An Autonomous Trust Model for Cloud Integrated Framework

  • C. K. ShyamalaEmail author
  • Ashwathi Chandran
Conference paper
Part of the Lecture Notes in Computational Vision and Biomechanics book series (LNCVB, volume 28)


Cloud integrated frameworks (CIF) lay the ground work for controlling and managing data gathered from various sources. Data quality trust addresses detection of manipulation, concealment and rollbacks on data exchanged in CIF. The work presented here proposes a trust enhanced CIF that comprehensively takes into account processing, transmission, privacy, data quality and recommendation in addition to availability, bandwidth of the servicing. A weighted average computation using weights derived from Service Level Agreement given by CSU is proposed over a moving window on the performances maintained by Trusted Centre Entity (TCE). TCE monitors the system for malicious behaviours of CSPs that may change the behaviour of the system. It assures data quality using Merkle hash tree (MHT) and manages the trust and reputation scores for the CSPs in the trust enhanced CIF. It performs public auditability to detect data roll back, data concealment and incorrect data. The work proposes a scheme that provides for autonomous trust management in CIFs.


Cloud integrated framework Trust Data quality trust Merkle hash tree 


  1. 1.
    Fortino, G., Pathan, M., Di Fatta, G.: Bodycloud: integration of cloud computing and body sensor networks. In: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 851–856. IEEE, Dec 2012Google Scholar
  2. 2.
    Ahmed, K., Gregory, M.: Integrating wireless sensor networks with computing. In: 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks (MSN), pp. 364–366. IEEE, Dec 2011Google Scholar
  3. 3.
    Zhu, C., Nicanfar, H., Leung, V.C., Yang, L.T.: An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Trans. Inf. Forensics Secur. 10(1), 118–131 (2015)CrossRefGoogle Scholar
  4. 4.
    Yuriyama, M., Kushida, T.: Sensor-cloud infrastructure-physical sensor management with virtualized sensors on cloud computing. In: 2010 13th International Conference on Network-Based Information Systems (NBiS), pp. 1–8. IEEE, Sept 2010Google Scholar
  5. 5.
    Habib, S.M., Ries, S., Muhlhauser, M.: Towards a trust management system for cloud computing. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 933–939. IEEE, Nov 2011Google Scholar
  6. 6.
    Shyamala, C.K., Padmanabhan, T.R.: A trust-reputation model offering data retrievability and correctness in distributed storages. Int. J. Comput. Appl. 36(2), 56–63 (2014)Google Scholar
  7. 7.
    Savas, O., Jin, G., Deng, J.: Trust management in cloud-integrated wireless sensor networks. In: 2013 International Conference on Collaboration Technologies and Systems (CTS), pp. 334–341. IEEE, May 2013Google Scholar
  8. 8.
    Sheikh, R.A., Jameel, H., Lee, S., Rajput, S., Song, Y.J.: Trust management problem in distributed wireless sensor networks. In: Proceedings of the 12th IEEE International Conference on Embedded and real-Time Computing Systems and Applications, Sydney, Australia, 16–18 Aug 2006Google Scholar
  9. 9.
    Mármol, F.G., Pérez, G.M.: Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Comput. Stand. Interfaces 32(4), 185–196 (2010)CrossRefGoogle Scholar
  10. 10.
    Zacharia, G., Maes, P.: Trust management through reputation mechanisms. Appl. Artif. Intell. 14(9), 881–907 (2000)CrossRefGoogle Scholar
  11. 11.
    Sabater, J., Sierra, C.: REGRET: reputation in gregarious societies. In: Proceedings of the Fifth International Conference on Autonomous Agents, pp. 194–195. ACM, May 2001Google Scholar
  12. 12.
    Carbo, J., Molina, J.M., Davila, J.: Trust management through fuzzy reputation. Int. J. Coop. Inf. Syst. 12(01), 135–155 (2003)CrossRefGoogle Scholar
  13. 13.
    Songsiri, S.: MTrust: a reputation-based trust model for a mobile agent system, Autonomic and Trusted Computing. No. 4158. In: LNCS. Third International Conference, ATC 2006, pp. 374–385, Springer, Wuhan, China, Sept 2006Google Scholar
  14. 14.
    Huang, C., Hu, H., Wang, Z.: A dynamic trust model based on feedback control mechanism for P2P applications, Autonomic and Trusted Computing. No. 4158 in LNCS, pp. 312–321, Springer, Wuhan, China, Sept 2006Google Scholar
  15. 15.
    Wang, W., Zeng, G., Yuan, L.: Ant-based reputation evidence distribution in P2P networks, GCC. In: Fifth International Conference on Grid and Cooperative Computing, IEEE Computer Society, pp. 129–132, Changsha, Hunan, China, Oct 2006Google Scholar
  16. 16.
    Kamvar, S., Schlosser, M., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the International World Wide Web Conference (WWW). Budapest, Hungary, May 2003Google Scholar
  17. 17.
    Buchegger, S., Le Boudec, J.Y.: A robust reputation system for P2P and mobile adhoc networks. In: Proceedings of the Second Workshop on the Economics of Peer-toPeer Systems, Cambridge MA, USA, June 2004Google Scholar
  18. 18.
    Almenárez, F., Marín, A., Campo, C., García, C.: PTM: a Pervasive Trust Management for Dynamic Open Environments, Privacy and Trust. First Workshop on Pervasive Security and Trust, Boston, USA, Aug 2004Google Scholar
  19. 19.
    Kim, H., Lee, H., Kim, W., Kim, Y.: A trust evaluation model for QoS guarantee in cloud systems. Int. J. Grid Distrib. Comput. 3(1), 1–10 (2010)Google Scholar
  20. 20.
    Priyadarshani, W.E., Wikramanayake, G.N., Ekanayake, E.P.: Measuring trust and selecting cloud database services. Adv. Comput. Sci. Int. J. 2(5), 114–120 (2013)Google Scholar
  21. 21.
    Can, A.B., Bhargava, B.: Sort: a self-organizing trust model for peer-to-peer systems. IEEE Trans. Dependable Secure Comput. 10(1), 14–27 (2013)CrossRefGoogle Scholar
  22. 22.
    Sänger, J., Richthammer, C., Hassan, S., Pernul, G.: Trust and big data: a roadmap for research. In: 2014 25th International Workshop on Database and Expert Systems Applications (DEXA), pp. 278–282. IEEE, Sept 2014Google Scholar
  23. 23.
    Kanagasabapathi, K., Deepak, S., Prakash, P.: A study on security issues in cloud computing. In: Proceedings of the International Conference on Soft Computing Systems, pp. 167–175. Springer, India (2016)Google Scholar
  24. 24.
    Sangeetha, K.S., Prakash, P.: Big data and cloud: a survey. In: Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, pp. 773–778. Springer India (2015)Google Scholar
  25. 25.
    Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)MathSciNetCrossRefzbMATHGoogle Scholar
  26. 26.
    Liu, C., Yang, C., Zhang, X., Chen, J.: External integrity verification for outsourced big data in cloud and IoT: a big picture. Future Gener. Comput. Syst. 49, 58–67 (2015)CrossRefGoogle Scholar
  27. 27.
    Venkatesh, M., Sumalatha, M.R., SelvaKumar, C.: Improving public auditability, data possession in data storage security for cloud computing. In: 2012 International Conference on Recent Trends in Information Technology (ICRTIT), pp. 463–467. IEEE, April 2012Google Scholar

Copyright information

© Springer International Publishing AG  2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringAmrita Vishwa VidyapeethamCoimbatoreIndia

Personalised recommendations