Advertisement

International Journal of Fuzzy Systems

, Volume 18, Issue 4, pp 659–672 | Cite as

RETRACTED ARTICLE: A New Trust Evaluation Algorithm Between Cloud Entities Based on Fuzzy Mathematics

  • Ali MohsenzadehEmail author
  • Homayun Motameni
  • Meng Joo Er
Article

Abstract

High security of cloud computing is one of the most challenges to be addressed before the novel pas-as-you-go business paradigm is widely applied over the internet. Trust brings a novel means to improve the security and enable interoperability of current heterogeneous independent cloud platforms. However, there is no special trust evaluation model for cloud computing environment. Hence, this paper presents a new trust model based on fuzzy mathematics in cloud computing environment according to success and failure interaction between cloud entities based on the properties and semantics of trust. To compute trust in cloud systems, an algorithm based on proposed model is given. Simulation results show that the proposed model has some identification and containment capability in synergies cheating, promotes interaction between entities, and improves the performance of the entire cloud environment.

Keywords

Cloud computing Trust models Fuzzy mathematics Recommendation trust 

References

  1. 1.
    Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. J. Cloud Comput.: Syst. Appl. 2(9), 1–14 (2013)Google Scholar
  2. 2.
    Habib, S.M., Hauke, S., Ries, S., Muhlhauser, M.: Trust as a facilitator in cloud computing: a survey. J. Cloud Comput.: Adv., Syst. Appl. 1(19), 1–19 (2012)Google Scholar
  3. 3.
    Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)CrossRefGoogle Scholar
  4. 4.
    Khorshed, M.D.T., Shawkat Ali, A.B.M., Wasimi, S.A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. J. Future Gener. Comput. Syst. 28(6), 833–851 (2012)CrossRefGoogle Scholar
  5. 5.
    Sun, D., Chang, G., Sun, L., Wang, X.W.: Surveying and analyzing security, privacy and trust issues in cloud computing environments. J. Proced. Eng. 15, 2852–2856 (2011)CrossRefGoogle Scholar
  6. 6.
    Sun, D., Chang, G., Sun, L., Li, F., Wang, W.: A dynamic multi-dimensional trust evaluation model to enhance security of cloud computing environments. Int. J. Innov. Comput. Appl. 3(4), 200–212 (2011)CrossRefGoogle Scholar
  7. 7.
    Li, W., Ping, L.: Trust Model to Enhance Security and Interoperability of Cloud Environment, vol. 5931, pp. 69–79. Springer, New York (2009)Google Scholar
  8. 8.
    Bidgoly, AJ., TorK Ladani, B.: Trust Modeling and Verification Using Colored Petri Nets. 2011 8th International ISC Conference on Information Security and Cryptology (ISCISC), September 14–15, pp. 1–8 (2011)Google Scholar
  9. 9.
    Kovac, D., Trcek, D.: Qualitative trust modeling in SOA. J. Syst. Archit. 55(4), 255–263 (2009)CrossRefGoogle Scholar
  10. 10.
    Liao, H., Wang, Q., Li, G.: A Fuzzy Logic-based Trust Model in Grid. International Conference on Networks Security, Wireless Communications and Trusted Computing. pp. 608–614 (2009)Google Scholar
  11. 11.
    Yang, L., Gao, Y.: The Theory and Application of Fuzzy Mathematics, 3rd edn. The Press of South China University of Technology, Guangzhou (2001)Google Scholar
  12. 12.
    Rao, V.B.: C ++ Neural Networks and Fuzzy Logic. M&T Books, IDG Books Worldwide, Inc., Foster City (1995)Google Scholar
  13. 13.
    Piegat, A., Landowski, M.: Horizontal membership function and examples of its applications. Int. J. Fuzzy Syst. 17(1), 22–30 (2015)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Azzedin, F., Ridha, A., Rizvi, A.: Fuzzy trust for peer-to-peer based systems. Proceedings of World Academy of Science, Engineering and Technology PWASET. pp. 123–127 (2007)Google Scholar
  15. 15.
    Griffiths, N., Chao, K.M., Younas, M.: Fuzzy trust for peer-to-peer systems. 26th IEEE International Conference on Distributed Computing Systems Workshops, 04–07 July 2006, pp. 73–73 (2006)Google Scholar
  16. 16.
    Schmidt, S., Steele, R., Dillon, T.S., Chang, E.: Building a fuzzy trust network in unsupervised multi-agent environments. On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, vol 3762, pp. 816–825. (2005)Google Scholar
  17. 17.
    Luo, J., Liu, X., Fan, M.: A trust model based on fuzzy recommendation for mobile adhoc networks. J. Comput. Netw. 53(14), 2396–2407 (2009)CrossRefGoogle Scholar
  18. 18.
    Yu, F., Zhang, H., Yan, F.: A Fuzzy Relation Trust Model in P2P System. International Conference on Computational Intelligence and Security, 3–6 Nov, pp. 1497–1502 (2006)Google Scholar
  19. 19.
    Li, J., Wang, X., Liu, B., Wang, Q., Zhang, G.: A reputation management scheme based on global trust model for peer-to-peer virtual communities. Adv. Web-Age Inf. Manag. 4016, 205–216 (2006)Google Scholar
  20. 20.
    Li, J.T., Jing, Y.N., Xiao, X.C., Wang, X.P., Zhang, G.D.: A trust model based on similarity-weighted recommendation for p2p environments. J. Softw. 18(1), 157–167 (2007)CrossRefGoogle Scholar
  21. 21.
    Sarwar, B., Karypis, G., Konstan,J., Riedl, J.: Item-based collaborative filtering recommendation algorithms. Proceedings of the 10th international conference on World Wide Web., pp. 285–295 ACM (2001)Google Scholar
  22. 22.
    Zhang, S., Lu, D., Yang, Y.: A Fuzzy set based trust and reputation model in P2P networks. Intelligent Data Engineering and Automated Learning–IDEAL, vol 3177, pp. 211–217 (2004)Google Scholar
  23. 23.
    Wang, X., Liang, P., Ma, H., Xing, D., Wang, B.: A P2P trust model based on multi-dimensional trust evaluation. Bio-Inspir. Comput. Intell. Appl. 4688, 347–356 (2007)Google Scholar
  24. 24.
    Buyya, R., Ranjan, R., Calheiros, R.N.: Modeling and simulation of scalable cloud computing environments and the CloudSim toolkit: challenges and opportunities. Proceedings of the 2009 International Conference on High Performance Computing & Simulation, Leipzig, Germany. (HPCS 2009), June, pp. 1–11 (2009)Google Scholar
  25. 25.
    Jiang, W., Wang, G., Wu, J.: Generating trusted graphs for trust evaluation in online social networks. Future Gener. Comput. Syst. (FGCS) 31, 1–11 (2014)CrossRefGoogle Scholar

Copyright information

© Taiwan Fuzzy Systems Association and Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  • Ali Mohsenzadeh
    • 1
    Email author
  • Homayun Motameni
    • 2
  • Meng Joo Er
    • 3
  1. 1.Department of Computer EngineeringMazandaran University of Science and TechnologyBabolIran
  2. 2.Department of ComputerIslamic Azad UniversitySariIran
  3. 3.School of Electrical and Electronic EngineeringNanyang Technological UniversitySingaporeSingapore

Personalised recommendations