A new trust evaluation approach for cloud computing environments

被引:0
|
作者
Mrabet, Manel [1 ]
ben Saied, Yosra [1 ]
Saidane, Leila Azzouz [1 ]
机构
[1] Univ Manouba, Natl Sch Comp Sci, Tunis, Tunisia
来源
5TH IFIP INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION AND MODELING IN WIRED AND WIRELESS NETWORKS PEMWN 16 | 2016年
关键词
cloud computing; qualitative and quantitative assessment; QoS attributes; Service selection; SECURITY; MODEL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces a novel trust evaluation approach for the cloud computing domain. The wide majority of the existing trust systems are either limited to the qualitative or the quantitative assessment of trust. Even those that combine qualitative and quantitative assessment, present several limitations. For instance, they do not take into account the user's technical requirements. They do not either apply serious measures to detect malicious feedbacks. These restrictions have a detrimental effect on trust establishment in today's cloud computing environments, which are characterized by heterogeneity in providers, services and users. This heterogeneity is also hidden by evaluating trust similarly for all cloud services. In this paper, we designed a new trust evaluation approach that leverages the correlation between QoS attributes. Our approach takes into account all the relevant features of cloud environments and shortcomings of prior trust models. A case study reveals that our proposed approach performs better than similar trust models and capable of deterring unreasonable feedbacks inhibiting the accuracy of the calculated trust values.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Trust Management Approach for Secure and Privacy Data Access in Cloud Computing
    Mythili, K.
    Anandakumar, H.
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 923 - 927
  • [42] A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments
    Kurdi, Heba
    Alfaries, Auhood
    Al-Anazi, Abeer
    Alkharji, Sara
    Addegaither, Maimona
    Altoaimy, Lina
    Ahmed, Syed Hassan
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (07): : 3534 - 3554
  • [43] A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments
    Heba Kurdi
    Auhood Alfaries
    Abeer Al-Anazi
    Sara Alkharji
    Maimona Addegaither
    Lina Altoaimy
    Syed Hassan Ahmed
    The Journal of Supercomputing, 2019, 75 : 3534 - 3554
  • [44] A approach of Credibility-Based Trust Management Service in Cloud Environments
    Wang, Suzhen
    Lu, Wei
    Du, Zhijuan
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1771 - 1778
  • [45] Evaluation approach of subjective trust based on cloud model
    Wang S.-X.
    Zhang L.
    Li H.-S.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (06): : 1341 - 1352
  • [46] A Trust Evaluation Model for Cloud Computing Using Service Level Agreement
    Marudhadevi, D.
    Dhatchayani, V. Neelaya
    Sriram, V. S. Shankar
    COMPUTER JOURNAL, 2015, 58 (10): : 2225 - 2232
  • [47] Rule Based Trust Evaluation Using Fuzzy Logic in Cloud Computing
    Rathi, Poorva
    Ahuja, Himanshu
    Pandey, Kavita
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 510 - 514
  • [48] A Trust Evaluation Model for Cloud Computing Using Service Level Agreement
    Marudhadevi, D.
    Dhatchayani, V. Neelaya
    Sriram, V.S. Shankar
    Sriram, V.S. Shankar (sriram@it.sastra.edu), 1600, Oxford University Press (58): : 2225 - 2232
  • [49] An active and verifiable trust evaluation approach for edge computing
    Mo, Wen
    Wang, Tian
    Zhang, Shaobo
    Zhang, Jinhuan
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
  • [50] An active and verifiable trust evaluation approach for edge computing
    Wen Mo
    Tian Wang
    Shaobo Zhang
    Jinhuan Zhang
    Journal of Cloud Computing, 9