Advertisement

Credibility-Based Trust Management for Services in Cloud Environments

  • Talal H. Noor
  • Quan Z. Sheng
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7084)

Abstract

Trust management is one of the most challenging issues in the emerging cloud computing. Although many approaches have been proposed recently for trust management in cloud environments, not much attention has been given to determining the credibility of trust feedbacks. Moreover, the dynamic nature of cloud environments makes guaranteeing the availability of trust management services a difficult problem due to the unpredictable number of cloud consumers. In this paper, we propose a framework to improve ways on trust management in cloud environments. In particular, we introduce a credibility model that not only distinguishes between credible trust feedbacks, but also has the ability to detect the malicious trust feedbacks from attackers. We also present a replication determination model that dynamically decides the optimal replica number of the trust management service so that the trust management service can be always maintained at a desired availability level. The approaches have been validated by the prototype system and experimental results.

Keywords

Trust Management Cloud Computing Credibility Model Service Availability 

References

  1. 1.
    Amazon: Amazon.com: Online shopping for electronics, apparel, computers, books, dvds & more (2011),http://www.amazon.com/ (accessed March 01, 2011)
  2. 2.
    Armbrust, M., et al.: A View of Cloud Computing. Communiaction of the ACM 53(4), 50–58 (2010)CrossRefGoogle Scholar
  3. 3.
    Aziz, B., Hamilton, G.: Detecting Man-in-the-Middle Attacks by Precise Timing. In: Proc. of the 3rd Int. Conf. on Emerging Security Information, Systems and Technologies (SECURWARE 2009). Athens, Glyfada, Greece (June 2009)Google Scholar
  4. 4.
    Ba, S., Pavlou, P.: Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior. MIS Quarterly 26(3), 243–268 (2002)CrossRefGoogle Scholar
  5. 5.
    Brandic, I., Dustdar, S., Anstett, T., Schumm, D., Leymann, F., Konrad, R.: Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds. In: Proc. of IEEE 3rd Int. Conf. on Cloud Computing (CLOUD 2010), Miami, Florida, USA (July 2010)Google Scholar
  6. 6.
    Buyya, R., Yeo, C., Venugopal, S.: Market-oriented Cloud Computing: Vision, Hype, and Reality for Delivering it Services as Computing Utilities. In: Proc. of IEEE 10th Int. Conf. on High Performance Computing and Communications (HPCC 2008), Dalian, China (September 2008)Google Scholar
  7. 7.
    Chen, K., Hwang, K., Chen, G.: Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems 20(1), 83–96 (2008)CrossRefGoogle Scholar
  8. 8.
    Child, I.: The Psychological Meaning of Aesthetic Judgments. Visual Arts Research 9(2(18)), 51–59 (1983)Google Scholar
  9. 9.
    Conner, W., Iyengar, A., Mikalsen, T., Rouvellou, I., Nahrstedt, K.: A Trust Management Framework for Service-Oriented Environments. In: Proc. of the 18th Int. Conf. on World Wide Web (WWW 2009), Madrid, Spain (April 2009)Google Scholar
  10. 10.
    Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  11. 11.
    eBay: ebay - new & used electronics, cars, apparel, collectibles, sporting goods & more at low prices (2011), http://www.ebay.com/ (accessed March 01, 2011)
  12. 12.
    Friedman, E., Resnick, P., Sami, R.: Manipulation-Resistant Reputation Systems. In: Algorithmic Game Theory, pp. 677–697. Cambridge University Press, New York (2007)CrossRefGoogle Scholar
  13. 13.
    Hoffman, K., Zage, D., Nita-Rotaru, C.: A Survey of Attack and Defense Techniques for Reputation Systems. ACM Computing Surveys (CSUR) 42(1), 1–31 (2009)CrossRefGoogle Scholar
  14. 14.
    Hwang, K., Li, D.: Trusted Cloud Computing with Secure Resources and Data Coloring. IEEE Internet Computing 14(5), 14–22 (2010)CrossRefGoogle Scholar
  15. 15.
    Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43(2), 618–644 (2007)CrossRefGoogle Scholar
  16. 16.
    Jøsang, A., Quattrociocchi, W.: Advanced Features in Bayesian Reputation Systems. In: Fischer-Hübner, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2009. LNCS, vol. 5695, pp. 105–114. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  17. 17.
    Krautheim, F.J., Phatak, D.S., Sherman, A.T.: Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 211–227. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  18. 18.
    Lai, K., Feldman, M., Stoica, I., Chuang, J.: Incentives for Cooperation in Peer-to-Peer Networks. In: Proc. of the 1st Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, USA (June 2003)Google Scholar
  19. 19.
    Malik, Z., Bouguettaya, A.: Rater Credibility Assessment in Web Services Interactions. World Wide Web 12(1), 3–25 (2009)CrossRefGoogle Scholar
  20. 20.
    Malik, Z., Bouguettaya, A.: RATEWeb: Reputation Assessment for Trust Establishment Among Web services. The VLDB Journal 18(4), 885–911 (2009)CrossRefGoogle Scholar
  21. 21.
    Manuel, P., Thamarai Selvi, S., Barr, M.E.: Trust Management System for Grid and Cloud Resources. In: Proc. of the 1st Int. Conf. on Advanced Computing (ICAC 2009), Chennai, India (December 2009)Google Scholar
  22. 22.
    Massa, P., Avesani, P.: Trust Metrics in Recommender Systems. In: Computing with Social Trust. Human-Computer Interaction Series, pp. 259–285. Springer, London (2009)CrossRefGoogle Scholar
  23. 23.
    NetLogo: Netlogo home page (2011), http://ccl.northwestern.edu/netlogo/ (accessed March 1, 2011)
  24. 24.
    Sheth, A.P., Gomadam, K., Lathem, J.: SA-REST: Semantically Interoperable and Easier-to-Use Services and Mashups. IEEE Internet Computing 11(6), 84–87 (2007)CrossRefGoogle Scholar
  25. 25.
    Skopik, F., Schall, D., Dustdar, S.: Start Trusting Strangers? Bootstrapping and Prediction of Trust. In: Vossen, G., Long, D.D.E., Yu, J.X. (eds.) WISE 2009. LNCS, vol. 5802, pp. 275–289. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  26. 26.
    Skopik, F., Schall, D., Dustdar, S.: Trustworthy Interaction Balancing in Mixed Service-Oriented Systems. In: Proc. of ACM 25th Symp. on Applied Computing (SAC 2010), Sierre, Switzerland (March 2010)Google Scholar
  27. 27.
    Srivatsa, M., Liu, L.: Securing Decentralized Reputation Management Using TrustGuard. Journal of Parallel and Distributed Computing 66(9), 1217–1232 (2006)CrossRefzbMATHGoogle Scholar
  28. 28.
    Wang, Y., Vassileva, J.: Toward Trust and Reputation Based Web Service Selection: A Survey. International Transactions on Systems Science and Applications 3(2), 118–132 (2007)Google Scholar
  29. 29.
    Weng, J., Miao, C.Y., Goh, A.: Protecting Online Rating Systems from Unfair Ratings. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol. 3592, pp. 50–59. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  30. 30.
    Xiong, L., Liu, L.: Peertrust: Supporting Reputation-based Trust for Peer-to-Peer Electronic Communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Talal H. Noor
    • 1
  • Quan Z. Sheng
    • 1
  1. 1.School of Computer ScienceThe University of AdelaideAdelaideAustralia

Personalised recommendations