Skip to main content
Erschienen in: The Journal of Supercomputing 7/2019

26.10.2018

A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments

verfasst von: Heba Kurdi, Auhood Alfaries, Abeer Al-Anazi, Sara Alkharji, Maimona Addegaither, Lina Altoaimy, Syed Hassan Ahmed

Erschienen in: The Journal of Supercomputing | Ausgabe 7/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The interconnected cloud computing paradigm is gaining considerable attention as a fundamental emerging model of cloud computing. It allows a wide range of interactions and collaborations across multiple service providers. Despite the potential advantages of interconnected clouds, establishing trust among participating parties is a challenging issue. In this paper, we introduce a lightweight trust management algorithm based on subjective logic (InterTrust) to promote trust in interconnected clouds. The experimental results demonstrate that InterTrust is capable of producing accurate trust information with significantly low execution time and high scalability compared to application of both the well-established trust management algorithm trust network analysis with subjective logic and no trust algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Firdhous M, Ghazali O, Hassan S (2011) A trust computing mechanism for cloud computing with multilevel thresholding. In: 6th International Conference on Industrial and Information Systems, IEEE, Kandy, Sri Lanka, pp 457–461 Firdhous M, Ghazali O, Hassan S (2011) A trust computing mechanism for cloud computing with multilevel thresholding. In: 6th International Conference on Industrial and Information Systems, IEEE, Kandy, Sri Lanka, pp 457–461
3.
Zurück zum Zitat Kanwal A, Masood R, Ghazia UE, Shibli MA, Abbasi AG (2013) Assessment criteria for trust models in cloud computing. In: IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing. IEEE, Beijing, China, pp 254–261 Kanwal A, Masood R, Ghazia UE, Shibli MA, Abbasi AG (2013) Assessment criteria for trust models in cloud computing. In: IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing. IEEE, Beijing, China, pp 254–261
4.
Zurück zum Zitat Goyal MK, Aggarwal A, Gupta P, Kumar P (2012) QoS based trust management model for Cloud IaaS. In: 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, IEEE, Solan, India, pp 843–847 Goyal MK, Aggarwal A, Gupta P, Kumar P (2012) QoS based trust management model for Cloud IaaS. In: 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, IEEE, Solan, India, pp 843–847
6.
Zurück zum Zitat Demchenko Y, Ngo C, Laat CD, Lee C (2014) Federated access control in heterogeneous intercloud environment: basic models and architecture patterns. In: IEEE International Conference on Cloud Engineering, IEEE, Boston, MA, USA, pp 439–445 Demchenko Y, Ngo C, Laat CD, Lee C (2014) Federated access control in heterogeneous intercloud environment: basic models and architecture patterns. In: IEEE International Conference on Cloud Engineering, IEEE, Boston, MA, USA, pp 439–445
7.
Zurück zum Zitat Habiba U, Masood R, Shibli MA (2015) Secure identity management system for federated cloud environment. In: Lee R (ed) Software engineering, artificial intelligence, networking and parallel/distributed computing. Springer, New York, pp 17–33 Habiba U, Masood R, Shibli MA (2015) Secure identity management system for federated cloud environment. In: Lee R (ed) Software engineering, artificial intelligence, networking and parallel/distributed computing. Springer, New York, pp 17–33
10.
Zurück zum Zitat Hu Z, Liu L, Wang C (2011) Organization domain trust evaluation model in federa environment based on subjective logic. In: International Conference on Information Technology, Computer Engineering and Management Sciences (ICM), IEEE, Nanjing, Jiangsu, China, pp 380–384 Hu Z, Liu L, Wang C (2011) Organization domain trust evaluation model in federa environment based on subjective logic. In: International Conference on Information Technology, Computer Engineering and Management Sciences (ICM), IEEE, Nanjing, Jiangsu, China, pp 380–384
12.
Zurück zum Zitat Jøsang A, Hayward R, Pope S (2006) Trust network analysis with subjective logic. In: Proceedings of the 29th Australasian Computer Science Conference. Australian Computer Society, Inc., Hobart, Australia, pp 85–94 Jøsang A, Hayward R, Pope S (2006) Trust network analysis with subjective logic. In: Proceedings of the 29th Australasian Computer Science Conference. Australian Computer Society, Inc., Hobart, Australia, pp 85–94
13.
Zurück zum Zitat Alhadad N, Busnel Y, Serrano-Alvarado P, Lamarre P (2014) Trust evaluation of a system for an activity with subjective logic. In International Conference on Trust, Privacy and Security in Digital Business, Springer, Cham, pp 48–59 Alhadad N, Busnel Y, Serrano-Alvarado P, Lamarre P (2014) Trust evaluation of a system for an activity with subjective logic. In International Conference on Trust, Privacy and Security in Digital Business, Springer, Cham, pp 48–59
14.
Zurück zum Zitat Cardoso RC, Gomes AJ, Freire MM (2017) A user trust system for online games—part I: an activity theory approach for trust representation. IEEE Trans Comput Intell AI Games 9(3):305–320CrossRef Cardoso RC, Gomes AJ, Freire MM (2017) A user trust system for online games—part I: an activity theory approach for trust representation. IEEE Trans Comput Intell AI Games 9(3):305–320CrossRef
15.
Zurück zum Zitat Chen F, Wang C, Cho JH (2017) Collective subjective logic: scalable uncertainty-based opinion inference. In: 2017 IEEE International Conference on Big Data (Big Data), IEEE, pp 7–16 Chen F, Wang C, Cho JH (2017) Collective subjective logic: scalable uncertainty-based opinion inference. In: 2017 IEEE International Conference on Big Data (Big Data), IEEE, pp 7–16
16.
Zurück zum Zitat West AG, Kannan S, Lee I, Sokolsky O (2010) An evaluation framework for reputation management systems. In: Zheng Y (ed) Trust modeling and management in digital environments: from social concept to system development. Information science reference, Hershey, PA, USA, pp 282–308 West AG, Kannan S, Lee I, Sokolsky O (2010) An evaluation framework for reputation management systems. In: Zheng Y (ed) Trust modeling and management in digital environments: from social concept to system development. Information science reference, Hershey, PA, USA, pp 282–308
17.
Zurück zum Zitat Biao C, Zhishu L, Yang C, Die F, Liangyang C (2009) Trust decision making in structured P2P network. In: International Conference on Communication Software and Networks, IEEE, Macau, China, pp 679–683 Biao C, Zhishu L, Yang C, Die F, Liangyang C (2009) Trust decision making in structured P2P network. In: International Conference on Communication Software and Networks, IEEE, Macau, China, pp 679–683
19.
Zurück zum Zitat Hwang K, Fox GC, Dongarra JJ (2012) Distributed and cloud computing: from parallel processing to the internet of things. Morgan Kaufmann, New York Hwang K, Fox GC, Dongarra JJ (2012) Distributed and cloud computing: from parallel processing to the internet of things. Morgan Kaufmann, New York
20.
Zurück zum Zitat Lin Y-J, Yang H-W, Yang C-C, Lin W (2013) A traceable and fair transaction mechanism for digital rights management on P2P networks. J Int Technol 14:1043–1051 Lin Y-J, Yang H-W, Yang C-C, Lin W (2013) A traceable and fair transaction mechanism for digital rights management on P2P networks. J Int Technol 14:1043–1051
21.
Zurück zum Zitat Firdhous M, Ghazali O, Hassan S, Harun NZ, Abas A (2011) Honey bee based trust management system for cloud computing. In: 3rd International Conference on Computing and Informatics. ICOCI, Bandung, Indonesia, paper no. 126 Firdhous M, Ghazali O, Hassan S, Harun NZ, Abas A (2011) Honey bee based trust management system for cloud computing. In: 3rd International Conference on Computing and Informatics. ICOCI, Bandung, Indonesia, paper no. 126
22.
Zurück zum Zitat Sato H, Kanai A, Tanimoto S (2010) A cloud trust model in a security aware cloud. In: 10th IEEE/IPSJ International Symposium on Applications and the Internet, IEEE, Seoul, South Korea, pp 121–124 Sato H, Kanai A, Tanimoto S (2010) A cloud trust model in a security aware cloud. In: 10th IEEE/IPSJ International Symposium on Applications and the Internet, IEEE, Seoul, South Korea, pp 121–124
23.
Zurück zum Zitat Wang T, Ye B, Li Y, Yang Y (2010) Family gene based cloud trust model. In: Educational and Network Technology (ICENT), IEEE, Qinhuangdao, China, pp 540–544 Wang T, Ye B, Li Y, Yang Y (2010) Family gene based cloud trust model. In: Educational and Network Technology (ICENT), IEEE, Qinhuangdao, China, pp 540–544
24.
Zurück zum Zitat Jøsang A, Bhuiyan T (2008) Optimal trust network analysis with subjective logic. In: 2nd International Conference on Emerging Security Information, Systems and Technologies, IEEE, Cap Esterel, France, pp 179–184 Jøsang A, Bhuiyan T (2008) Optimal trust network analysis with subjective logic. In: 2nd International Conference on Emerging Security Information, Systems and Technologies, IEEE, Cap Esterel, France, pp 179–184
25.
Zurück zum Zitat Bhuiyan T, Josang A, Xu Y (2010) Trust and reputation management in web-based social network. In: Web Intelligence and Intelligent Agents, InTech, Croatia, pp 207–232 Bhuiyan T, Josang A, Xu Y (2010) Trust and reputation management in web-based social network. In: Web Intelligence and Intelligent Agents, InTech, Croatia, pp 207–232
26.
Zurück zum Zitat Ma X, Wang Z, Liu F, Bian J (2010) A trust model based on the extended subjective logic for P2P networks. In: 2nd International Conference on e-Business and Information System Security, IEEE, Wuhan, China, pp 1–4 Ma X, Wang Z, Liu F, Bian J (2010) A trust model based on the extended subjective logic for P2P networks. In: 2nd International Conference on e-Business and Information System Security, IEEE, Wuhan, China, pp 1–4
27.
Zurück zum Zitat Dillon T, Wu C, Chang E (2010) Cloud computing: issues and challenges. In: 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), IEEE, Perth, WA, Australia, pp 27–33 Dillon T, Wu C, Chang E (2010) Cloud computing: issues and challenges. In: 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), IEEE, Perth, WA, Australia, pp 27–33
28.
Zurück zum Zitat Habib SM, Ries S, Muhlhauser M (2010) Cloud computing landscape and research challenges regarding trust and reputation. In: 7th International Conference on Ubiquitous Intelligence and Computing and 7th International Conference on Autonomic and Trusted Computing, IEEE, Xian, Shaanxi, China, pp 410–415 Habib SM, Ries S, Muhlhauser M (2010) Cloud computing landscape and research challenges regarding trust and reputation. In: 7th International Conference on Ubiquitous Intelligence and Computing and 7th International Conference on Autonomic and Trusted Computing, IEEE, Xian, Shaanxi, China, pp 410–415
29.
Zurück zum Zitat Li W, Ping L, Pan X (2010) Use trust management module to achieve effective security mechanisms in cloud environment. In: International Conference on Electronics and Information Engineering, IEEE, Kyoto, Japan, pp V1-14–V11-19 Li W, Ping L, Pan X (2010) Use trust management module to achieve effective security mechanisms in cloud environment. In: International Conference on Electronics and Information Engineering, IEEE, Kyoto, Japan, pp V1-14–V11-19
30.
Zurück zum Zitat Habib SM, Ries S, Muhlhauser M (2011) Towards a trust management system for cloud computing. In: 10th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE Changsha, China, pp 933–939 Habib SM, Ries S, Muhlhauser M (2011) Towards a trust management system for cloud computing. In: 10th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE Changsha, China, pp 933–939
31.
Zurück zum Zitat Fan W, Perros H (2013) A reliability-based trust management mechanism for cloud services. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) IEEE, Melbourne, VIC, Australia, pp 1581–1586 Fan W, Perros H (2013) A reliability-based trust management mechanism for cloud services. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) IEEE, Melbourne, VIC, Australia, pp 1581–1586
32.
Zurück zum Zitat Muchahari MK, Sinha SK (2012) A new trust management architecture for cloud computing environment. In: International Symposium on Cloud and Services Computing, IEEE, Mangalore, India, pp 136–140 Muchahari MK, Sinha SK (2012) A new trust management architecture for cloud computing environment. In: International Symposium on Cloud and Services Computing, IEEE, Mangalore, India, pp 136–140
33.
Zurück zum Zitat Chiluka N, Andrade N, Gkorou D, Pouwelse J (2012) Personalizing eigentrust in the face of communities and centrality attack. In: 26th International Conference on Advanced Information Networking and Applications, IEEE, Fukuoka, Japan, pp 503–510 Chiluka N, Andrade N, Gkorou D, Pouwelse J (2012) Personalizing eigentrust in the face of communities and centrality attack. In: 26th International Conference on Advanced Information Networking and Applications, IEEE, Fukuoka, Japan, pp 503–510
34.
Zurück zum Zitat Shvachko K, Kuang H, Radia S, Chansler R (2010) The hadoop distributed file system. In: 26th Symposium on Mass Storage Systems and Technologies (MSST), IEEE, Incline Village, NV, USA, pp 1–10 Shvachko K, Kuang H, Radia S, Chansler R (2010) The hadoop distributed file system. In: 26th Symposium on Mass Storage Systems and Technologies (MSST), IEEE, Incline Village, NV, USA, pp 1–10
35.
Zurück zum Zitat Rao S, Wang Y, Tao XL (2010) The comprehensive trust model in P2P based on improved eigentrust algorithm. In: International Conference on Measuring Technology and Mechatronics Automation, IEEE, Changsha City, China, pp 822–825 Rao S, Wang Y, Tao XL (2010) The comprehensive trust model in P2P based on improved eigentrust algorithm. In: International Conference on Measuring Technology and Mechatronics Automation, IEEE, Changsha City, China, pp 822–825
36.
Zurück zum Zitat Khan SM, Hamlen KW (2012) Hatman: intra-cloud trust management for hadoop. In: 5th International Conference on Cloud Computing, IEEE, Honolulu, HI, USA, pp 494–501 Khan SM, Hamlen KW (2012) Hatman: intra-cloud trust management for hadoop. In: 5th International Conference on Cloud Computing, IEEE, Honolulu, HI, USA, pp 494–501
37.
Zurück zum Zitat Nishikawa T, Fujita S (2010) An effective risk avoidance scheme for the eigentrust reputation management system. In: 1st International Conference on Networking and Computing, IEEE, Higashi-Hiroshima, Japan, pp 36–43 Nishikawa T, Fujita S (2010) An effective risk avoidance scheme for the eigentrust reputation management system. In: 1st International Conference on Networking and Computing, IEEE, Higashi-Hiroshima, Japan, pp 36–43
38.
Zurück zum Zitat Abrams Z, Mcgrew R, Plotkin S (2005) A non-manipulable trust system based on eigentrust. ACM SIGecom Exch 5:21–30CrossRef Abrams Z, Mcgrew R, Plotkin S (2005) A non-manipulable trust system based on eigentrust. ACM SIGecom Exch 5:21–30CrossRef
39.
Zurück zum Zitat Samlinson E, Usha M (2013) User-centric trust based identity as a service for federated cloud environment. In: 4th International Conference on Computing, Communications and Networking Technologies (ICCCNT), IEEE, Tiruchengode, India, pp 1–5 Samlinson E, Usha M (2013) User-centric trust based identity as a service for federated cloud environment. In: 4th International Conference on Computing, Communications and Networking Technologies (ICCCNT), IEEE, Tiruchengode, India, pp 1–5
40.
Zurück zum Zitat Jaiganesh M, Aarthi M, Kumar AVA (2015) Fuzzy ART-based user behavior trust in cloud computing. In: Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, Springer, New Delhi, pp 341–348 Jaiganesh M, Aarthi M, Kumar AVA (2015) Fuzzy ART-based user behavior trust in cloud computing. In: Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, Springer, New Delhi, pp 341–348
41.
Zurück zum Zitat Jabbar S, Naseer K, Gohar M, Rho S, Chang H (2016) Trust model at service layer of cloud computing for educational institutes. J Supercomput 72(1):58–83CrossRef Jabbar S, Naseer K, Gohar M, Rho S, Chang H (2016) Trust model at service layer of cloud computing for educational institutes. J Supercomput 72(1):58–83CrossRef
42.
Zurück zum Zitat Noor TH, Sheng QZ, Yao L, Dustdar S, Ngu AH (2016) CloudArmor: supporting reputation-based trust management for cloud services. IEEE Trans Parallel Distrib Syst 27:367–380CrossRef Noor TH, Sheng QZ, Yao L, Dustdar S, Ngu AH (2016) CloudArmor: supporting reputation-based trust management for cloud services. IEEE Trans Parallel Distrib Syst 27:367–380CrossRef
43.
Zurück zum Zitat Chahal RK, Singh S (2016) Fuzzy rule-based expert system for determining trustworthiness of cloud service providers. Int J Fuzzy Syst 19(2):338–354CrossRef Chahal RK, Singh S (2016) Fuzzy rule-based expert system for determining trustworthiness of cloud service providers. Int J Fuzzy Syst 19(2):338–354CrossRef
44.
Zurück zum Zitat Selvaraj A, Sundararajan S (2017) Evidence-based trust evaluation system for cloud services using fuzzy logic. Int J Fuzzy Syst 19(2):329–337CrossRef Selvaraj A, Sundararajan S (2017) Evidence-based trust evaluation system for cloud services using fuzzy logic. Int J Fuzzy Syst 19(2):329–337CrossRef
Metadaten
Titel
A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments
verfasst von
Heba Kurdi
Auhood Alfaries
Abeer Al-Anazi
Sara Alkharji
Maimona Addegaither
Lina Altoaimy
Syed Hassan Ahmed
Publikationsdatum
26.10.2018
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 7/2019
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-018-2669-y

Weitere Artikel der Ausgabe 7/2019

The Journal of Supercomputing 7/2019 Zur Ausgabe