Trust Model for Cloud Based on Cloud Characteristics

  • Pramod S. Pawar
  • Muttukrishnan Rajarajan
  • Theo Dimitrakos
  • Andrea Zisman
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 401)


The wider adoption of cloud computing due to its inherent advantages also brings concerns of trust and security. Trust is a fundamental subject in human life. Although, several trust models exists in different areas including cloud, none of the trust models to-date are comprehensive enough to accommodate the characteristics of the cloud environment. This paper defines a trust model based on the essential cloud characteristics as the dimensions of the trust model together with several features relevant to the dimension to build the context. The proposed trust model is supported with an opinion model that considers uncertainty for building context specific trust and credibility complimented with early filtering to reduce the impact of malicous feedback providers. The proposed model is evaluated for its robustness against malicious feedback providers.


Trust Cloud characteristics credibility unfair ratings 


  1. 1.
    Ferrer, A.J., Hernández, F., Tordsson, J., Elmroth, E., Ali-Eldin, A., Zsigri, C., Sirvent, R., Guitart, J., Badia, R.M., Djemame, K., Ziegler, W., Dimitrakos, T., Nair, S.K., Kousiouris, G., Konstanteli, K., Varvarigou, T., Hudzia, B., Kipp, A., Wesner, S., Corrales, M., Forgó, N., Sharif, T., Sheridan, C.: OPTIMIS: a Holistic Approach to Cloud Service Provisioning. Future Generation Computer Systems (2011)Google Scholar
  2. 2.
    Jøsang, A., Marsh, S., Pope, S.: Exploring Different Types of Trust Propagation. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 179–192. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  3. 3.
    Josang, A., Ismail, R.: The Beta Reputation System. In: Proceedings of the 15th Bled Electronic Commerce Conference e-Reality: Constructing the e-Economy (2002)Google Scholar
  4. 4.
    Josang, A.: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)MathSciNetGoogle Scholar
  5. 5.
    Whitby, A., Jøsang, A., Indulska, J.: Filtering out unfair ratings in Bayesian reputation systems. In: Proc. 7th Int. Workshop on Trust in Agent Societies (2004)Google Scholar
  6. 6.
    Alhamad, M., Dillon, T., Chang, E.: SLA-Based Trust Model for Cloud Computing 13th International Conference on Network-Based Information Systems (2010)Google Scholar
  7. 7.
    Arning, A., Agrawal, R., Raghavan, P.: A linear method for deviation detection in large databases. In: Data Mining and Knowledge Discovery, Portland, Oregon (August 1996)Google Scholar
  8. 8.
    Jia, C., Xie, L., Gan, X., Liu, W., Han, Z.: A Trust and Reputation Model Considering Overall Peer Consulting Distribution. IEEE Transaction on Systems, MAN, and Cybernetics – Part A: Systems and Humans 42(1) (January 2012)Google Scholar
  9. 9.
    Harrison Mcknight, D., Chervany, N.L.: The Meanings of Trust. Technical Report 94-04. Management Information Systems Research Center, Carlson School of Management, University of Minnesota (1996)Google Scholar
  10. 10.
    The NIST Definition of Cloud Computing. Special Publication 800-145,
  11. 11.
    Pujol, J.M., Sanguesa, R., Delgado, J.: Extracting Reputation in Multi Agent Systems by Means of Social Network Topology. In: Proc. International Joint Conference Autonomous Agents and Multiagent Systems (2002)Google Scholar
  12. 12.
    Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation Systems. Communications of the ACM 43(12), 45–48 (2000)CrossRefGoogle Scholar
  13. 13.
    Pawar, P.S., Rajarajan, M., Nair, S.K., Zisman, A.: Trust Model for Optimized Cloud Services. In: Dimitrakos, T., Moona, R., Patel, D., McKnight, D.H. (eds.) IFIPTM 2012. IFIP AICT, vol. 374, pp. 97–112. Springer, Heidelberg (2012)Google Scholar
  14. 14.
    Kerr, R., Cohen, R.: Smart Cheaters Do Prosper: Defeating Trust and Reputation Systems. In: 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), May 10-15 (2009)Google Scholar
  15. 15.
    Yang, Y., Sun, Y.L., Kay, S., Yang, Q.: Defending online reputation systems against collaborative unfair raters through signal modeling and trust. In: Proc. of the 24th ACM Symposium on Applied Computing (March 2009)Google Scholar
  16. 16.
    Zhang, Z., Feng, X.: New methods for deviation-based outlier detection in large database. In: 6th International Conference on Fuzzy Systems and Knowledge Discovery (2009)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2013

Authors and Affiliations

  • Pramod S. Pawar
    • 1
    • 2
  • Muttukrishnan Rajarajan
    • 1
  • Theo Dimitrakos
    • 2
  • Andrea Zisman
    • 1
  1. 1.City University LondonLondonUnited Kingdom
  2. 2.British TelecommunicationsIpswichUnited Kingdom

Personalised recommendations