A comprehensive study of the trust evaluation mechanisms in the cloud computing

Abstract

Cloud computing is a new model to enable convenient and on-demand access to the pool of configurable computing resources. In this kind of computing platform, the confidences are insufficient for the customers to identify the trustworthy cloud service providers. Therefore, one of the most important challenges in this environment is to evaluate the trust value to enable users for selecting the trustworthy resources, however, to the best of our knowledge, the comprehensive and detailed review of the most important techniques in this field is very rare. Hence, in this paper, the comprehensive and detailed study and survey of the state of the art techniques and mechanisms in this field are provided. Also, we discuss the trust evaluating mechanisms in the cloud computing and categorize them into two main groups including centralized and distributed mechanisms. Furthermore, we defined trust characteristics such as integrity, security, availability, reliability, dependability, safety, dynamicity, confidentiality and scalability, and we discuss the trust applications including monitoring and tracking. Also, this survey paper provides a discussion of differences between considered techniques in terms of integrity, security, availability, reliability, dependability, safety, dynamicity, confidentiality and scalability as well as directions for future research.

This is a preview of subscription content, access via your institution.

References

  1. Abbadi IM & Alawneh M (2012) A framework for establishing trust in the Cloud. Computers & Electrical Engineering 38(5):1073–1087.

    Article  Google Scholar 

  2. Abbadi IM (2013) A framework for establishing trust in Cloud provenance. International Journal of Information Security 12:111–128.

    Article  Google Scholar 

  3. Adjei JK, Blackman C & Blackman C (2015) Explaining the role of trust in cloud computing services. info 17.

    Google Scholar 

  4. Alamir P, Jafari Navimipour N, Ramage M, Ramage M, & Ramage M (2016) Trust evaluation between the users of social networks using the quality of service requirements and call log histories. Kybernetes 45(10).

  5. Anselmi, J, Ardagna D, & Passacantando M (2014) Generalized Nash equilibria for SaaS/ PaaS Clouds. European Journal of Operational Research 236:326–339.

    Article  Google Scholar 

  6. Avram MG (2014) Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology 12:529–534.

    Article  Google Scholar 

  7. Aznoli F & and Navimipour NJ (2017) Cloud services recommendation: Reviewing the recent advances and suggesting the future research directions. Journal of Network and Computer Applications 77:73–86.

    Article  Google Scholar 

  8. Chahal RK & Singh S (2016) Fuzzy Rule-Based Expert System for Determining Trustworthiness of Cloud Service Providers. International Journal of Fuzzy Systems 19(2):338–354.

    Article  Google Scholar 

  9. Chiregi M & Navimipour NJ (2016a) A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders’ entities and removing the effect of troll entities. Computers in Human Behavior 60:280–292.

    Article  Google Scholar 

  10. Chiregi M & Navimipour NJ (2016b) Trusted services identification in the cloud environment using the topological metrics. Karbala International Journal of Modern Science 2:203–210.

    Article  Google Scholar 

  11. Dykstra J & Sherman AT (2012) Acquiring forensic evidence from infrastructure-as-aservice cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation 9:S90–S98.

    Article  Google Scholar 

  12. Emeakaroha V, Fatema K, Vanderwerff L, Healy P, Lynn T, & Morrison J (2016) A Trust Label System for Communicating Trust in Cloud Services. IEEE Transactions on Services.

    Google Scholar 

  13. Espadas J, Molina A, Jiménez G, Molina M, Ramírez R, & Concha D (2013) A tenant-based resource allocation model for scaling Software-as-a-Service applications over cloud computing infrastructures. Future Generation Computer Systems 29:273–286.

    Article  Google Scholar 

  14. Fouladi P & Navimipour JN (2017) Human resources ranking in a cloud-based knowledge sharing framework using the quality control criteria. Kybernetes.

    Google Scholar 

  15. Gajbhiye A & Shrivastva KMP (2014) Cloud computing: Need, enabling technology, architecture, advantages and challenges. in Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference:1-7.

    Google Scholar 

  16. Gani A, Nayeem GM, Shiraz M, Sookhak M, Whaiduzzaman M, & Khan S (2014) A review on interworking and mobility Techniques for seamless connectivity In Mobile Cloud Computing. Journal of Network and Computer Applications 43:84–102.

    Article  Google Scholar 

  17. Ghosh S & ME DR (2014) Enhanced Distributed Accountability Framework with Indexing In the Cloud and Its Security Analysis. The International Journal of Engineering and Science 3(3):1–6.

    Google Scholar 

  18. Goel A & Goel S (2012) Security Issues in Cloud Computing. International Journal of Application or Innovation in Engineering & Management 1:121–124.

    Google Scholar 

  19. Gupta HV, Brookshire DS, Tidwell VC, & Boyle DP (2013) A basis for linking policy to adaptive water management. Water Policy in New Mexico: Addressing the Challenge of an Uncertain Future 9.

    Google Scholar 

  20. abib SM, Hauke S, Ries S, & Mühlhäuser M (2012), Trust as a facilitator in cloud computing: a survey. Journal of Cloud Computing 1:1–18.

    Article  Google Scholar 

  21. Habib SM, Ries S, Mühlhäuser M, & Varikkattu P (2014) Towards a trust management system for cloud computing marketplaces: using caiq as a trust information source. Security and Communication Networks 7:2185–2200.

    Article  Google Scholar 

  22. Jabbar S, Naseer K, Gohar M, Rho S, & Chang H (2016) Trust model at service layer of cloud computing for educational institutes. The Journal of Supercomputing 72(1):58–83.

    Article  Google Scholar 

  23. Jadeja Y & Modi K (2012) Cloud computing-concepts, architecture and challenges. in Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on:877-880.

    Google Scholar 

  24. afari Navimipour N, Masoud Rahmani A, Habibizad Navin A, & Hosseinzadeh M (2014) Job scheduling in the Expert Cloud based on genetic algorithms. Kybernetes 43:1262–1275.

    Article  Google Scholar 

  25. afari Navimipour N, Rahmani AM, Habibizad Navin A, & Hosseinzadeh M (2015) Expert Cloud. Computers in Human Behavior 46:57–74.

    Article  Google Scholar 

  26. afari Navimipour N, Rahmani AM, Navin AH, & Hosseinzadeh M (2015) Expert Cloud: A Cloud-based framework to share the knowledge and skills of human resources. Computers in Human Behavior 46:57–74.

    Article  Google Scholar 

  27. Jaiganesh M, Aarthi M, & Kumar AVA (2015) Fuzzy ART-Based User Behavior Trust in Cloud Computing. in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, ed: Springer:341–348.

    Google Scholar 

  28. Januzaj Y, Ajdari J, & Selimi B (2015) DBMS as a Cloud service: Advantages and Disadvantages. Procedia-Social and Behavioral Sciences 195:1851–1859.

    Article  Google Scholar 

  29. Juan D & Zheng Q (2014) Cloud and open BIM-based building information interoperability research. Journal of Service Science and Management 2014.

    Google Scholar 

  30. Keshanchi B & Navimipour NJ (2016) Priority-Based Task Scheduling in the Cloud Systems Using a Memetic Algorithm. Journal of Circuits, Systems and Computers:1650119.

    Google Scholar 

  31. Keshanchi B, Souri A, & Navimipour NJ (2017) An improved genetic algorithm for task scheduling in the cloud environments using the priority queues: formal verification, simulation, and statistical testing. Journal of Systems and Software 124:1–21.

    Article  Google Scholar 

  32. Khethavath P, Thomas J, Chan-Tin E, & Liu H (2013) Introducing aDistributed Cloud Architecture with Efficient Resource Discovery and Optimal Resource Allocation. in Services (SERVICES), 203 IEEE Ninth World Congress on:386-392.

    Google Scholar 

  33. Ko RK, Jagadpramana P, Mowbray M, Pearson S, Kirchberg M, Liang Q (2011) TrustCloud: A framework for accountability and trust in cloud computing. in Services (SERVICES), 2011 IEEE World Congress on:584-588.

    Google Scholar 

  34. Kumar R & Charu S (2015) An Importance of Using Virtualization Technology in Cloud Computing. Global Journal of Computers & Technology 1.

    Google Scholar 

  35. Kumarga NP & Sireesha D (2014) Ensuring Data Integrity in Cloud Computing. International Journal of Computer Science & Network Security 14(9):34–38.

    Google Scholar 

  36. Li X, Ma H, Zhou F, & Gui X (2015) Service operator-aware trust scheme for resource matchmaking across multiple clouds. IEEE Transactions on Parallel and Distributed Systems 26:1419–1429.

    Article  Google Scholar 

  37. Li Z, De Souza R, & Goh M (2016) Supply Chain Orchestration Leveraging on MNC Networks and Local Resources: Approach Strategies. Journal of Service Science and Management 9:303.

    Article  Google Scholar 

  38. Lin G, Wang D, Bie Y, & Lei M (2014) MTBAC: A mutual trust based access control model in cloud computing. China Communications 11:154–162.

    Google Scholar 

  39. Liu YC, Ma YT, Zhang HS, Li DY, & Chen GS (2011) A method for trust management in cloud computing: Data coloring by cloud watermarking. International journal of automation and computing 8: 280–285.

    Article  Google Scholar 

  40. Lynn T, van der Werff L, Hunt G, & Healy P (2016) Development of a Cloud Trust Label: A Delphi Approach. Journal of Computer Information Systems 56:185–193.

    Article  Google Scholar 

  41. Manuel P (2013) A trust model of cloud computing based on Quality of Service. Annals of Operations Research:1–12.

    Google Scholar 

  42. Matos R, Marques C, & Sargento S (2014) Context-aware control of user-centric virtual networks: Centralized vs distributed approaches. Computer Networks 74:4–21.

    Article  Google Scholar 

  43. Mei S, Wang Z, Cheng Y, Ren J, Wu J, & Zhou J (2012) Trusted bytecode virtual machine module: a novel method for dynamic remote attestation in cloud computing. International Journal of Computational Intelligence Systems 5(5):924–932.

    Article  Google Scholar 

  44. Mendes C, Almeida M, & Da Silva MM (2013) Applying DEMO-based SLAs to cloud services. Journal of Service Science Research 5:95–123.

    Article  Google Scholar 

  45. Milani AS & Navimipour NJ (2016) Load balancing mechanisms and techniques in the cloud environments: Systematic literature review and future trends. Journal of Network and Computer Applications.

    Google Scholar 

  46. ohammad Aghdam S & Jafari Navimipour N (2016) Opinion leaders selection in the social networks based on trust relationships propagation. Karbala International Journal of Modern Science 2(2):88–97.

    Article  Google Scholar 

  47. Mohammadi SZ & Navimipour JN (2017) Invalid cloud providers’ identification using the support vector machine. International Journal of Next-Generation Computing.

    Google Scholar 

  48. Moyano F, Fernandez-Gago C, & Lopez J (2013) A framework for enabling trust requirements in social cloud applications. Requirements Engineering 18:321–341.

    Article  Google Scholar 

  49. Mpofu N & van Staden WJ (2014) A survey of trust issues constraining the growth of Identity Management-as-a-Service (IdMaaS). in Information Security for South Africa (ISSA) 2014:1–6.

    Google Scholar 

  50. Navimipour NJ (2015) A formal approach for the specification and verification of a Trustworthy Human Resource Discovery mechanism in the Expert Cloud. Expert Systems with Applications 42:6112–6131.

    Article  Google Scholar 

  51. Navimipour NJ (2015) Task scheduling in the cloud environments based on an artificial bee colony algorithm. in Proceedings of the Paper Presented at the International Conference on Image Processing, Production and Computer Science, Istanbul (Turkey).

    Google Scholar 

  52. Navimipour NJ, Rahmani AM, Navin AH, & Hosseinzadeh M (2014) Resource discovery mechanisms in grid systems: A survey. Journal of Network and Computer Applications 41:389–410.

    Article  Google Scholar 

  53. Noor TH, Sheng QZ, & Bouguettaya A (2014) Trust Management in Cloud Services: Springer.

    Google Scholar 

  54. Noor TH, Sheng QZ, Maamar Z, & Zeadally S (2016) Managing Trust in the Cloud: State of the Art and Research Challenges. Computer 49:34–45.

    Article  Google Scholar 

  55. Noor TH, Sheng QZ, Yao L, Dustdar S, & Ngu AH (2016) CloudArmor: Supporting reputation-based trust management for cloud services. IEEE transactions on parallel and distributed systems 27:367–380.

    Article  Google Scholar 

  56. Paquette S, Jaeger PT, & Wilson SC (2010) Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly 27:245–253.

    Article  Google Scholar 

  57. Patel N & Chauhan S (2015) A Survey On Load Balancing and Scheduling in cloud computing. International Journal for Scientific Research and Development 1:185–189.

    Google Scholar 

  58. Pathan ASK & Mohammed MM (2015) Building Customer trust in cloud computing with an ICT-enabled global regulatory body. Wireless Personal Communications 85:77–99.

    Article  Google Scholar 

  59. Patil P (2015) Cloud Security Issues. Journal of Information Engineering and Applications 5: 31–34.

    Google Scholar 

  60. Perez JMM, Bernabe JB, Calero JMA, Clemente FJG, Perez GM, & Skarmeta AFG (2014) Taxonomy of trust relationships in authorization domains for cloud computing. The Journal of Supercomputing 70:1075–1099.

    Article  Google Scholar 

  61. Puthal D, Sahoo B, Mishra S, & Swain S (2015) Cloud computing features, issues, and challenges: a big picture. in Computational Intelligence and Networks (CINE), 2015 International Conference on:116-123.

    Google Scholar 

  62. Rajendran VV & Swamynathan S (2015) Hybrid model for dynamic evaluation of trust in cloud services. Wireless Networks 22(6): 807–1818.

    Google Scholar 

  63. Sadashiv N & Kumar SD (2011) Cluster, grid and cloud computing: A detailed comparison. in Computer Science & Education (ICCSE), 2011 6th International Conference on: 477-482.

    Google Scholar 

  64. Salot P (2013) A Survey Of Various Scheduling Algorithm In Cloud Computing Environment. International Journal of research and engineering Technology (IJRET) 2.

    Google Scholar 

  65. Selvaraj A & Sundararajan S (2017) Evidence-Based Trust Evaluation System for Cloud Services Using Fuzzy Logic. International Journal of Fuzzy Systems 19(2):329–337.

    Article  Google Scholar 

  66. Shahzad F (2014) State-of-the-art survey on cloud computing security Challenges, approaches and solutions. Procedia Computer Science 37:357–362.

    Article  Google Scholar 

  67. Sheikholeslami F & Navimipour JN (2017) Service allocation in the cloud environments using multi-objective particle swarm optimization algorithm based on crowding distance. Swarm and Evolutionary Computation.

    Google Scholar 

  68. Sidhu J & Singh S (2016) Improved TOPSIS Method Based Trust Evaluation Framework for Determining Trustworthiness of Cloud Service Providers. Journal of Grid Computing: 1–25.

    Google Scholar 

  69. So K (2011) Cloud computing security issues and challenges. International Journal of Computer Networks 3.

    Google Scholar 

  70. Srinivasan S (2014) Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments:IGI Global.

    Google Scholar 

  71. Subashini S & Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34:1–11.

    Article  Google Scholar 

  72. Sun D, Chang G, Sun L, & Wang X (2011) Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Engineering 15:2852–2856.

    Article  Google Scholar 

  73. Takabi H, Joshi JB, & Ahn GJ (2010) Security and Privacy Challenges in Cloud Computing Environments. IEEE Security & Privacy 8:24–31.

    Article  Google Scholar 

  74. Tan W, Sun Y, Li LX, Lu G, & Wang T (2014) A trust service-oriented scheduling model for workflow applications in cloud computing. IEEE Systems Journal 8:868–878.

    Article  Google Scholar 

  75. Tang M, Dai X, Liu J, & Chen J (2016) Towards a trust evaluation middleware for cloud service selection. Future Generation Computer Systems.

    Google Scholar 

  76. Tchifilionova V (2011) Security and privacy implications of cloud computing-Lost in the cloud. in Open Research Problems in Network Security, ed: Springer:149–158.

    Google Scholar 

  77. Tian LQ, Lin C, & Ni Y (2010) Evaluation of user behavior trust in cloud computing. in 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

    Google Scholar 

  78. Vakili A & Navimipour NJ (2017) Comprehensive and systematic review of the service composition mechanisms in the cloud environments. Journal of Network and Computer Applications 81:24–36.

    Article  Google Scholar 

  79. Vaquero LM, Rodero-Merino L, & Morán D (2011) Locking the sky: a survey on IaaS cloud security. Computing 91:93–118.

    Article  Google Scholar 

  80. Wang W, Zeng G, Tang D, & Yao J (2012) Cloud-DLS: Dynamic trusted scheduling for Cloud computing. Expert Systems with Applications 39:2321–2329.

    Article  Google Scholar 

  81. Wang Y, Chandrasekhar S, Singhal M, & Ma J (2016) A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing. Cluster Computing 19(2):647–662.

    Article  Google Scholar 

  82. Wu L, Kumar Garg S, & Buyya R (2012) SLA-based admission control for a Software-as-a-Service provider in Cloud computing environments. Journal of Computer and System Sciences 78:1280–1299.

    Article  Google Scholar 

  83. Wu X, Zhang R, Zeng B, & Zhou S (2013) A trust evaluation model for cloud computing. Procedia Computer Science 17:1170–1177.

    Article  Google Scholar 

  84. Xie X, Liu R, Cheng X, Hu X, & Ni J (2016) Trust-Driven and PSO-SFLA based job scheduling algorithm on Cloud. Intelligent Automation & Soft Computing 22(4):1–6.

    Article  Google Scholar 

  85. Yang Z, Qiao L, Liu C, Yang C, & Wan G (2010) A collaborative trust model of firewall through based on Cloud Computing. in Computer Supported Cooperative Work in Design (CSCWD), 2010 14th International Conference on:329-334.

    Google Scholar 

  86. Zhou L, Varadharajan V, & Hitchens M (2015) Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage. IEEE Transactions on Information Forensics and Security 10:2381–2395.

    Article  Google Scholar 

  87. Zissis D & Lekkas D (2012) Addressing cloud computing security issues. Future Generation Computer Systems 28:583–592.

    Article  Google Scholar 

  88. Zou D, Zhang W, Qiang W, Xiang G, Yang LT, Jin H, & Hu K (2013) Design and implementation of a trusted monitoring framework for cloud platforms. Future Generation Computer Systems 29:2092–2102.

    Article  Google Scholar 

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Nima Jafari Navimipour.

Additional information

Matin Chiregi received her B.S. in software engineer from Ahrar Branch, Rasht, Iran, in 2011; the M.S. in software engineer, from Tabriz Branch, Islamic Azad University, Tabriz, Iran, in 2015. Her research interests include cloud computing.

Nima Jafari Navimipour received his B.S. in computer engineering, software engineering, from Tabriz Branch, Islamic Azad University, Tabriz, Iran, in 2007; the M.S. in computer engineering, computer architecture, from Tabriz Branch, Islamic Azad University, Tabriz, Iran, in 2009; the Ph.D. in computer engineering, computer architecture, from Science and Research Branch, Islamic Azad University, Tehran, Iran in 2014. He is an assistance professor in the Department of Computer Engineering at Tabriz Branch, Islamic Azad University, Tabriz, Iran. He has published more than 100 papers in various journals and conference proceedings. His research interests include Cloud Computing, Social Networks, Fault-Tolerance Software, Computational Intelligence, Evolutionary Computing, and Network on Chip.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Chiregi, M., Navimipour, N.J. A comprehensive study of the trust evaluation mechanisms in the cloud computing. J Serv Sci Res 9, 1–30 (2017). https://doi.org/10.1007/s12927-017-0001-7

Download citation

Keywords

  • Trust
  • Cloud Computing
  • Centralized
  • Distributed
  • Monitoring and Tracking