutual trust based access control model in cloud computing. China Commun 11(4):154–162

    Article  ADS  Google Scholar 

  • Lin H, Xu L, Huang X, Wu W, Huang Y (2015) A trustworthy access control model for mobile cloud computing based on reputation and mechanism design. Ad Hoc Netw 35:51–64 (Special issue on Big data inspired data sensing, processing and networking technologies)

    Article  Google Scholar 

  • Lingam G, Rout RR, Somayajulu DVLN (2018) Learning automata-based trust model for user recommendations in online social networks. Comput Electr Eng 66:174–188

    Article  Google Scholar 

  • Liu F, Li H (2012) Social network-based quantum trust management. In: Proceedings of 2012 2nd international conference on computer science and network technology, pp 487–490

  • Liu G, Yang Q, Wang H, Lin X, Wittie MP (2014) Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic. In: IEEE INFOCOM 2014—IEEE conference on computer communications, pp 1698–1706

  • Liu Y, Liang C, Chiclana F, Jian W (2021) A knowledge coverage-based trust propagation for recommendation mechanism in social network group decision making. Appl Soft Comput 101:107005

    Article  Google Scholar 

  • Lo M, Iraqi Y, Boutaba R (2010) Reputation-based trust management in peer-to-peer systems: taxonomy and anatomy. Springer, Boston, pp 689–732

    Google Scholar 

  • Luke Teacy WT, Patel J, Jennings NR, Luck M (2006) TRAVOS: trust and reputation in the context of inaccurate information sources. Auton Agents Multi-Agent Syst 12(2):183–198

    Article  Google Scholar 

  • Luo X (2002) Trust production and privacy concerns on the internet: a framework based on relationship marketing and social exchange theory. Ind Market Manag 31(2):111–118

    Article  Google Scholar 

  • Mada BE, Bagaa M, Taleb T (2019) Trust-based video management framework for social multimedia networks. IEEE Trans Multimedia 21(3):603–616

    Article  Google Scholar 

  • Ma H, Hu Z (2014) Cloud service recommendation based on trust measurement using ternary interval numbers. In: 2014 International conference on smart computing, pp 21–24

  • Malik Z, Akbar I, Bouguettaya A (2009) Web services reputation assessment using a hidden Markov model. In: Baresi L, Chi C-H, Suzuki J (eds) Service-oriented computing. Springer, Berlin, pp 576–591

    Google Scholar 

  • Manuel P (2015) A trust model of cloud computing based on quality of service. Ann Oper Res 233(1):281–292

    Article  Google Scholar 

  • Mármol FG, Pérez GM (2011) Providing trust in wireless sensor networks using a bio-inspired technique. Telecommun Syst 46(2):163–180

    Article  Google Scholar 

  • Marsh S (1994) Formalising trust as a computational concept. PhD thesis, Department of Mathematics and Computer Science, University of Stirling

  • Mehdi MM, Raza I, Hussain SA (2017) A game theory based trust model for vehicular ad hoc networks (VANETs). Comput Netw 121:152–172

    Article  Google Scholar 

  • Meng W, Li W, Su C, Zhou J, Lu R (2018) Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. IEEE Access 6:7234–7243

    Article  Google Scholar 

  • Meng W, Wenjuan L, Yu W, Man HA (2020) Detecting insider attacks in medical cyber-physical networks based on behavioral profiling. Future Gener Comput Syst 108:1258–1266

    Article  Google Scholar 

  • Mohammadi V, Rahmani AM, Darwesh AM, Sahafi A (2019) Trust-based recommendation systems in internet of things: a systematic literature review. Hum Cent Comput Inf Sci 9(1):1–61

    Article  Google Scholar 

  • Mohammadnia H, Shakeri H (2014) Hitcloud: novel hierarchical model for trust management in cloud computing. In: Technology, communication and knowledge (ICTCK), 2014 international congress on, IEEE, pp 1–8

  • Momani M (2010) Trust models in wireless sensor networks: a survey. In: Meghanathan N, Boumerdassi S, Chaki N, Nagamalai D (eds) Recent trends in network security and applications. Springer, Berlin, pp 37–46

    Chapter  Google Scholar 

  • Morselli R, Katz J, Bhattacharjee B (2004) A game-theoretic framework for analyzing trust-inference protocols. In: Workshop on economics of peer-to-peer systems

  • Muchahari MK, Sinha SK (2018) Reputation-based trust for selection of trustworthy cloud service providers. In: Mandal JK, Saha G, Kandar D, Maji AK (eds) Proceedings of the international conference on computing and communication systems. Springer, Singapore, pp 65–74

  • Mui L, Mohtashemi M, Halberstadt A (2002) A computational model of trust and reputation for e-businesses. In Proceedings of the 35th annual Hawaii international conference on system sciences (HICSS’02)—vol 7. HICSS’02. IEEE Computer Society, USA, pp 188

  • Nepal S, Sherchan W, Bouguettaya A (2010) A behaviour-based trust model for service web. In: 2010 IEEE international conference on service-oriented computing and applications (SOCA), pp 1–4

  • Nepal S, Sherchan W, Paris C (2011) STRUST: a trust model for social networks. In: 2011 IEEE 10th international conference on trust, security and privacy in computing and communications, pp 841–846

  • Nguyen MH, Tran DQ (2015) A trust model for new member in multiagent system. Vietnam J Comput Sci 2(3):181–190

    Article  Google Scholar 

  • Nielsen M, Krukow K, Sassone V (2007) A Bayesian model for event-based trust. In: Cardelli L, Fiore M, Winskel G (eds) Festschrift in honour of Gordon Plotkin. Electronic notes in theoretical computer science. Elsevier, Amsterdam

    Google Scholar 

  • Noor TH, Sheng QZ (2011) Credibility-based trust management for services in cloud environments. In: Kappel G, Maamar Z, Motahari-Nezhad HR (eds) Service-oriented computing. Springer, Berlin, pp 328–343

    Chapter  Google Scholar 

  • Noor TH, Sheng QZ, Alfazi A (2013) Reputation attacks detection for effective trust assessment among cloud services. In: 2013 12th IEEE international conference on trust, security and privacy in computing and communications, pp 469–476

  • Noor TH, Sheng QZ, Yao L, Dustdar S, Ngu AHH (2016) CloudArmor: supporting reputation-based trust management for cloud services. IEEE Trans Parallel Distrib Syst 27(2):367–380

    Article  Google Scholar 

  • Norman TJ, Reed C (2010) A logic of delegation. Artif Intell 174(1):51–71

    Article  MathSciNet  Google Scholar 

  • Oh H-K, Kim J-W, Kim S-W, Lee K (2013) A probability-based trust prediction model using trust-message passing. In: Proceedings of the 22nd international conference on world wide web, WWW’13 companion. Association for Computing Machinery, New York, NY, USA, pp 161–162

  • Omar M, Challal Y, Bouabdallah A (2012) Certification-based trust models in mobile ad hoc networks: a survey and taxonomy. J Netw Comput Appl 35(1):268–286

    Article  Google Scholar 

  • Pan Y, Yafang Yu, Yan L (2013) An improved trust model based on interactive ant algorithms and its applications in wireless sensor networks. Int J Distrib Sens Netw 9(7):764064

    Article  Google Scholar 

  • Parvathy M, Sundarakantham K, Mercy Shalinie S (2015) Cosine similarity-based clustering and dynamic reputation trust aware key generation scheme for trusted communication on social networking. J Stat Comput Simul 85(16):3247–3258

    Article  MathSciNet  Google Scholar 

  • Pecori R, Veltri L (2018) A balanced trust-based method to counter sybil and spartacus attacks in chord. Secur Commun Netw 2018:1–16

    Article  Google Scholar 

  • Pinyol I, Sabater-Mir J (2013) Computational trust and reputation models for open multi-agent systems: a review. Artif Intell Rev 40(1):1–25

    Article  Google Scholar 

  • Qijun G, Liu P, Chu C-H, Zhu S (2007) Defence against packet injection in ad hoc networks. Int J Secur Netw 2(1/2):154

    Article  Google Scholar 

  • Rafailidis D (2016) Modeling trust and distrust information in recommender systems via joint matrix factorization with signed graphs. In: Proceedings of the 31st annual ACM symposium on applied computing, SAC’16. ACM, New York, NY, USA, pp 1060–1065

  • Raghebi Z, Hashemi MR (2013) A new trust evaluation method based on reliability of customer feedback for cloud computing. In: 2013 10th International ISC conference on information security and cryptology (ISCISC), Aug 2013, pp 1–6

  • Rahimi H, Bakkali HEL (2015) CIOSOS: combined idiomatic-ontology based sentiment orientation system for trust reputation in e-commerce. In: Herrero Á, Baruque B, Sedano J, Quintián H, Corchado E (eds) International joint conference. Springer International Publishing, Cham, pp 189–200

  • Rajeshkumar G, Valluvan KR (2017) An energy aware trust based intrusion detection system with adaptive acknowledgement for wireless sensor network. Wirel Pers Commun 94(4):1993–2007

    Article  Google Scholar 

  • Raju HS, Salim S (2016) Reputation and trust management models in peer-to-peer. In: 2016 International conference on research advances in integrated navigation systems (RAINS), pp 1–3

  • Rathbun BC (2018) Trust and international relations. Oxford Academic, Oxford

    Google Scholar 

  • Reddy VB, Negi A, Venkataraman S, Venkataraman VR (2019) A similarity based trust model to mitigate badmouthing attacks in internet of things (IoT). In: 2019 IEEE 5th world forum on internet of things (WF-IoT), pp 278–282

  • Rezvanian A, Moradabadi B, Ghavipour M, Khomami MMD, Meybodi MR (2019) Social trust management. Learning automata approach for social networks. Springer, Berlin, pp 241–279

    Chapter  Google Scholar 

  • Richardson M, Agrawal R, Domingos P (2003) Trust management for the semantic web. In: International semantic web conference. Springer, pp 351–368

  • Richters O, Peixoto TP (2011) Trust transitivity in social networks. PLoS One 6(4):1–14, 04

    Article  Google Scholar 

  • Ries S (2007) Certain trust: a trust model for users and agents. In: Proceedings of the 2007 ACM symposium on applied computing, pp 1599–1604

  • Rousseau DM, Sitkin SB, Burt RS, Camerer C (1998) Not so different after all: a cross-discipline view of trust. Acad Manag Rev 23(3):393–404

    Article  Google Scholar 

  • Ruan Y, Durresi A (2016) A survey of trust management systems for online social communities—trust modeling, trust inference and attacks. Knowl Based Syst 106:150–163

    Article  Google Scholar 

  • Ruan Y, Alfantoukh L, Fang A, Durresi A (2014) Exploring trust propagation behaviors in online communities. In: 2014 17th International conference on network-based information systems, pp 361–367

  • Ruan Y, Alfantoukh L, Durresi A (2015) Exploring stock market using twitter trust network. In: 2015 IEEE 29th international conference on advanced information networking and applications, pp 428–433

  • Ruan Y, Zhang P, Alfantoukh L, Durresi A (2017) Measurement theory-based trust management framework for online social communities. ACM Trans Internet Technol (TOIT) 17(2):1–24

    Article  Google Scholar 

  • Ruohomaa S, Kutvonen L (2005) Trust management survey. In: Herrmann P, Issarny V, Shiu S (eds) Trust management. Springer, Berlin, pp 77–92

    Chapter  Google Scholar 

  • Sabater J, Sierra C (2001) Regret: reputation in gregarious societies. In: Proceedings of the fifth international conference on autonomous agents, pp 194–195

  • Sabater J, Sierra C (2005) Review on computational trust and reputation models. Artif Intell Rev 24(1):33–60

    Article  Google Scholar 

  • Saeed O, Shaikh RA (2018) A user-based trust model for cloud computing environment. Int J Adv Comput Sci Appl 9(3)

  • Salvail L, Peev M, Diamanti E, Alléaume R, Lütkenhaus N, Länger T (2010) Security of trusted repeater quantum key distribution networks. J Comput Secur 18(1):61–87

    Article  Google Scholar 

  • Sanadhya S, Singh S (2015) Trust calculation with ant colony optimization in online social networks. Procedia Comput Sci 54:186–195. In: Eleventh international conference on communication networks, ICCN 2015, August 21–23, 2015, Bangalore, India and Eleventh international conference on data mining and warehousing, ICDMW 2015, August 21–23, 2015, Bangalore, India Eleventh International Conference on Image and Signal Processing, ICISP 2015, August 21-23, 2015, Bangalore, India

  • Schartner P, Rass S (2009) How to overcome the ‘trusted node model’ in quantum cryptography. In: 2009 International conference on computational science and engineering, vol 3. IEEE, pp 259–262

  • Selcuk AA, Uzun E, Pariente MR (2004) A reputation-based trust management system for P2P networks. In: IEEE International symposium on cluster computing and the grid, 2004. CCGrid 2004, pp 251–258

  • Selvaraj A, Sundararajan S (2017) Evidence-based trust evaluation system for cloud services using fuzzy logic. Int J Fuzzy Syst 19(2):329–337

    Article  Google Scholar 

  • Serrat O (2017) Social network analysis. Knowledge solutions. Springer, Berlin, pp 39–43

    Chapter  Google Scholar 

  • Shabut AM, Dahal KP, Bista SK, Awan IU (2014) Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans Mob Comput 14(10):2101–2115

    Article  Google Scholar 

  • Shahrdar S, Menezes L, Nojoumian M (2019) A survey on trust in autonomous systems. In: Arai K, Kapoor S, Bhatia R (eds) Intelligent computing. Springer, Cham, pp 368–386

    Chapter  Google Scholar 

  • Shakeri H, Bafghi GA (2014) A layer model of a confidence-aware trust management system. Int J Inf Sci Intell Syst 3(1):73–90

    Google Scholar 

  • Sherchan W, Nepal S, Paris C (2013) A survey of trust in social networks. ACM Comput Surv. https://doi.org/10.1145/2501654.2501661

    Article  Google Scholar 

  • Shmatikov V, Talcott C (2005) Reputation-based trust management. J Comput Secur 13(1):167–190

    Article  Google Scholar 

  • Siddiqui SA, Mahmood A, Zhang WE, Sheng QZ (2019a) Machine learning based trust model for misbehaviour detection in internet-of-vehicles. In: International conference on neural information processing. Springer, pp 512–520

  • Siddiqui SA, Mahmood A, Zhang WE, Sheng QZ (2019b) Poster: a machine learning based hybrid trust management heuristic for vehicular ad hoc networks. In: The 25th annual international conference on mobile computing and networking, pp 1–3

  • Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115

    Article  Google Scholar 

  • Singh A, Chatterjee K (2019a) An adaptive mutual trust based access control model for electronic healthcare system. J Ambient Intell Human Comput 11:2117–2136

    Article  Google Scholar 

  • Singh A, Chatterjee K (2019b) ITrust: identity and trust based access control model for healthcare system security. Multimedia Tools Appl 78(19):28309–28330

    Article  Google Scholar 

  • Singh A, Chatterjee K (2019c) Trust based access control model for securing electronic healthcare system. J Ambient Intell Human Comput 10(11):4547–4565

    Article  Google Scholar 

  • Singh R, Singh J, Singh R (2017) A novel sybil attack detection technique for wireless sensor networks. Adv Comput Sci Technol 10(2):185–202

    Google Scholar 

  • Soleymani SA, Abdullah AH, Hassan WH, Anisi MH, Goudarzi S, Baee MAR, Mandala S (2015) Trust management in vehicular ad hoc network: a systematic review. EURASIP J Wirel Commun Netw 2015(1):146

    Article  Google Scholar 

  • Song W, Phoha VV, Xu X (2004) The HMM-based model for evaluating recommender’s reputation. In: IEEE international conference on e-commerce technology for dynamic e-business, pp 209–215

  • Sonja B, Boudec J (2004) A robust reputation system for peer-to-peer and mobile ad-hoc networks. In: Proceedings of the second workshop on the economics of peer-to-peer systems (P2PEcon 2004). Cambridge, MA, USA, pp 4–5

  • Spector MD, Jones GE (2004) Trust in the workplace: factors affecting trust formation between team members. J Soc Psychol 144(3):311–321

    Article  PubMed  Google Scholar 

  • Srivatsa M, Xiong L, Liu L (2005) TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. In: Proceedings of the 14th international conference on world wide web, pp 422–431

  • Stakhanova N, Ferrero S, Wong JS, Cai Y (2004) A reputation-based trust management in peer-to-peer network systems. In: ISCA PDCS, vol 4, pp. 510–515

  • Sun YL, Han Z, Yu W, Liu KJR (2006) A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. In: Proceedings IEEE INFOCOM 2006. 25th IEEE international conference on computer communications, April 2006, pp 1–13

  • Sun Y, Han Z, Liu KJR (2008) Defense of trust management vulnerabilities in distributed networks. IEEE Commun Mag 46(2):112–119

    Article  Google Scholar 

  • Sun G, Zhang Z, Zheng B, Li Y (2019) Multi-sensor data fusion algorithm based on trust degree and improved genetics. Sensors 19(9):2139

    Article  ADS  PubMed  PubMed Central  Google Scholar 

  • Suryani V, Selo, Widyawan (2016) A survey on trust in internet of things. In 2016 8th International conference on information technology and electrical engineering (ICITEE), pp 1–6

  • Taherian M, Jalili R, Amini M (2008) A semantic-aware ontology-based trust model for pervasive computing environments. In: Rong C, Jaatun MG, Sandnes FE, Yang LT, Ma J (eds) Autonomic and trusted computing. Springer, Berlin, pp 47–59

    Chapter  Google Scholar 

  • Tan S, Liu Y, Li X, Dong Q (2016a) A similarity-based indirect trust model with anti-spoofing capability. Secur Commun Netw 9(18):5868–5881

    Article  Google Scholar 

  • Tan Z, Wang X, Wang X (2016b) A novel iterative and dynamic trust computing model for large scaled P2P networks. Mob Inf Syst 2016:1–12

    Google Scholar 

  • Tavakolifard M, Almeroth KC (2012) A taxonomy to express open challenges in trust and reputation systems. J Commun 7(7):538–551

    Article  Google Scholar 

  • Teacy WTL, Patel J, Jennings NR, Luck M (2005) Coping with inaccurate reputation sources: Experimental analysis of a probabilistic trust model. In: Proceedings of the fourth international joint conference on autonomous agents and multiagent systems, pp 997–1004

  • Tian C, Yang B (2011) R2Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks. Future Gener Comput Syst 27(8):1135–1141

    Article  Google Scholar 

  • Tian L, Lin C, Ni Y (2010) Evaluation of user behavior trust in cloud computing. In: 2010 International conference on computer application and system modeling (ICCASM 2010), vol 7. Oct 2010, pp V7-567–V7-572

  • Trabay DW, El-Henawy I, Gharibi W (2021) A trust framework utilization in cloud computing environment based on multi-criteria decision-making methods. Comput J 8:10–1093

    Google Scholar 

  • Trnka R, Balcar K, Kuška M, Hnilica K (2012) Neuroticism and valence of negative emotional concepts. Soc Behav Personal Int J 40(5):843–844

    Article  Google Scholar 

  • Truong NB (2018) Evaluation of trust in the internet of things: models, mechanisms and applications. Liverpool John Moores University, United Kingdom

  • Tucker S (2018) Engineering trust: a graph-based algorithm for modeling, validating, and evaluating trust. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE), Aug 2018, pp 1–9

  • Ureña R, Chiclana F, Herrera-Viedma E (2020) DeciTrustNET: a graph based trust and reputation framework for social networks. Inf Fusion 61:101–112

    Article  Google Scholar 

  • Uslu S, Kaur D, Rivera SJ, Durresi A, Babbar-Sebens M, Tilt JH (2021) A trustworthy human-machine framework for collective decision making in food-energy-water management: the role of trust sensitivity. Knowle Based Syst 213:106683

    Article  Google Scholar 

  • Vasani V, Chudasama V (2019) A trust rating model using fuzzy logic in cloud. In: Bhattacharyya S, Hassanien AE, Gupta D, Khanna A, Pan I (eds) International conference on innovative computing and communications. Springer, Singapore, pp 339–348

  • Vineburgh JH (2010) A study of organizational trust and related variables among faculty members at HBCUs 2–131. https://doi.org/10.17077/etd.iet9btjl

  • Wang Y (2018) Trust quantification for networked cyber-physical systems. IEEE Internet Things J 5(3):2055–2070

    Article  Google Scholar 

  • Wang J, Chen I (2014) Trust-based data fusion mechanism design in cognitive radio networks. In: 2014 IEEE conference on communications and network security, pp 53–59

  • Wang G, Jie W (2011) Multi-dimensional evidence-based trust management with multi-trusted paths. Future Gener Comput Syst 27(5):529–538

    Article  Google Scholar 

  • Wang Y, Vassileva J (2005) Bayesian network trust model in peer-to-peer networks. In: Moro G, Sartori C, Singh MP (eds) Agents and peer-to-peer computing. Springer, Berlin, pp 23–34

    Google Scholar 

  • Wang S, Zheng Z, Zhengping W, Lyu MR, Yang F (2014a) Reputation measurement and malicious feedback rating prevention in web service recommendation systems. IEEE Trans Serv Comput 8(5):755–767

    Article  Google Scholar 

  • Wang D, Muller T, Liu Y, Zhang J (2014b) Towards robust and effective trust management for security: a survey. In: 2014 IEEE 13th international conference on trust, security and privacy in computing and communications, pp 511–518

  • Wang Y, Cai Z, Yin G, Gao Y, Tong X, Han Q (2016) A game theory-based trust measurement model for social networks. Comput Soc Netw 3(1):2

    Article  PubMed  PubMed Central  Google Scholar 

  • Wang J, Qiao K, Zhang Z (2018) Trust evaluation based on evidence theory in online social networks. Int J Distrib Sens Netw 14(10):1550147718794629

    Article  Google Scholar 

  • Watson RT, Webster J (2020) Analysing the past to prepare for the future: writing a literature review a roadmap for release 2.0. J Decis Syst 29(3):129–147

    Article  Google Scholar 

  • Webster J, Watson RT (2002) Analyzing the past to prepare for the future: writing a literature review. MIS Q 26:xiii–xxiii

    Google Scholar 

  • Wei Z, Tang H, Yu FR, Mason P (2014) Trust establishment based on Bayesian networks for threat mitigation in mobile ad hoc networks. In: 2014 IEEE military communications conference, pp 171–177

  • Wheeler NJ (2012) Trust-building in international relations. Peace Prints South Asian J Peacebuild 4(2):1–13

    Google Scholar 

  • Xia H, Jia Z, Lei J, Zhu Y (2011) Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory. IET Wirel Sens Syst 1(4):248–266

    Article  Google Scholar 

  • Xia H, Xiao F, Zhang S, Cheng X, Pan Z (2018a) A reputation-based model for trust evaluation in social cyber-physical systems. IEEE Trans Netw Sci Eng 7:792–804

    Article  Google Scholar 

  • Xia H, Li B, Zhang S, Wang S, Cheng X (2018b) A novel recommendation-based trust inference model for MANETs. In: Chellappan S, Cheng W, Li W (eds) Wireless algorithms, systems, and applications. Springer, Cham, pp 893–906

    Chapter  Google Scholar 

  • Xiaonian W, Runlian Z, Shengyuan Z, Chunbo M (2009) Behavior trust computation model based on risk evaluation in the grid environment. In: 2009 WRI world congress on software engineering, vol 3, pp 392–396

  • Xiaonian W, Zhang R, Zeng B, Zhou S (2013) A trust evaluation model for cloud computing. Procedia Comput Sci 17:1170–1177 (First international conference on information technology and quantitative management)

    Article  Google Scholar 

  • Xiong L, Liu L (2004) Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857

    Article  Google Scholar 

  • Xue L, Zhang P, Zeng A (2019) Enhancing the long-term performance of recommender system. Physica A Stat Mech Appl 531:121731

    Article  Google Scholar 

  • Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134

    Article  Google Scholar 

  • Yan S-R, Zheng X-L, Wang Y, Song WW, Zhang W-Y (2015) A graph-based comprehensive reputation model: exploiting the social context of opinions to enhance trust in social commerce. Inf Sci 318:51–72

    Article  MathSciNet  Google Scholar 

  • Yan C, Chang X, Li Z, Guan W, Ge Z, Zhu L, Zheng Q (2021) Zeronas: differentiable generative adversarial networks search for zero-shot learning. IEEE Trans Pattern Anal Mach Intell 44(12):9733–9740

    Article  Google Scholar 

  • Yang N (2013) A similarity based trust and reputation management framework for VANETs. Int J Future Gener Commun Netw 6(2):25–34

    Google Scholar 

  • Yang Y, Chen J (2009) A dynamic trust evaluation model on C2C marketplaces. In: 2009 International conference on computational science and engineering, Aug 2009, vol 3, pp 482–485

  • Yang X, Qu X, Gui C (2006) Towards reliable rating filtering in grid reputation systems: A pre-evaluating set based bias-tuned approach1. In: 2006 2nd IEEE international symposium on dependable, autonomic and secure computing. IEEE, pp 129–136

  • Yang L, Zhang Y, Xing C, Zhang T (2010) A node interest similarity based P2P trust model. In: 2010 IEEE 12th international conference on communication technology, pp 572–575

  • Yu H, Shen Z, Leung C, Miao C, Lesser VR (2013) A survey of multi-agent trust management systems. IEEE Access 1:35–50

    Article  Google Scholar 

  • Zacharia G (1999) Collaborative reputation mechanisms for online communities. PhD thesis, Massachusetts Institute of Technology

  • Zhan J, Fang X (2011) A novel trust computing system for social networks. In: 2011 IEEE third international conference on privacy, security, risk and trust and 2011 IEEE third international conference on social computing, pp 1284–1289

  • Zhang J (2011) A survey on trust management for VANETs. In 2011 IEEE international conference on advanced information networking and applications, pp 105–112

  • Zhang P, Durresi A (2012) Trust management framework for social networks. In: 2012 IEEE international conference on communications (ICC), pp 1042–1047

  • Zhang B, Xiang Y, Xu Q (2009) Semantics based information trust computation and propagation algorithm for semantic web. In: Proceedings of the 5th international conference on wireless communications, networking and mobile computing, WiCOM’09. IEEE Press, pp 4533–4536

  • Zhang P, Durresi A, Barolli L (2011) Survey of trust management on various networks. In: 2011 International conference on complex, intelligent, and software intensive systems, pp 219–226

  • Zhang S, Xie Z, Yin Y, Chang Y, Sheng Z, Yan L, Wang H, Han G, Huang Y, Wan G (2017) Study on quantum trust model based on node trust evaluation. Chin J Electron 26(3):608–613

    Article  CAS  Google Scholar 

  • Zhang PY, Zhou MC, Fortino G (2018) Security and trust issues in fog computing: a survey. Future Gener Comput Syst 88:16–27

    Article  Google Scholar 

  • Zhang S, Chang Y, Yan L, Sheng Z, Yang F, Han G, Huang Y, Xia J (2019) Quantum communication networks and trust management: a survey. Comput Mater Contin 61:1145–1174

    Google Scholar 

  • Zhang L, Chang X, Liu J, Luo M, Li Z, Yao L, Hauptmann A (2022) TN-ZSTAD: transferable network for zero-shot temporal activity detection. IEEE Trans Pattern Anal Mach Intell 45:3848–3861

    Google Scholar 

  • Zhao B, Chuangbai Xiao Yu, Zhang PZ, Wang Z (2019) Assessment of recommendation trust for access control in open networks. Clust Comput 22(1):565–571

    Article  Google Scholar 

  • Zhu Y, Yan Z (2016) A survey on trust evaluation in e-commerce. In: Proceedings of the 9th EAI international conference on mobile multimedia communications, MobiMedia’16, Brussels, BEL. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp 130–139

  • Zhu C, Nicanfar H, Leung VCM, Yang LT (2015) An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Trans Inf Forensics Secur 10(1):118–131

    Article  Google Scholar 

  • Zhou T, Zhengding L, Kai L (2006) Time-based dynamic trust model using ant colony algorithm. Wuhan Univ J Nat Sci 11(6):1462–1466

    Article  Google Scholar 

  • Zia TA (2008) Reputation-based trust management in wireless sensor networks. In: 2008 International conference on intelligent sensors, sensor networks and information processing, pp 163–166

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashish Singh.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, A., Chatterjee, K. Trust management in online computing environment: a complete review. J Ambient Intell Human Comput 15, 491–545 (2024). https://doi.org/10.1007/s12652-023-04676-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-023-04676-9

Keywords

Navigation