Skip to main content

Trust Model for Cloud Systems with Self Variance Evaluation

  • Chapter
  • First Online:
Security, Privacy and Trust in Cloud Systems

Abstract

The open, distributed, and dynamic nature of the cloud poses great challenges for trust establishment between entities. In these applications, the service consumer usually knows little about the trust or the reliability of the service provider.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Andersen R, Borgs C, Chayes J, Feige U et al. (2008) Trust-based recommendation systems: an axiomatic approach. In: Proceedings of 17th international conference on world wide web (WWW)

    Google Scholar 

  2. Atkeson C, Moore A, Schaal S (1997) Locally weighted learning. AI Rev 11:11–73

    Google Scholar 

  3. Chen WY, Zhang D, Chang EY (2009) Combinational collaborative filtering for personalized community recommendation. In: Proceedings of ACM international conference on knowledge discovery and data mining

    Google Scholar 

  4. Conner W, Iyengar A, Mikalsen T, Rouvellou I, Nahrstedt K (2009) A trust management framework for service-oriented environments. In: Proceedings of 18th international conference on world wide web (WWW)

    Google Scholar 

  5. Dempster A, Laird N, Rubin D (1997) Maximum likelihood from incomplete data via the EM algorithm. J Roy Stat Soc: Ser B 39(1):1–38

    MathSciNet  Google Scholar 

  6. Golbeck J, Hendler J (2006) Inferring trust relationships in web-based social networks. ACM Trans Internet Technol 6(4):497–529

    Article  Google Scholar 

  7. Golbeck J (2008) Weaving a web of trust. Science 321(5896):1640–1641

    Article  Google Scholar 

  8. Hoffman K, Zage D, Nita-Rotaru C (2009) A survey of attack and defense techniques for reputation systems. ACM Comput Surv 14(4):1

    Article  Google Scholar 

  9. Huang J, Nie F, Huang H, Tu Y (2012) Trust prediction via aggregation heterogeneous social networks. In: Proceedings of the 21st ACM international conference on information and, knowledge management, pp 1774–1778

    Google Scholar 

  10. Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644

    Article  Google Scholar 

  11. Kamvar S, Schlosser M, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of 12th international conference on world wide web (WWW)

    Google Scholar 

  12. Kuter U, Golbeck J (2007) SUNNY: a new algorithm for trust inference in social networks using probabilistic confidence models. In: Proceedings of internation conference on artificial intelligence (AAAI)

    Google Scholar 

  13. Liang Z, Shi W (2008) Analysis of ratings on trust inference in open environments. Elsevier Perform Eval 65(2):99–128

    Article  Google Scholar 

  14. Maybeck PS (1979) Stochastic models, estimation, and control. Mathematics in science and engineering, vol 141. Academic Press, New York

    Google Scholar 

  15. Morris JM (1976) The Kalman filter: a robust estimator for some classes of linear quadratic problems. IEEE Trans Inf Theor 22(5):526–534

    Article  MATH  Google Scholar 

  16. Raya M, Papadimitratos P (2008) Gligor VD, Hubaux JP (2008) On dataCentric trust establishment in ephemeral ad hoc networks. In: Proceedings of INFOCOM

    Google Scholar 

  17. Resnick P, Zeckhauser R, Swanson J, Lockwood K (2006) The value of reputation on eBay: a controlled experiment. Exp Econ 9(2):79–101

    Article  Google Scholar 

  18. Sharma NK, Gaur V, Muttoo SK (2012) A dynamic reputation system with built-in attack resilience to safeguard buyers in e-market. In: Proceedings of ACM SIGSOFT software engineering, notes, pp 1–19

    Google Scholar 

  19. Song S, Hwang K, Kwok YK (2006) Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling. IEEE Trans Comput 55(6):703–719

    Article  Google Scholar 

  20. Srivatsa M, Xiong L, Liu L (2005) TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. In: Proceedings of 14th international conference on world wide web (WWW)

    Google Scholar 

  21. Stern D, Herbrich R, Graepel T (2009) Matchbox: large scale online Bayesian recommendations. In: Proceedings of 18th international conference on world wide web (WWW)

    Google Scholar 

  22. Ting J, D’Souza A, Schaal S (2006) Bayesian regression with input noise for high dimensional data. In: Proceedings of ACM 23rd international conference on, Machine learning

    Google Scholar 

  23. Wang X, Ou W, Su J (2009) A reputation inference model based on linear hidden markov process. In: Proceedings of ISECS international colloquium on computing, communication, control, and management

    Google Scholar 

  24. Wang Y, Singh MP (2006) Trust representation and aggregation in distributed agent systems. In: Proceedings of international conference on artificial intelligence (AAAI), Boston

    Google Scholar 

  25. Whitby A, Jøsang A, Indulska J (2004) Filtering out unfair ratings in Bayesian reputation systems. In: Proceedings of international joint conference on autonomous agents and multiagent systems (AAMAS)

    Google Scholar 

  26. Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857

    Article  Google Scholar 

  27. Yu H, Gibbons P, Kaminsky M, Xiao F (2008) A near-optimal social network defense against sybil attacks? In: Proceedings of the 2008 IEEE symposium on security and privacy

    Google Scholar 

  28. Yu B, Singh MP (2003) Detecting deception in reputation management. In: Proceedings of international joint conference on autonomous agents and multiagent systems (AAMAS)

    Google Scholar 

  29. Zhang Y, Fang Y (2007) A fine-grained reputation system for reliable service selection in peer-to-peer networks? IEEE Trans Parallel Distrib Syst 18(8):1134–1145

    Article  Google Scholar 

  30. Zhou R, Hwang K (2006) PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18(5):460–473

    Google Scholar 

Download references

Acknowledgments

The authors are partially supported by the NSFC No. 61103194, the Aid program for Science and Technology Innovative Research Team in Higher Educational Institutions of Hunan Province.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaofeng Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Wang, X., Su, J., Hu, X., Wu, C., Zhou, H. (2014). Trust Model for Cloud Systems with Self Variance Evaluation. In: Nepal, S., Pathan, M. (eds) Security, Privacy and Trust in Cloud Systems. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38586-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38586-5_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38585-8

  • Online ISBN: 978-3-642-38586-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics