Advertisement

Identifying Fake Feedback for Effective Trust Management in Cloud Environments

  • Talal H. Noor
  • Quan Z. Sheng
  • Abdullah Alfazi
  • Jeriel Law
  • Anne H. H. Ngu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7759)

Abstract

Managing trust in cloud environments is emerging as an important issue in recent years. The highly dynamic, distributed, and non-transparent nature of cloud services makes the trust management of these services difficult. Malicious users may collude to give multiple misleading trust feedback to disadvantage a cloud service, or create several accounts and then leave misleading trust feedback to trick users into trusting cloud services that are not actually trustworthy. In this paper, we propose techniques enabling the identification of fake trust feedbacks and thus provide significant improvement on trust management in cloud environments. In particular, we introduce a credibility model that not only identifies credible trust feedbacks from fake ones, but also preserves the privacy of cloud service consumers. The techniques have been validated by a prototype system implementation and experimental studies.

Keywords

Trust management cloud computing credentials credibility reputation security privacy 

References

  1. 1.
    Akwagyiram, A.: How Do You Catch Online Auction Cheats? The British Broadcasting Corporation News (BBC) (July 2010), http://www.bbc.co.uk/news/10494724 (accessed May 16, 2012)
  2. 2.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A View of Cloud Computing. Communications of the ACM 53(4), 50–58 (2010)CrossRefGoogle Scholar
  3. 3.
    Ba, S., Pavlou, P.: Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior. MIS Quarterly 26(3), 243–268 (2002)CrossRefGoogle Scholar
  4. 4.
    Bertino, E., Paci, F., Ferrini, R., Shang, N.: Privacy-preserving Digital Identity Management for Cloud Computing. IEEE Data Eng. Bull. 32(1), 21–27 (2009)Google Scholar
  5. 5.
    Brandic, I., Dustdar, S., Anstett, T., Schumm, D., Leymann, F., Konrad, R.: Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds. In: Proc. of CLOUD 2010, Miami, Florida, USA (July 2010)Google Scholar
  6. 6.
    Conner, W., Iyengar, A., Mikalsen, T., Rouvellou, I., Nahrstedt, K.: A Trust Management Framework for Service-Oriented Environments. In: Proc. of WWW 2009, Madrid, Spain (April 2009)Google Scholar
  7. 7.
    David, O., Jaquet, C.: Trust and Identification in the Light of Virtual Persons (June 2009), http://www.fidis.net/resources/deliverables/identity-of-identity/ (accessed May 10, 2012)
  8. 8.
    Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  9. 9.
    Friedman, E., Resnick, P., Sami, R.: Manipulation-Resistant Reputation Systems. In: Algorithmic Game Theory, pp. 677–697. Cambridge University Press, New York, USA (2007)CrossRefGoogle Scholar
  10. 10.
    Hwang, K., Li, D.: Trusted Cloud Computing with Secure Resources and Data Coloring. IEEE Internet Computing 14(5), 14–22 (2010)CrossRefGoogle Scholar
  11. 11.
    Lai, K., Feldman, M., Stoica, I., Chuang, J.: Incentives for Cooperation in Peer-to-Peer Networks. In: Proc. of the 1st Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, USA (June 2003)Google Scholar
  12. 12.
    Malik, Z., Bouguettaya, A.: RATEWeb: Reputation Assessment for Trust Establishment Among Web Services. The VLDB Journal 18(4), 885–911 (2009)CrossRefGoogle Scholar
  13. 13.
    Massa, P., Avesani, P.: Trust Metrics in Recommender Systems. In: Computing with Social Trust. Human-Computer Interaction Series. SpringerGoogle Scholar
  14. 14.
    Noor, T.H., Sheng, Q.Z.: Trust as a Service: A Framework for Trust Management in Cloud Environments. In: Bouguettaya, A., Hauswirth, M., Liu, L. (eds.) WISE 2011. LNCS, vol. 6997, pp. 314–321. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  15. 15.
    Pearson, S., Benameur, A.: Privacy, Security and Trust Issues Arising From Cloud Computing. In: Proc. of CloudCom 2010, Indianapolis, Indiana, USA (November-December 2010)Google Scholar
  16. 16.
    Xiong, L., Liu, L.: Peertrust: Supporting Reputation-based Trust for Peer-to-Peer Electronic Communities. IEEE TKDE 16(7), 843–857 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Talal H. Noor
    • 1
  • Quan Z. Sheng
    • 1
  • Abdullah Alfazi
    • 1
  • Jeriel Law
    • 1
  • Anne H. H. Ngu
    • 2
  1. 1.School of Computer ScienceThe University of AdelaideAustralia
  2. 2.Department of Computer ScienceTexas State UniversityUSA

Personalised recommendations