Abstract
Managing trust in cloud environments is emerging as an important issue in recent years. The highly dynamic, distributed, and non-transparent nature of cloud services makes the trust management of these services difficult. Malicious users may collude to give multiple misleading trust feedback to disadvantage a cloud service, or create several accounts and then leave misleading trust feedback to trick users into trusting cloud services that are not actually trustworthy. In this paper, we propose techniques enabling the identification of fake trust feedbacks and thus provide significant improvement on trust management in cloud environments. In particular, we introduce a credibility model that not only identifies credible trust feedbacks from fake ones, but also preserves the privacy of cloud service consumers. The techniques have been validated by a prototype system implementation and experimental studies.
Keywords
References
Akwagyiram, A.: How Do You Catch Online Auction Cheats? The British Broadcasting Corporation News (BBC) (July 2010), http://www.bbc.co.uk/news/10494724 (accessed May 16, 2012)
Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A View of Cloud Computing. Communications of the ACM 53(4), 50–58 (2010)
Ba, S., Pavlou, P.: Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior. MIS Quarterly 26(3), 243–268 (2002)
Bertino, E., Paci, F., Ferrini, R., Shang, N.: Privacy-preserving Digital Identity Management for Cloud Computing. IEEE Data Eng. Bull. 32(1), 21–27 (2009)
Brandic, I., Dustdar, S., Anstett, T., Schumm, D., Leymann, F., Konrad, R.: Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds. In: Proc. of CLOUD 2010, Miami, Florida, USA (July 2010)
Conner, W., Iyengar, A., Mikalsen, T., Rouvellou, I., Nahrstedt, K.: A Trust Management Framework for Service-Oriented Environments. In: Proc. of WWW 2009, Madrid, Spain (April 2009)
David, O., Jaquet, C.: Trust and Identification in the Light of Virtual Persons (June 2009), http://www.fidis.net/resources/deliverables/identity-of-identity/ (accessed May 10, 2012)
Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Friedman, E., Resnick, P., Sami, R.: Manipulation-Resistant Reputation Systems. In: Algorithmic Game Theory, pp. 677–697. Cambridge University Press, New York, USA (2007)
Hwang, K., Li, D.: Trusted Cloud Computing with Secure Resources and Data Coloring. IEEE Internet Computing 14(5), 14–22 (2010)
Lai, K., Feldman, M., Stoica, I., Chuang, J.: Incentives for Cooperation in Peer-to-Peer Networks. In: Proc. of the 1st Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, USA (June 2003)
Malik, Z., Bouguettaya, A.: RATEWeb: Reputation Assessment for Trust Establishment Among Web Services. The VLDB Journal 18(4), 885–911 (2009)
Massa, P., Avesani, P.: Trust Metrics in Recommender Systems. In: Computing with Social Trust. Human-Computer Interaction Series. Springer
Noor, T.H., Sheng, Q.Z.: Trust as a Service: A Framework for Trust Management in Cloud Environments. In: Bouguettaya, A., Hauswirth, M., Liu, L. (eds.) WISE 2011. LNCS, vol. 6997, pp. 314–321. Springer, Heidelberg (2011)
Pearson, S., Benameur, A.: Privacy, Security and Trust Issues Arising From Cloud Computing. In: Proc. of CloudCom 2010, Indianapolis, Indiana, USA (November-December 2010)
Xiong, L., Liu, L.: Peertrust: Supporting Reputation-based Trust for Peer-to-Peer Electronic Communities. IEEE TKDE 16(7), 843–857 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Noor, T.H., Sheng, Q.Z., Alfazi, A., Law, J., Ngu, A.H.H. (2013). Identifying Fake Feedback for Effective Trust Management in Cloud Environments. In: Ghose, A., et al. Service-Oriented Computing - ICSOC 2012 Workshops. ICSOC 2012. Lecture Notes in Computer Science, vol 7759. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37804-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-37804-1_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37803-4
Online ISBN: 978-3-642-37804-1
eBook Packages: Computer ScienceComputer Science (R0)