An Effective Way of Evaluating Trust in Inter-cloud Computing

Full Text (PDF, 273KB), PP.36-42

Views: 0 Downloads: 0

Author(s)

Kiran Mary Matthew 1,* Abdul Quadir Md 1

1. Department of Computer Science and Engineering, VIT University, Chennai

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2017.02.05

Received: 10 Sep. 2016 / Revised: 5 Nov. 2016 / Accepted: 1 Jan. 2017 / Published: 8 Feb. 2017

Index Terms

Inter-cloud computing, trust management, trust rating

Abstract

For any communication to be successful, trust is necessary. For inter-cloud communication, clouds interact with each other for resource sharing. Since they are unaware of their opposite party, there should be some mechanism by which the cloud gets an idea about them prior to the communication. This is accomplished through trust management systems that calculate the trust rating of clouds from opinions from their peers. There is no way to ensure whether these peers are genuine in their opinion or not. This paper proposes a method to reduce such problems by considering the latest history of communication of a particular cloud and ignore the opinions given by less trusted clouds.

Cite This Paper

Kiran Mary Matthew, Abdul Quadir Md, "An Effective Way of Evaluating Trust in Inter-cloud Computing", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.2, pp.36-42, 2017. DOI:10.5815/ijcnis.2017.02.05

Reference

[1]Abawajy, Jemal. "Determining service trustworthiness in inter-cloud computing environments." Pervasive Systems, Algorithms, and Networks (ISPAN), 2009 10th International Symposium on. IEEE, 2009.
[2]Josang, Audun, Roslan Ismail, and Colin Boyd. "A survey of trust and reputation systems for online service provision." Decision support systems 43.2 (2007): 618-644.
[3]Habib, Sheikh Mahbub, Sebastian Ries, and Max Mühlh?user. "Towards a trust management system for cloud computing." Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, 2011.
[4]Noor, Talal H., et al. "Trust management of services in cloud environments: Obstacles and solutions." ACM Computing Surveys (CSUR) 46.1 (2013): 12.
[5]Abawajy, Jemal. "Establishing trust in hybrid cloud computing environments." Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, 2011.
[6]https://en.wikipedia.org/wiki/Box_plot.
[7]Vijayakumar, V., and R. S. D. W. Banu. "Security for resource selection in grid computing based on trust and reputation responsiveness." International Journal of Computer Science and Network Security 8.11 (2008): 107-115.
[8]Bonatti, Piero, et al. "An integration of reputation-based and policy-based trust management." networks 2.14 (2007): 10.
[9]Kotsovinos, Evangelos, and Aled Williams. "BambooTrust: Practical scalable trust management for global public computing." Proceedings of the 2006 ACM symposium on Applied computing. ACM, 2006.
[10]Kagal, Lalana, Tim Finin, and Yun Peng. "A framework for distributed trust management." proceedings of IJCAI-01 Workshop on Autonomy, Delegation and Control. 2001.
[11]Azzedin, Farag, and Muthucumaru Maheswaran. "A trust brokering system and its application to resource management in public-resource grids." Parallel and Distributed Processing Symposium, 2004. Proceedings.
18th International. IEEE, 2004.
[12]Carbo, Javier, Jose M. Molina, and Jorge Davila. "Trust management through fuzzy reputation." International Journal of Cooperative Information Systems 12.01 (2003): 135-155.
[13]Noor, Talal H., and Quan Z. Sheng. "Trust as a service: a framework for trust management in cloud environments." Web Information System Engineering–WISE 2011. Springer Berlin Heidelberg, 2011. 314-321.
[14]Weeks, Stephen. "Understanding trust management systems." Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on. IEEE, 2001.
[15]Wei, Xianglin, et al. "SMART: A subspace based malicious peers detection algorithm for P2P systems." International Journal of Communication Networks and Information Security 5.1 (2013): 1.
[16]Hesarlo, Parisa Sheykhi. "Security, privacy and trust challenges in cloud computing and solutions." International Journal of Computer Network and Information Security 6.8 (2014): 34.
[17]Derahman, M. N., A. Abdullah, and M. F. Azmi. "Robust Reputation Based Trust Management Framework for Federated-Cloud Environments." International Journal of Applied Engineering Research 11.21 (2016): 10601-10605.
[18]Xu, Jiuyun, et al. "Local reputation management in cloud computing." 2015 IEEE World Congress on Services. IEEE, 2015.
[19]Filali, Fatima Zohra, and Belabbes Yagoubi. "Global trust: a trust model for cloud service selection." International Journal of Computer Network and Information Security 7.5 (2015): 41.