Abstract
As a flexible security mechanism, trust mechanism is widely used in various complex application scenarios. The research on trust and its spread mechanism has become a new hotspot in the fields of E-commerce, Internet of things and Cloud computing. In this paper, we first deeply analyzed the relationship between trust mechanism and cloud computing security, and pointed out the existing problems of current models. We then surveyed some typical trust mechanism according to different mathematic theories of trust computation. We also summarized the latest research achievements of trust model and trust calculation method in cloud computing environment. Based on these studies, we forecasted the direction of further research on trust mechanism.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mell, P., Grance, T.: The NIST definition of cloud computing. Nat. Inst. Stand. Technol. 53, 50 (2009)
Chuang, L., Wen-Bo, S.: Cloud Computing Security: Architecture, Mechanism and Modeling. Chin. J. Comput. 36, 1765–1784 (2013) (in Chinese)
Almorsy, M., Grundy, J., Müller, I.: An analysis of the cloud computing security problem. In: Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30 November 2010
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)
Feng, D.G., Zhang, M., Zhang, Y., Zhen, X.U.: Study on cloud computing security. J. Softw. 22, 71–83 (2011)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International World Wide Web Conference, WWW 2003 (2003)
Kai, H., Zhou, R.: PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans. Parallel Distrib. Syst. 18, 460–473 (2007)
Li, X.: Liu, L.: PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16, 843–857 (2004)
Jun-Sheng, C., Huai-Ming, W.: DyTrust: A time-frame based dynamic trust model for P2P systems. Chin. J. Comput. 29, 1301–1307 (2006) (in Chinese)
Shao-Jie. W., Hong-Song, C.: An improved DyTrust trust model. J. Univ. Sci. Technol. Beijing, 30, 685–689 (2008) (in Chinese)
Zhi-Guo, Z., Qiong, C., Min-Sheng, T.: Trust model based on improved DyTrust in P2P network. Comput. Technol. Dev. 174–177 (2014) (in Chinese)
Despotovic, Z., Aberer, K.: Maximum likelihood estimation of peers; performance in P2P networks. In: The Second Workshop on the Economics of Peer-to-Peer Systems (2004)
Haller, J., Josang, A.: Dirichlet reputation systems. In: 2012 Seventh International Conference on Availability, Reliability and Security, 112–119 (2007)
Schmidt, S., Steele, R., Dillon, T.S., Chang, E.: Fuzzy trust evaluation and credibility development in multi-agent systems. Appl. Soft Comput. 7, 492–505 (2007)
Song, S., Kai, H., Zhou, R., Kwok, Y.K.: Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Comput. 2005, 24–34 (2005)
Javanmardi, S., Shojafar, M., Shariatmadari, S., Ahrabi, S.S.: FRTRUST: a fuzzy reputation based model for trust management in semantic P2p grids. Int. J. Grid Util. Comput. 6, (2014)
Tian, C., Yang, B.: A D-S evidence theory based fuzzy trust model in file-sharing P2P networks. Peer Peer Netw. Appl. 7, 332–345 (2014)
Kuter, U.: Using probabilistic confidence models for trust inference in web-based social networks. ACM Trans. Int. Technol. Toit Homepage 10, 890–895 (2010)
Tang, J., Lou, T., Kleinberg, J.: Inferring social ties across heterogeneous networks. In: WSDM 2012, 743–752 (2012)
Rettinger, A., Nickles, M., Tresp, V.: Statistical relational learning of trust. Mach. Learn. 82, 191–209 (2011)
Khiabani, H., Idris, N.B., Manan, J.L.A.: A Unified trust model for pervasive environments – simulation and analysis. KSII Trans. Int. Inf. Syst. (TIIS) 7, 1569–1584 (2013)
Liu, H., Lim, E.P., Lauw, H.W., Le, M.T., Sun, A., Srivastava, J., Kim, Y.A.: Predicting trusts among users of online communities: an epinions case study. In: Ec 2008 Proceedings of ACM Conference on Electronic Commerce, pp. 310–319 (2008)
Zolfaghar, K., Aghaie, A.: A syntactical approach for interpersonal trust prediction in social web applications: Combining contextual and structural data. Knowl. Based Syst. 26, 93–102 (2012)
Tang, J., Gao, H., Hu, X.: Exploiting homophily effect for trust prediction. In: Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, 53–62 (2013)
Ying, Wang, Xin, Wang, Wan-Li, Zuo: Trust prediction modeling based on social theories. J. Softw. 12, 2893–2904 (2014). (in Chinese)
Cruz, Z.B., Fernández-Alemán, J.L., Toval, A.: Security in cloud computing: a mapping study. Comput. Sci. Inf. Syst. 12, 161–184 (2015)
Zheng-Ji, Z., Li-Fa, W., Zheng, H.: Trust based trustworthiness attestation model of virtual machines for cloud computing. J. Southeast Univ. (Nat. Sci. Ed.) 45(1), 31–35 (2015) (in Chinese)
Tan, W., Sun, Y., Li, L.X., Lu, G.Z., Wang, T.: A trust service-oriented scheduling model for workflow applications in cloud computing. IEEE Syst. J. 8, 868–878 (2014)
Sidhu, J., Singh, S.: Peers feedback and compliance based trust computation for cloud computing. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, B. (eds.) Security in Computing and Communications, vol. 467, pp. 68–80. Springer, Heidelberg (2014)
Xiao-Lan, X., Liang, L., Peng, Z.: Trust model based on double incentive and deception detection for cloud computing. J. Electron. Inf. Technol. 34(4), 812–817 (2012) (in Chinese)
Jaiganesh, M., Aarthi, M., Kumar, A.V.A.: Fuzzy ART-based user behavior trust in cloud computing. In: Suresh, L.P., Dash, S.S., Panigrahi, B.K. (eds.) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, vol. 324, pp. 341–348. Springer, India (2015)
Yan-Xia, L., Li-Qin, T., Shan-Shan, S.: Trust evaluation and control analysis of FANP-based user behavior in cloud computing environment. Comput. Sci. 40, 132–135 (2013) (in Chinese)
Guo-Feng, S., Chang-Yong, L.: A security access control model based on user behavior trust under cloud environment. Chin. J. Manag. Sci. 52, 669–676 (2013) (in Chinese)
Acknowledgments
This work is supported by the China Aviation Science Foundation (NO. 20101952021) and the Fundamental Research Funds for the Central Universities (NO. NZ2013306).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Xu, J., Xu, F., Chang, W., Lai, H. (2015). Research and Development of Trust Mechanism in Cloud Computing. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds) Cloud Computing and Security. ICCCS 2015. Lecture Notes in Computer Science(), vol 9483. Springer, Cham. https://doi.org/10.1007/978-3-319-27051-7_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-27051-7_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27050-0
Online ISBN: 978-3-319-27051-7
eBook Packages: Computer ScienceComputer Science (R0)