Detecting Occasional Reputation Attacks on Cloud Services

  • Talal H. Noor
  • Quan Z. Sheng
  • Abdullah Alfazi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7977)


Cloud service consumers’ feedback is a good source to assess the trustworthiness of cloud services. However, it is not unusual that a trust management system experiences malicious behaviors from its users. Although several techniques have been proposed to address trust management in cloud environments, the issue of how to detect occasional reputation attacks on cloud services is still largely overlooked. In this paper, we introduce an occasional attacks detection model that recognizes misleading trust feedbacks from occasional collusion and Sybil attacks and adjusts trust results for cloud services that have been affected by these malicious behaviors. We have collected a large collection of consumer’s trust feedbacks given on real-world cloud services (over ten thousand records) to evaluate and demonstrate the applicability of our approach and show the capability of detecting such malicious behaviors.


Trust Management Cloud Computing Occasional Attacks Attacks Detection 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Brandic, I., et al.: Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds. In: Proc. of CLOUD 2010 (2010)Google Scholar
  2. 2.
    David, O., Jaquet, C.: Trust and Identification in the Light of Virtual Persons (June 2009), (accessed March 10, 2011)
  3. 3.
    Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Friedman, E., et al.: Manipulation-Resistant Reputation Systems. In: Algorithmic Game Theory, chap, pp. 677–697. Cambridge University Press, New York (2007)Google Scholar
  5. 5.
    Habib, S., et al.: Towards a Trust Management System for Cloud Computing. In: Proc. of TrustCom 2011 (2011)Google Scholar
  6. 6.
    Hwang, K., Li, D.: Trusted Cloud Computing with Secure Resources and Data Coloring. IEEE Internet Computing 14(5), 14–22 (2010)CrossRefGoogle Scholar
  7. 7.
    Ko, R., et al.: TrustCloud: A Framework for Accountability and Trust in Cloud Computing. In: Proc. of SERVICES 2011 (2011)Google Scholar
  8. 8.
    Noor, T.H., Sheng, Q.Z.: Credibility-Based Trust Management for Services in Cloud Environments. In: Kappel, G., Maamar, Z., Motahari-Nezhad, H.R. (eds.) ICSOC 2011. LNCS, vol. 7084, pp. 328–343. Springer, Heidelberg (2011)Google Scholar
  9. 9.
    Noor, T.H., Sheng, Q.Z.: Trust as a Service: A Framework for Trust Management in Cloud Environments. In: Bouguettaya, A., Hauswirth, M., Liu, L. (eds.) WISE 2011. LNCS, vol. 6997, pp. 314–321. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  10. 10.
    Ren, K., et al.: Security Challenges for the Public Cloud. IEEE Internet Computing 16(1), 69–73 (2012)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Talal H. Noor
    • 1
  • Quan Z. Sheng
    • 1
  • Abdullah Alfazi
    • 1
  1. 1.School of Computer ScienceThe University of AdelaideAdelaideAustralia

Personalised recommendations