Opinion Model Based Security Reputation Enabling Cloud Broker Architecture

  • Pramod S. Pawar
  • Srijith K. Nair
  • Fadi El-Moussa
  • Theo Dimitrakos
  • Muttukrishnan Rajarajan
  • Andrea Zisman
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 112)


Security and trust in service providers is a major concern in the use of cloud services and the associated process of selecting a cloud service provider that meets the expectations and needs of one’s security requirements is not easy. As a solution, we propose a broker architecture model that enables us to build a security reputation framework for cloud service providers, capturing comprehensive evidence of security information to build its trust and security reputation.


broker reputation subjective logic security 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Alhamad, M., Dillon, T., Chang, E.: SLA-Based Trust Model for Cloud Computing 13th International Conference on Network-Based Information Systems (2010)Google Scholar
  2. 2.
    Dumitrescu, C., Raicu, I., Foster, I.: DI-GRUBER: A Distributed Approach to Grid Resource Brokering. In: Proceedings of the ACM/IEEE Conference on Supercomputing (2005)Google Scholar
  3. 3.
    Ferrer, A.J., Hernández, F., Tordsson, J., Elmroth, E., Ali-Eldin, A., Zsigri, C., Sirvent, R., Guitart, J., Badia, R.M., Djemame, K., Ziegler, W., Dimitrakos, T., Nair, S.K., Kousiouris, G., Konstanteli, K., Varvarigou, T., Hudzia, B., Kipp, A., Wesner, S., Corrales, M., Forgó, N., Sharif, T., Sheridan, C.: OPTIMIS: a Holistic Approach to Cloud Service Provisioning. Future Generation Computer Systems 28(1), 66–77 (2012)CrossRefGoogle Scholar
  4. 4.
    Gourlay, I., Djemame, K., Padgett, J.: Reliability and Risk in Grid Resource Brokering. In: IEEE International Conference on Digital Ecosystems and Technologies (DEST) (2008)Google Scholar
  5. 5.
    Hwang, K., Kulkarni, S., Hu, Y.: Cloud Security with Virtualized Defense and Reputation-based Trust Management. In: Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (2009)Google Scholar
  6. 6.
    Jin, Y., Bloch, P., Cameron, G.: A Comparative Study: Does the Word-of-mouth Communications and Opinion Leadership Model Fit Epinions on the Internet? In: Proceedings of the Hawaii International Conference on Social Sciences (2002)Google Scholar
  7. 7.
    Jøsang, A.: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Jøsang, A., Ismail, R.: The Beta Reputation System. In: Proceedings of the 15th Bled Electronic Commerce Conference e-Reality: Constructing the e-Economy (2002)Google Scholar
  9. 9.
    Kerr, R., Cohen, R.: Modeling trust using transactional, numerical units. In: PST 2006: Proceedings of the Conference on Privacy, Security and Trust, Markham, Canada (2006)Google Scholar
  10. 10.
    Li, F., Wu, J.: Uncertainty Modeling and Reduction in MANETs. IEEE Transactions on Mobile Computing 9(7) (2010)Google Scholar
  11. 11.
    Nair, S.K., Porwal, S., Dimitrakos, T., Ferrer, A.J., Tordsson, J., Sharif, T., Sheridan, C., Rajarajan, M., Khan, A.U.: Towards Secure Cloud Bursting, Brokerage and Aggregation. In: IEEE 8th European Conference Web Services (ECOWS) (2010)Google Scholar
  12. 12.
    Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank Citation Ranking: Bringing Order to the Web, Technical report, Stanford Digital Library Technologies Project (1998)Google Scholar
  13. 13.
    Pawar, P.S., Rajarajan, M., Nair, S.K., Zisman, A.: Trust model for optimized cloud services. In: Dimitrakos, T., Moona, R., Patel, D., McKnight, D.H. (eds.) IFIPTM 2012. IFIP AICT, vol. 374, pp. 97–112. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  14. 14.
    Ray, I., Poolsappasit, N., Dewri, R.: An Opinion Model for Evaluating Malicious Activities in Pervasive Computing SystemsGoogle Scholar
  15. 15.
    Resnick, P., Zeckhauser, R.: Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay’s Reputation System. In: Baye, M.R. (ed.) The Economics of the Internet and E-Commerce. Advances in Applied Microeconomics, vol. 11, pp. 127–157. Elsevier Science, AmsterdamGoogle Scholar
  16. 16.
    Resnick, P., Zeckhauser, R., Swanson, J., Lockwood, K.: The Value of Reputation on Ebay: A Controlled Experiment. Experimental Economics 9(2), 79-101(23) (2006)Google Scholar
  17. 17.
    Schneider, J., Kortuem, G., Jager, J., Fickas, S., Segall, Z.: Disseminating trust information in wearable communities. Personal and Ubiquitous Computing 4(4), 245–248, doi:10.1007/BF02391568Google Scholar
  18. 18.
    Srivatsa, M., Liu, L.: Secure Event Dissemination in Publish-Subscribe Networks. In: 27th International Conference on Distributed Computing Systems (ICDS 2007) (2007)Google Scholar
  19. 19.
    Venugopal, S., Buyya, R., Winton, L.: A Grid Service Broker for Scheduling e-Science Applications on Global Data Grids. In: Concurrency and Computation: Practice and Experience, vol. 18(6), pp. 685–699. Wiley Press, New York (2006)Google Scholar
  20. 20.
    Wang, Y., Singh, M.P.: Evidence-Based Trust: A Mathematical Model Geared for Multiagent Systems. ACM Transactions on Autonomous and Adaptive Systems, Vol 5(4), Article 14 (2010)Google Scholar
  21. 21.
    Wu, P., Wu, G.: A Reputation-Based Trust Model for P2P Systems. In: International Conference on Computational Intelligence and Security (2009)Google Scholar
  22. 22. The NIST Definition of Cloud Computing. Special Publication 800-145

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2013

Authors and Affiliations

  • Pramod S. Pawar
    • 1
    • 2
  • Srijith K. Nair
    • 2
  • Fadi El-Moussa
    • 2
  • Theo Dimitrakos
    • 2
  • Muttukrishnan Rajarajan
    • 1
  • Andrea Zisman
    • 1
  1. 1.City University LondonLondonUnited Kingdom
  2. 2.British Telecommunications, Security PracticeIpswichUK

Personalised recommendations