2020
DOI: 10.1016/j.future.2019.12.045
|View full text |Cite
|
Sign up to set email alerts
|

A two-way trust management system for fog computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 73 publications
(29 citation statements)
references
References 60 publications
0
29
0
Order By: Relevance
“…Overall indirect trust can be obtained by applying discounting and consensus operators together on the received recommendations as subjective trust [65]. Suppose a Fog node has a list of recommenders and has trust values about them at time t as T t i,r1 , T t i,r2 , .…”
Section: Evolving Trust Using Subjective Logicmentioning
confidence: 99%
See 1 more Smart Citation
“…Overall indirect trust can be obtained by applying discounting and consensus operators together on the received recommendations as subjective trust [65]. Suppose a Fog node has a list of recommenders and has trust values about them at time t as T t i,r1 , T t i,r2 , .…”
Section: Evolving Trust Using Subjective Logicmentioning
confidence: 99%
“…It is not feasible for an evaluator node to identify all related trust metrics to assess another node’s trust value, and this will lead to the fact that the trust is calculated with insufficient evidence [ 62 , 63 ]. The subjective logic is suggested to be the most appropriate for modeling trust in the fog computing environment [ 64 , 65 ] as each node computes another node’s trust value it encounters subjectively. Subjective logic utilizes opinions as input and output variables.…”
Section: Trust Model Mappingmentioning
confidence: 99%
“…The scheme countermeasures the malicious nodes which aim to degrade the network by spreading false and forged data. Alemneh et al [19] propose a TMS where both service requester and service provider can evaluate each other's reliability prior to any interaction. The trust model is based on subjective logic and mitigates malicious nodes' behaviour to manipulate the trust results.…”
Section: Trust Modelsmentioning
confidence: 99%
“…Authors have provided some recommendations that can help in addressing, at least partially, the issue of trust in the Fog environment such as using blockchain technology to maintain the log files, which has the records of events and messages exchanging in Fog nodes in a distributed way. 84,[106][107][108][109][110][111] So, if a Fog node misbehaves, other trusted nodes can discover that. In other words, using Blockchain can enable a trustworthy IoT-Fog-Cloud architecture.…”
Section: Trust Managementmentioning
confidence: 99%