Skip to main content
Top
Published in: The Journal of Supercomputing 6/2017

04-01-2017

Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model

Authors: Safieh Siadat, Amir Masoud Rahmani, Hamidreza Navid

Published in: The Journal of Supercomputing | Issue 6/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing trust management has become an important subject in recent years. Trust management is a difficult and complicated work in cloud computing due to features such as distributed, dynamic and non-transparent environment. Since most trust management frameworks predict trust values based on received feedbacks, the validation and authenticity of feedback are highly necessary. In this paper, two new methods are presented to identify fake feedbacks. One is feedback evaluation component and the other is Bayesian game model. The feedback evaluation component is used to examine the received feedback and identify its probable fake identity. Our results reveal that the feedback evaluation component can correctly identify and rectify fake feedbacks. Bayesian game model is presented to detect malicious users and prevent their feedbacks. Simulation results coincided well with analytical results, indicating that our Bayesian game model can correctly recognize malicious user. Received feedbacks from malicious user are identified as fake feedbacks. Eventually, two new methods were compared.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Jafari Navimipour N, Rahmani AM, Habibizad Navin A, Hosseinzadeh M (2015) Expert cloud: a cloud-based framework to share the knowledge and skills of human resources. Comput Hum Behav 46:57–74CrossRef Jafari Navimipour N, Rahmani AM, Habibizad Navin A, Hosseinzadeh M (2015) Expert cloud: a cloud-based framework to share the knowledge and skills of human resources. Comput Hum Behav 46:57–74CrossRef
2.
go back to reference Buyya R (2009) Market-oriented cloud computing: vision”, hype, and reality of delivering computing as the 5th utility. In: Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, vol 1. IEEE Computer Society Buyya R (2009) Market-oriented cloud computing: vision”, hype, and reality of delivering computing as the 5th utility. In: Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, vol 1. IEEE Computer Society
3.
go back to reference Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53:50–58CrossRef Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53:50–58CrossRef
4.
go back to reference Jafari Navimipour N, Rahmani AM, Habibizad Navin A, Hosseinzadeh M (2014) Resource discovery mechanisms in grid systems: a survey. J Netw Comput Appl 41:389–410CrossRef Jafari Navimipour N, Rahmani AM, Habibizad Navin A, Hosseinzadeh M (2014) Resource discovery mechanisms in grid systems: a survey. J Netw Comput Appl 41:389–410CrossRef
5.
go back to reference Buyya R, Ranjan R, Calheiros RN (2010) InterCloud: utility-oriented federation of cloud computing environments for scaling of application services. In: Proceedings of the 10th International Conference on Algorithms and Architectures for Parallel Processing, vol Part I, pp 13–31 Buyya R, Ranjan R, Calheiros RN (2010) InterCloud: utility-oriented federation of cloud computing environments for scaling of application services. In: Proceedings of the 10th International Conference on Algorithms and Architectures for Parallel Processing, vol Part I, pp 13–31
6.
go back to reference Xiao P, Hu ZG, Zhang Y (2013) An energy-aware heuristic scheduling for data-intensive workflows in virtualized datacenters. J Comput Sci Technol 28:948–961CrossRef Xiao P, Hu ZG, Zhang Y (2013) An energy-aware heuristic scheduling for data-intensive workflows in virtualized datacenters. J Comput Sci Technol 28:948–961CrossRef
7.
go back to reference Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63:561–592CrossRef Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63:561–592CrossRef
8.
go back to reference Hwang K, Li D (2010) Trusted cloud computing with secure resources and data coloring. Internet Comput IEEE 14:14–22CrossRef Hwang K, Li D (2010) Trusted cloud computing with secure resources and data coloring. Internet Comput IEEE 14:14–22CrossRef
9.
go back to reference Noor T, Talal H, Sheng Q (2011) Trust as a service: a framework for trust management in cloud environments. Web Inf Syst Eng WISE 2011:314–321 Noor T, Talal H, Sheng Q (2011) Trust as a service: a framework for trust management in cloud environments. Web Inf Syst Eng WISE 2011:314–321
10.
go back to reference Pearson S, Benameur A (2010) Privacy, security and trust issues arising from cloud computing, cloud computing technology and science (CloudCom). In: 2010 IEEE Second International Conference, pp 693–702 Pearson S, Benameur A (2010) Privacy, security and trust issues arising from cloud computing, cloud computing technology and science (CloudCom). In: 2010 IEEE Second International Conference, pp 693–702
11.
go back to reference Fernandes Diogo AB, Soares Liliana FB, Gomes João V, Freire Mário M, Inácio Pedro RM (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13:13–170 Fernandes Diogo AB, Soares Liliana FB, Gomes João V, Freire Mário M, Inácio Pedro RM (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13:13–170
12.
go back to reference Li R, Li J (2013) Requirements and design for neutral trust management framework in unstructured networks. J Supercomput 64:702–716CrossRef Li R, Li J (2013) Requirements and design for neutral trust management framework in unstructured networks. J Supercomput 64:702–716CrossRef
13.
go back to reference Perez JMM, Bernabe JB, Calero JMA, Clemente FJG, Perez GM, Skarmeta AFG (2014) Taxonomy of trust relationships in authorization domains for cloud computing. J Supercomput 70:1075–1099 Perez JMM, Bernabe JB, Calero JMA, Clemente FJG, Perez GM, Skarmeta AFG (2014) Taxonomy of trust relationships in authorization domains for cloud computing. J Supercomput 70:1075–1099
14.
go back to reference Abbadi ImadM (2013) A framework for establishing trust in cloud provenance. Int J Inf Secur 12:111–128CrossRef Abbadi ImadM (2013) A framework for establishing trust in cloud provenance. Int J Inf Secur 12:111–128CrossRef
15.
go back to reference Abbadi IM, Martin A (2011) Trust in the cloud. Inf Secur Tech Rep 16:108–114CrossRef Abbadi IM, Martin A (2011) Trust in the cloud. Inf Secur Tech Rep 16:108–114CrossRef
16.
go back to reference Wang G, Zhou W, Yang LT (2013) Trust, security and privacy for pervasive applications. J Supercomput 64:661–663CrossRef Wang G, Zhou W, Yang LT (2013) Trust, security and privacy for pervasive applications. J Supercomput 64:661–663CrossRef
17.
go back to reference Jabbar1 S, Naseer K, Gohar M, Rho S, Chang H (2015) Trust model at service layer of cloud computing for educational institutes. J Supercomput 72:58–83 Jabbar1 S, Naseer K, Gohar M, Rho S, Chang H (2015) Trust model at service layer of cloud computing for educational institutes. J Supercomput 72:58–83
18.
go back to reference Tang C, Liu J (2015) Selecting a trusted cloud service provider for your SaaS program. Comput Secur 50:60–73CrossRef Tang C, Liu J (2015) Selecting a trusted cloud service provider for your SaaS program. Comput Secur 50:60–73CrossRef
19.
go back to reference Ul Haq I, Brandic I, Schikuta E (2010) SLA validation in layered cloud infrastructures. Econ Grids Clouds Syst Serv 6296:153–164CrossRef Ul Haq I, Brandic I, Schikuta E (2010) SLA validation in layered cloud infrastructures. Econ Grids Clouds Syst Serv 6296:153–164CrossRef
20.
go back to reference Conner w, Iyengar A, Mikalsen T, Rouvellou R, Nahrstedt K (2009) A trust management framework for service-oriented environments. In: Proceedings of the 18th International Conference on World Wide Web, pp 891–900 Conner w, Iyengar A, Mikalsen T, Rouvellou R, Nahrstedt K (2009) A trust management framework for service-oriented environments. In: Proceedings of the 18th International Conference on World Wide Web, pp 891–900
21.
go back to reference Malik Z, Bouguettaya A (2009) RATEWeb: reputation assessment for trust establishment among web services. VLDB J 18:885–911CrossRef Malik Z, Bouguettaya A (2009) RATEWeb: reputation assessment for trust establishment among web services. VLDB J 18:885–911CrossRef
22.
go back to reference Fan W, Yang S, Pei J (2014) A novel two-stage model for cloud service trustworthiness evaluation. Expert Syst 31:136–153CrossRef Fan W, Yang S, Pei J (2014) A novel two-stage model for cloud service trustworthiness evaluation. Expert Syst 31:136–153CrossRef
23.
go back to reference siadat S, Rahmani AM, Mohsenzadeh M (2009) Proposed platform for improving grid security by trust management system. Int J Comput Sci Inf Secur Tech Rep 6:143–148 siadat S, Rahmani AM, Mohsenzadeh M (2009) Proposed platform for improving grid security by trust management system. Int J Comput Sci Inf Secur Tech Rep 6:143–148
24.
go back to reference Hsu J, Lin K, Chang T, Ho C, Huang H, Jih W (2006) Parameter learning of personalized trust models in broker-based distributed trust management. Inf Syst Front 8:321–333CrossRef Hsu J, Lin K, Chang T, Ho C, Huang H, Jih W (2006) Parameter learning of personalized trust models in broker-based distributed trust management. Inf Syst Front 8:321–333CrossRef
25.
go back to reference Alhamad M, Dillon T, Chang E (2010) SLA-based trust model for cloud computing, network-based information systems (NBiS). In: 2010 13th International Conference, pp 321–324 Alhamad M, Dillon T, Chang E (2010) SLA-based trust model for cloud computing, network-based information systems (NBiS). In: 2010 13th International Conference, pp 321–324
26.
go back to reference Chakraborty S, Roy K (2012) An SLA-based framework for estimating trustworthiness of a cloud, trust. In: Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference, pp 937–942 Chakraborty S, Roy K (2012) An SLA-based framework for estimating trustworthiness of a cloud, trust. In: Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference, pp 937–942
27.
go back to reference Fan W, Perros H (2014) A novel trust management framework for multi-cloud environments based on trust service providers. Knowl-Based Syst 70:392–406CrossRef Fan W, Perros H (2014) A novel trust management framework for multi-cloud environments based on trust service providers. Knowl-Based Syst 70:392–406CrossRef
28.
29.
go back to reference Song S, Hwang K, Macwan M (2004) Fuzzy trust integration for security enforcement in grid computing. Netw Parallel Comput 3222:9–21CrossRef Song S, Hwang K, Macwan M (2004) Fuzzy trust integration for security enforcement in grid computing. Netw Parallel Comput 3222:9–21CrossRef
30.
go back to reference Hongmei L, Qianping W, Guoxin L (2009) A fuzzy logic-based trust model in grid, networks security, wireless communications and trusted computing. In: NSWCTC ’09. International Conference, vol 1, pp 608–614 Hongmei L, Qianping W, Guoxin L (2009) A fuzzy logic-based trust model in grid, networks security, wireless communications and trusted computing. In: NSWCTC ’09. International Conference, vol 1, pp 608–614
31.
go back to reference Yuan W, Guan D, Lee Y, Lee S, Hur S (2010) Improved trust-aware recommender system using small-worldness of trust networks. Knowl-Based Syst 23:232–238CrossRef Yuan W, Guan D, Lee Y, Lee S, Hur S (2010) Improved trust-aware recommender system using small-worldness of trust networks. Knowl-Based Syst 23:232–238CrossRef
32.
go back to reference Noor T, Sheng Q, Alfazi A, Law J, Jeriel, Ngu AH (2013) Identifying fake feedback for effective trust management in cloud environments. In: Service-Oriented Computing—ICSOC 2012 Workshops, vol 7759, pp 47–58 Noor T, Sheng Q, Alfazi A, Law J, Jeriel, Ngu AH (2013) Identifying fake feedback for effective trust management in cloud environments. In: Service-Oriented Computing—ICSOC 2012 Workshops, vol 7759, pp 47–58
Metadata
Title
Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model
Authors
Safieh Siadat
Amir Masoud Rahmani
Hamidreza Navid
Publication date
04-01-2017
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 6/2017
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-016-1950-1

Other articles of this Issue 6/2017

The Journal of Supercomputing 6/2017 Go to the issue

Premium Partner