2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 2013
DOI: 10.1109/trustcom.2013.194
|View full text |Cite
|
Sign up to set email alerts
|

A Reliability-Based Trust Management Mechanism for Cloud Services

Abstract: With the increasing demand for cloud services, trust management has become a challenging and important issue in a cloud computing environment. In a trust management mechanism, trust feedback is used to derive trust evaluation results. However, the reliability of the trust feedback from cloud service users needs to be considered, because unreliable trust feedback can produce wrong trust results. In this paper, we first propose a trust management framework for cloud computing environments, and then we introduce … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 25 publications
0
8
0
Order By: Relevance
“…It lacks a process for differentiating between possible users and the recommended action to be taken on SLA formation and violation. Fan and Perros [28] differentiated between biased and unbiased feedback based on the familiarity and consistency of the feedback. They proposed a trust value range and ranked users based on that value.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It lacks a process for differentiating between possible users and the recommended action to be taken on SLA formation and violation. Fan and Perros [28] differentiated between biased and unbiased feedback based on the familiarity and consistency of the feedback. They proposed a trust value range and ranked users based on that value.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Reputation, or trustworthiness, is a key element in SLA management as it assists in the selection of a reliable service provider [14] [35]. The literature proposes techniques with which a consumer can score the reliability of a provider [14,[36][37][38] using approaches like the IP-based method [39], adaptive credibility model [40] and trust management model [36]. Approaches in this class are discussed in Section 5.…”
Section: Trust Model-based Approachesmentioning
confidence: 99%
“…Self-adaptation allows both the data collector and the infrastructure monitoring service to adjust resources or monitor time intervals. The IaaS monitoring layer is based on low-level information and related metrics; however, the authors of [36] do not describe those metrics. Self-adaptation depends on customized policies with the help of experts, but these policy functionalities are integrated with the monitoring module which does not provide flexibility or a user friendly policy enforcement mechanism.…”
Section: Accepted Manuscriptmentioning
confidence: 99%
See 1 more Smart Citation
“…Authors [23] proposed HITCloud model to handle some of the security issues of the cloud like data integrity, privacy using a feedback mechanism. The feedback from users will be filtered according to their reliability and accuracy of accomplishment, which in turn will be calculated based on node trust and region trust.…”
Section: Copyright © 2016 Mecsmentioning
confidence: 99%