An Efficient Trust Management using Feedback Credibility Evaluation Method in Fog Computing

被引:5
|
作者
Yadav, Ravi [1 ,2 ]
Baranwal, Gaurav [1 ]
机构
[1] Banaras Hindu Univ, Inst Sci, Dept Comp Sci, Varanasi 221005, Uttar Pradesh, India
[2] Banaras Hindu Univ, Dept Comp Sci, Varanasi 221005, India
关键词
Feedback Credibility; Trust; Malicious feedback; Attacks; Fog computing; Internet of Things; REPUTATION; SECURITY;
D O I
10.1016/j.simpat.2022.102610
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Trust of a fog node in fog computing plays a vital role when a user is not familiar with the fog node and can be calculated using the feedback provided by other users. Malicious feedbacks lead to degraded user satisfaction, degraded reputation of good fog nodes, and various attacks such as bad-mouthing attacks, ballot stuffing, Sybil attacks, whitewashing attacks, etc. This work proposes a novel checkers-based feedback credibility evaluation method to identify malicious feedbacks and omits them while evaluating the trust of a fog node. Checkers are the users who have already taken service from the fog node and are honest. The method uses aggregated opinion of checkers and aging factor of checkers to decide the credibility of feedbacks. The proposed method limits the impact of various possible attacks caused by malicious feedbacks. Performance evaluation shows that the method performs well even when malicious feedbacks are present in the system.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] TACRM: trust access control and resource management mechanism in fog computing
    Ben Daoud, Wided
    Obaidat, Mohammad S.
    Meddeb-Makhlouf, Amel
    Zarai, Faouzi
    Hsiao, Kuei-Fang
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2019, 9 (01):
  • [22] A review on trust management in fog/edge computing: Techniques, trends, and challenges
    Nikravan, Mohammad
    Kashani, Mostafa Haghi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 204
  • [23] An Efficient Impersonation Attack Detection Method in Fog Computing
    Wan, Jialin
    Waqas, Muhammad
    Tu, Shanshan
    Hussain, Syed Mudassir
    Shah, Ahsan
    Rehman, Sadaqat Ur
    Hanif, Muhammad
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 267 - 281
  • [24] Efficient caching method in fog computing for internet of everything
    Riya
    Gupta, Nitin
    Dhurandher, Sanjay Kumar
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 439 - 452
  • [25] Efficient caching method in fog computing for internet of everything
    Nitin Riya
    Sanjay Kumar Gupta
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 439 - 452
  • [26] A Multidimensional Trust Evaluation Mechanism for Improving Network Security in Fog Computing
    Liu, Xiao
    Tan, Zhencai
    Liang, Li
    Li, Gaoxiang
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024,
  • [27] An efficient framework for trust evaluation of secure service selection in fog computing based on QoS, reputation, and social criteria
    Afzali, Mahboubeh
    Pourmohammadi, Hamid
    Samani, Amin Mohammad Vali
    [J]. COMPUTING, 2022, 104 (07) : 1643 - 1675
  • [28] An efficient framework for trust evaluation of secure service selection in fog computing based on QoS, reputation, and social criteria
    Mahboubeh Afzali
    Hamid Pourmohammadi
    Amin Mohammad Vali Samani
    [J]. Computing, 2022, 104 : 1643 - 1675
  • [29] An IoT Management System Using Fog Computing
    Yildiran, Berkin
    Ozturk, Erel
    Ozkent, Necati
    Arslan, Yagizcan
    Korkmaz, Ilker
    [J]. 2021 EIGHTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2021, : 146 - 153
  • [30] An Invocation Chain Test and Evaluation Method for Fog Computing
    Zhao, Yue
    Yang, Yarang
    Tian, Bo
    Zhang, Tianyi
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020