Cloud computing is a new model to enable convenient and on-demand access to the pool of configurable computing resources. In this kind of computing platform, the confidences are insufficient for the customers to identify the trustworthy cloud service providers. Therefore, one of the most important challenges in this environment is to evaluate the trust value to enable users for selecting the trustworthy resources, however, to the best of our knowledge, the comprehensive and detailed review of the most important techniques in this field is very rare. Hence, in this paper, the comprehensive and detailed study and survey of the state of the art techniques and mechanisms in this field are provided. Also, we discuss the trust evaluating mechanisms in the cloud computing and categorize them into two main groups including centralized and distributed mechanisms. Furthermore, we defined trust characteristics such as integrity, security, availability, reliability, dependability, safety, dynamicity, confidentiality and scalability, and we discuss the trust applications including monitoring and tracking. Also, this survey paper provides a discussion of differences between considered techniques in terms of integrity, security, availability, reliability, dependability, safety, dynamicity, confidentiality and scalability as well as directions for future research.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Abbadi IM & Alawneh M (2012) A framework for establishing trust in the Cloud. Computers & Electrical Engineering 38(5):1073–1087.
Abbadi IM (2013) A framework for establishing trust in Cloud provenance. International Journal of Information Security 12:111–128.
Adjei JK, Blackman C & Blackman C (2015) Explaining the role of trust in cloud computing services. info 17.
Alamir P, Jafari Navimipour N, Ramage M, Ramage M, & Ramage M (2016) Trust evaluation between the users of social networks using the quality of service requirements and call log histories. Kybernetes 45(10).
Anselmi, J, Ardagna D, & Passacantando M (2014) Generalized Nash equilibria for SaaS/ PaaS Clouds. European Journal of Operational Research 236:326–339.
Avram MG (2014) Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology 12:529–534.
Aznoli F & and Navimipour NJ (2017) Cloud services recommendation: Reviewing the recent advances and suggesting the future research directions. Journal of Network and Computer Applications 77:73–86.
Chahal RK & Singh S (2016) Fuzzy Rule-Based Expert System for Determining Trustworthiness of Cloud Service Providers. International Journal of Fuzzy Systems 19(2):338–354.
Chiregi M & Navimipour NJ (2016a) A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders’ entities and removing the effect of troll entities. Computers in Human Behavior 60:280–292.
Chiregi M & Navimipour NJ (2016b) Trusted services identification in the cloud environment using the topological metrics. Karbala International Journal of Modern Science 2:203–210.
Dykstra J & Sherman AT (2012) Acquiring forensic evidence from infrastructure-as-aservice cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation 9:S90–S98.
Emeakaroha V, Fatema K, Vanderwerff L, Healy P, Lynn T, & Morrison J (2016) A Trust Label System for Communicating Trust in Cloud Services. IEEE Transactions on Services.
Espadas J, Molina A, Jiménez G, Molina M, Ramírez R, & Concha D (2013) A tenant-based resource allocation model for scaling Software-as-a-Service applications over cloud computing infrastructures. Future Generation Computer Systems 29:273–286.
Fouladi P & Navimipour JN (2017) Human resources ranking in a cloud-based knowledge sharing framework using the quality control criteria. Kybernetes.
Gajbhiye A & Shrivastva KMP (2014) Cloud computing: Need, enabling technology, architecture, advantages and challenges. in Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference:1-7.
Gani A, Nayeem GM, Shiraz M, Sookhak M, Whaiduzzaman M, & Khan S (2014) A review on interworking and mobility Techniques for seamless connectivity In Mobile Cloud Computing. Journal of Network and Computer Applications 43:84–102.
Ghosh S & ME DR (2014) Enhanced Distributed Accountability Framework with Indexing In the Cloud and Its Security Analysis. The International Journal of Engineering and Science 3(3):1–6.
Goel A & Goel S (2012) Security Issues in Cloud Computing. International Journal of Application or Innovation in Engineering & Management 1:121–124.
Gupta HV, Brookshire DS, Tidwell VC, & Boyle DP (2013) A basis for linking policy to adaptive water management. Water Policy in New Mexico: Addressing the Challenge of an Uncertain Future 9.
abib SM, Hauke S, Ries S, & Mühlhäuser M (2012), Trust as a facilitator in cloud computing: a survey. Journal of Cloud Computing 1:1–18.
Habib SM, Ries S, Mühlhäuser M, & Varikkattu P (2014) Towards a trust management system for cloud computing marketplaces: using caiq as a trust information source. Security and Communication Networks 7:2185–2200.
Jabbar S, Naseer K, Gohar M, Rho S, & Chang H (2016) Trust model at service layer of cloud computing for educational institutes. The Journal of Supercomputing 72(1):58–83.
Jadeja Y & Modi K (2012) Cloud computing-concepts, architecture and challenges. in Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on:877-880.
afari Navimipour N, Masoud Rahmani A, Habibizad Navin A, & Hosseinzadeh M (2014) Job scheduling in the Expert Cloud based on genetic algorithms. Kybernetes 43:1262–1275.
afari Navimipour N, Rahmani AM, Habibizad Navin A, & Hosseinzadeh M (2015) Expert Cloud. Computers in Human Behavior 46:57–74.
afari Navimipour N, Rahmani AM, Navin AH, & Hosseinzadeh M (2015) Expert Cloud: A Cloud-based framework to share the knowledge and skills of human resources. Computers in Human Behavior 46:57–74.
Jaiganesh M, Aarthi M, & Kumar AVA (2015) Fuzzy ART-Based User Behavior Trust in Cloud Computing. in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, ed: Springer:341–348.
Januzaj Y, Ajdari J, & Selimi B (2015) DBMS as a Cloud service: Advantages and Disadvantages. Procedia-Social and Behavioral Sciences 195:1851–1859.
Juan D & Zheng Q (2014) Cloud and open BIM-based building information interoperability research. Journal of Service Science and Management 2014.
Keshanchi B & Navimipour NJ (2016) Priority-Based Task Scheduling in the Cloud Systems Using a Memetic Algorithm. Journal of Circuits, Systems and Computers:1650119.
Keshanchi B, Souri A, & Navimipour NJ (2017) An improved genetic algorithm for task scheduling in the cloud environments using the priority queues: formal verification, simulation, and statistical testing. Journal of Systems and Software 124:1–21.
Khethavath P, Thomas J, Chan-Tin E, & Liu H (2013) Introducing aDistributed Cloud Architecture with Efficient Resource Discovery and Optimal Resource Allocation. in Services (SERVICES), 203 IEEE Ninth World Congress on:386-392.
Ko RK, Jagadpramana P, Mowbray M, Pearson S, Kirchberg M, Liang Q (2011) TrustCloud: A framework for accountability and trust in cloud computing. in Services (SERVICES), 2011 IEEE World Congress on:584-588.
Kumar R & Charu S (2015) An Importance of Using Virtualization Technology in Cloud Computing. Global Journal of Computers & Technology 1.
Kumarga NP & Sireesha D (2014) Ensuring Data Integrity in Cloud Computing. International Journal of Computer Science & Network Security 14(9):34–38.
Li X, Ma H, Zhou F, & Gui X (2015) Service operator-aware trust scheme for resource matchmaking across multiple clouds. IEEE Transactions on Parallel and Distributed Systems 26:1419–1429.
Li Z, De Souza R, & Goh M (2016) Supply Chain Orchestration Leveraging on MNC Networks and Local Resources: Approach Strategies. Journal of Service Science and Management 9:303.
Lin G, Wang D, Bie Y, & Lei M (2014) MTBAC: A mutual trust based access control model in cloud computing. China Communications 11:154–162.
Liu YC, Ma YT, Zhang HS, Li DY, & Chen GS (2011) A method for trust management in cloud computing: Data coloring by cloud watermarking. International journal of automation and computing 8: 280–285.
Lynn T, van der Werff L, Hunt G, & Healy P (2016) Development of a Cloud Trust Label: A Delphi Approach. Journal of Computer Information Systems 56:185–193.
Manuel P (2013) A trust model of cloud computing based on Quality of Service. Annals of Operations Research:1–12.
Matos R, Marques C, & Sargento S (2014) Context-aware control of user-centric virtual networks: Centralized vs distributed approaches. Computer Networks 74:4–21.
Mei S, Wang Z, Cheng Y, Ren J, Wu J, & Zhou J (2012) Trusted bytecode virtual machine module: a novel method for dynamic remote attestation in cloud computing. International Journal of Computational Intelligence Systems 5(5):924–932.
Mendes C, Almeida M, & Da Silva MM (2013) Applying DEMO-based SLAs to cloud services. Journal of Service Science Research 5:95–123.
Milani AS & Navimipour NJ (2016) Load balancing mechanisms and techniques in the cloud environments: Systematic literature review and future trends. Journal of Network and Computer Applications.
ohammad Aghdam S & Jafari Navimipour N (2016) Opinion leaders selection in the social networks based on trust relationships propagation. Karbala International Journal of Modern Science 2(2):88–97.
Mohammadi SZ & Navimipour JN (2017) Invalid cloud providers’ identification using the support vector machine. International Journal of Next-Generation Computing.
Moyano F, Fernandez-Gago C, & Lopez J (2013) A framework for enabling trust requirements in social cloud applications. Requirements Engineering 18:321–341.
Mpofu N & van Staden WJ (2014) A survey of trust issues constraining the growth of Identity Management-as-a-Service (IdMaaS). in Information Security for South Africa (ISSA) 2014:1–6.
Navimipour NJ (2015) A formal approach for the specification and verification of a Trustworthy Human Resource Discovery mechanism in the Expert Cloud. Expert Systems with Applications 42:6112–6131.
Navimipour NJ (2015) Task scheduling in the cloud environments based on an artificial bee colony algorithm. in Proceedings of the Paper Presented at the International Conference on Image Processing, Production and Computer Science, Istanbul (Turkey).
Navimipour NJ, Rahmani AM, Navin AH, & Hosseinzadeh M (2014) Resource discovery mechanisms in grid systems: A survey. Journal of Network and Computer Applications 41:389–410.
Noor TH, Sheng QZ, & Bouguettaya A (2014) Trust Management in Cloud Services: Springer.
Noor TH, Sheng QZ, Maamar Z, & Zeadally S (2016) Managing Trust in the Cloud: State of the Art and Research Challenges. Computer 49:34–45.
Noor TH, Sheng QZ, Yao L, Dustdar S, & Ngu AH (2016) CloudArmor: Supporting reputation-based trust management for cloud services. IEEE transactions on parallel and distributed systems 27:367–380.
Paquette S, Jaeger PT, & Wilson SC (2010) Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly 27:245–253.
Patel N & Chauhan S (2015) A Survey On Load Balancing and Scheduling in cloud computing. International Journal for Scientific Research and Development 1:185–189.
Pathan ASK & Mohammed MM (2015) Building Customer trust in cloud computing with an ICT-enabled global regulatory body. Wireless Personal Communications 85:77–99.
Patil P (2015) Cloud Security Issues. Journal of Information Engineering and Applications 5: 31–34.
Perez JMM, Bernabe JB, Calero JMA, Clemente FJG, Perez GM, & Skarmeta AFG (2014) Taxonomy of trust relationships in authorization domains for cloud computing. The Journal of Supercomputing 70:1075–1099.
Puthal D, Sahoo B, Mishra S, & Swain S (2015) Cloud computing features, issues, and challenges: a big picture. in Computational Intelligence and Networks (CINE), 2015 International Conference on:116-123.
Rajendran VV & Swamynathan S (2015) Hybrid model for dynamic evaluation of trust in cloud services. Wireless Networks 22(6): 807–1818.
Sadashiv N & Kumar SD (2011) Cluster, grid and cloud computing: A detailed comparison. in Computer Science & Education (ICCSE), 2011 6th International Conference on: 477-482.
Salot P (2013) A Survey Of Various Scheduling Algorithm In Cloud Computing Environment. International Journal of research and engineering Technology (IJRET) 2.
Selvaraj A & Sundararajan S (2017) Evidence-Based Trust Evaluation System for Cloud Services Using Fuzzy Logic. International Journal of Fuzzy Systems 19(2):329–337.
Shahzad F (2014) State-of-the-art survey on cloud computing security Challenges, approaches and solutions. Procedia Computer Science 37:357–362.
Sheikholeslami F & Navimipour JN (2017) Service allocation in the cloud environments using multi-objective particle swarm optimization algorithm based on crowding distance. Swarm and Evolutionary Computation.
Sidhu J & Singh S (2016) Improved TOPSIS Method Based Trust Evaluation Framework for Determining Trustworthiness of Cloud Service Providers. Journal of Grid Computing: 1–25.
So K (2011) Cloud computing security issues and challenges. International Journal of Computer Networks 3.
Srinivasan S (2014) Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments:IGI Global.
Subashini S & Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34:1–11.
Sun D, Chang G, Sun L, & Wang X (2011) Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Engineering 15:2852–2856.
Takabi H, Joshi JB, & Ahn GJ (2010) Security and Privacy Challenges in Cloud Computing Environments. IEEE Security & Privacy 8:24–31.
Tan W, Sun Y, Li LX, Lu G, & Wang T (2014) A trust service-oriented scheduling model for workflow applications in cloud computing. IEEE Systems Journal 8:868–878.
Tang M, Dai X, Liu J, & Chen J (2016) Towards a trust evaluation middleware for cloud service selection. Future Generation Computer Systems.
Tchifilionova V (2011) Security and privacy implications of cloud computing-Lost in the cloud. in Open Research Problems in Network Security, ed: Springer:149–158.
Tian LQ, Lin C, & Ni Y (2010) Evaluation of user behavior trust in cloud computing. in 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
Vakili A & Navimipour NJ (2017) Comprehensive and systematic review of the service composition mechanisms in the cloud environments. Journal of Network and Computer Applications 81:24–36.
Vaquero LM, Rodero-Merino L, & Morán D (2011) Locking the sky: a survey on IaaS cloud security. Computing 91:93–118.
Wang W, Zeng G, Tang D, & Yao J (2012) Cloud-DLS: Dynamic trusted scheduling for Cloud computing. Expert Systems with Applications 39:2321–2329.
Wang Y, Chandrasekhar S, Singhal M, & Ma J (2016) A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing. Cluster Computing 19(2):647–662.
Wu L, Kumar Garg S, & Buyya R (2012) SLA-based admission control for a Software-as-a-Service provider in Cloud computing environments. Journal of Computer and System Sciences 78:1280–1299.
Wu X, Zhang R, Zeng B, & Zhou S (2013) A trust evaluation model for cloud computing. Procedia Computer Science 17:1170–1177.
Xie X, Liu R, Cheng X, Hu X, & Ni J (2016) Trust-Driven and PSO-SFLA based job scheduling algorithm on Cloud. Intelligent Automation & Soft Computing 22(4):1–6.
Yang Z, Qiao L, Liu C, Yang C, & Wan G (2010) A collaborative trust model of firewall through based on Cloud Computing. in Computer Supported Cooperative Work in Design (CSCWD), 2010 14th International Conference on:329-334.
Zhou L, Varadharajan V, & Hitchens M (2015) Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage. IEEE Transactions on Information Forensics and Security 10:2381–2395.
Zissis D & Lekkas D (2012) Addressing cloud computing security issues. Future Generation Computer Systems 28:583–592.
Zou D, Zhang W, Qiang W, Xiang G, Yang LT, Jin H, & Hu K (2013) Design and implementation of a trusted monitoring framework for cloud platforms. Future Generation Computer Systems 29:2092–2102.
Matin Chiregi received her B.S. in software engineer from Ahrar Branch, Rasht, Iran, in 2011; the M.S. in software engineer, from Tabriz Branch, Islamic Azad University, Tabriz, Iran, in 2015. Her research interests include cloud computing.
Nima Jafari Navimipour received his B.S. in computer engineering, software engineering, from Tabriz Branch, Islamic Azad University, Tabriz, Iran, in 2007; the M.S. in computer engineering, computer architecture, from Tabriz Branch, Islamic Azad University, Tabriz, Iran, in 2009; the Ph.D. in computer engineering, computer architecture, from Science and Research Branch, Islamic Azad University, Tehran, Iran in 2014. He is an assistance professor in the Department of Computer Engineering at Tabriz Branch, Islamic Azad University, Tabriz, Iran. He has published more than 100 papers in various journals and conference proceedings. His research interests include Cloud Computing, Social Networks, Fault-Tolerance Software, Computational Intelligence, Evolutionary Computing, and Network on Chip.
About this article
Cite this article
Chiregi, M., Navimipour, N.J. A comprehensive study of the trust evaluation mechanisms in the cloud computing. J Serv Sci Res 9, 1–30 (2017). https://doi.org/10.1007/s12927-017-0001-7
- Cloud Computing
- Monitoring and Tracking