Abstract
High security of cloud computing is one of the most challenges to be addressed before the novel pas-as-you-go business paradigm is widely applied over the internet. Trust brings a novel means to improve the security and enable interoperability of current heterogeneous independent cloud platforms. However, there is no special trust evaluation model for cloud computing environment. Hence, this paper presents a new trust model based on fuzzy mathematics in cloud computing environment according to success and failure interaction between cloud entities based on the properties and semantics of trust. To compute trust in cloud systems, an algorithm based on proposed model is given. Simulation results show that the proposed model has some identification and containment capability in synergies cheating, promotes interaction between entities, and improves the performance of the entire cloud environment.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Change history
10 July 2019
The Editor-in-Chief has retracted this article [1] because it overlaps substantially with the following articles by the same authors [2, 3], amongst others. The authors have not responded to any correspondence about this retraction.
10 July 2019
The Editor-in-Chief has retracted this article [1] because it overlaps substantially with the following articles by the same authors [2, 3], amongst others. The authors have not responded to any correspondence about this retraction.
References
Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. J. Cloud Comput.: Syst. Appl. 2(9), 1–14 (2013)
Habib, S.M., Hauke, S., Ries, S., Muhlhauser, M.: Trust as a facilitator in cloud computing: a survey. J. Cloud Comput.: Adv., Syst. Appl. 1(19), 1–19 (2012)
Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)
Khorshed, M.D.T., Shawkat Ali, A.B.M., Wasimi, S.A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. J. Future Gener. Comput. Syst. 28(6), 833–851 (2012)
Sun, D., Chang, G., Sun, L., Wang, X.W.: Surveying and analyzing security, privacy and trust issues in cloud computing environments. J. Proced. Eng. 15, 2852–2856 (2011)
Sun, D., Chang, G., Sun, L., Li, F., Wang, W.: A dynamic multi-dimensional trust evaluation model to enhance security of cloud computing environments. Int. J. Innov. Comput. Appl. 3(4), 200–212 (2011)
Li, W., Ping, L.: Trust Model to Enhance Security and Interoperability of Cloud Environment, vol. 5931, pp. 69–79. Springer, New York (2009)
Bidgoly, AJ., TorK Ladani, B.: Trust Modeling and Verification Using Colored Petri Nets. 2011 8th International ISC Conference on Information Security and Cryptology (ISCISC), September 14–15, pp. 1–8 (2011)
Kovac, D., Trcek, D.: Qualitative trust modeling in SOA. J. Syst. Archit. 55(4), 255–263 (2009)
Liao, H., Wang, Q., Li, G.: A Fuzzy Logic-based Trust Model in Grid. International Conference on Networks Security, Wireless Communications and Trusted Computing. pp. 608–614 (2009)
Yang, L., Gao, Y.: The Theory and Application of Fuzzy Mathematics, 3rd edn. The Press of South China University of Technology, Guangzhou (2001)
Rao, V.B.: C ++ Neural Networks and Fuzzy Logic. M&T Books, IDG Books Worldwide, Inc., Foster City (1995)
Piegat, A., Landowski, M.: Horizontal membership function and examples of its applications. Int. J. Fuzzy Syst. 17(1), 22–30 (2015)
Azzedin, F., Ridha, A., Rizvi, A.: Fuzzy trust for peer-to-peer based systems. Proceedings of World Academy of Science, Engineering and Technology PWASET. pp. 123–127 (2007)
Griffiths, N., Chao, K.M., Younas, M.: Fuzzy trust for peer-to-peer systems. 26th IEEE International Conference on Distributed Computing Systems Workshops, 04–07 July 2006, pp. 73–73 (2006)
Schmidt, S., Steele, R., Dillon, T.S., Chang, E.: Building a fuzzy trust network in unsupervised multi-agent environments. On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, vol 3762, pp. 816–825. (2005)
Luo, J., Liu, X., Fan, M.: A trust model based on fuzzy recommendation for mobile adhoc networks. J. Comput. Netw. 53(14), 2396–2407 (2009)
Yu, F., Zhang, H., Yan, F.: A Fuzzy Relation Trust Model in P2P System. International Conference on Computational Intelligence and Security, 3–6 Nov, pp. 1497–1502 (2006)
Li, J., Wang, X., Liu, B., Wang, Q., Zhang, G.: A reputation management scheme based on global trust model for peer-to-peer virtual communities. Adv. Web-Age Inf. Manag. 4016, 205–216 (2006)
Li, J.T., Jing, Y.N., Xiao, X.C., Wang, X.P., Zhang, G.D.: A trust model based on similarity-weighted recommendation for p2p environments. J. Softw. 18(1), 157–167 (2007)
Sarwar, B., Karypis, G., Konstan,J., Riedl, J.: Item-based collaborative filtering recommendation algorithms. Proceedings of the 10th international conference on World Wide Web., pp. 285–295 ACM (2001)
Zhang, S., Lu, D., Yang, Y.: A Fuzzy set based trust and reputation model in P2P networks. Intelligent Data Engineering and Automated Learning–IDEAL, vol 3177, pp. 211–217 (2004)
Wang, X., Liang, P., Ma, H., Xing, D., Wang, B.: A P2P trust model based on multi-dimensional trust evaluation. Bio-Inspir. Comput. Intell. Appl. 4688, 347–356 (2007)
Buyya, R., Ranjan, R., Calheiros, R.N.: Modeling and simulation of scalable cloud computing environments and the CloudSim toolkit: challenges and opportunities. Proceedings of the 2009 International Conference on High Performance Computing & Simulation, Leipzig, Germany. (HPCS 2009), June, pp. 1–11 (2009)
Jiang, W., Wang, G., Wu, J.: Generating trusted graphs for trust evaluation in online social networks. Future Gener. Comput. Syst. (FGCS) 31, 1–11 (2014)
Author information
Authors and Affiliations
Corresponding author
Additional information
The Editor-in-Chief has retracted this article [1] because it overlaps substantially with the following articles by the same authors [2,3], amongst others. The authors have not responded to any correspondence about this retraction.
[1] Mohsenzadeh, A., Motameni, H. & Meng Joo Er. A new trust evaluation algorithm between cloud entities based on fuzzy mathematics. Int J Fuzzy Syst (2016) 18: 659–672. doi:10.1007/s40815-015-0112-6
[2] Mohsenzadeh, A., Motameni, H. A trust model between cloud entities using fuzzy mathematics. J Intell Fuzzy Syst (2015) 29:1795–1803. doi:10.3233/IFS-151657
[3] Mohsenzadeh, A. Trust model to enhance security of cloud computing. J Math Comp Sci (2015) 14: 315–325.
About this article
Cite this article
Mohsenzadeh, A., Motameni, H. & Er, M.J. RETRACTED ARTICLE: A New Trust Evaluation Algorithm Between Cloud Entities Based on Fuzzy Mathematics. Int. J. Fuzzy Syst. 18, 659–672 (2016). https://doi.org/10.1007/s40815-015-0112-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40815-015-0112-6