Skip to main content
Log in

A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The interconnected cloud computing paradigm is gaining considerable attention as a fundamental emerging model of cloud computing. It allows a wide range of interactions and collaborations across multiple service providers. Despite the potential advantages of interconnected clouds, establishing trust among participating parties is a challenging issue. In this paper, we introduce a lightweight trust management algorithm based on subjective logic (InterTrust) to promote trust in interconnected clouds. The experimental results demonstrate that InterTrust is capable of producing accurate trust information with significantly low execution time and high scalability compared to application of both the well-established trust management algorithm trust network analysis with subjective logic and no trust algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Firdhous M, Ghazali O, Hassan S (2011) A trust computing mechanism for cloud computing with multilevel thresholding. In: 6th International Conference on Industrial and Information Systems, IEEE, Kandy, Sri Lanka, pp 457–461

  2. Li X, Du J (2013) Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing. IET Inf Secur 7:39–50. https://doi.org/10.1049/iet-ifs.2012.0232

    Article  Google Scholar 

  3. Kanwal A, Masood R, Ghazia UE, Shibli MA, Abbasi AG (2013) Assessment criteria for trust models in cloud computing. In: IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing. IEEE, Beijing, China, pp 254–261

  4. Goyal MK, Aggarwal A, Gupta P, Kumar P (2012) QoS based trust management model for Cloud IaaS. In: 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, IEEE, Solan, India, pp 843–847

  5. Rochwerger B, Breitgand D, Levy E, Galis A, Nagin K, Llorente IM, Montero R, Wolfsthal Y, Elmroth E, Caceres J, Ben-Yehuda M, Emmerich W, Galan F (2009) The reservoir model and architecture for open federated cloud computing. IBM J Res Dev 53:1–4. https://doi.org/10.1147/JRD.2009.5429058

    Article  Google Scholar 

  6. Demchenko Y, Ngo C, Laat CD, Lee C (2014) Federated access control in heterogeneous intercloud environment: basic models and architecture patterns. In: IEEE International Conference on Cloud Engineering, IEEE, Boston, MA, USA, pp 439–445

  7. Habiba U, Masood R, Shibli MA (2015) Secure identity management system for federated cloud environment. In: Lee R (ed) Software engineering, artificial intelligence, networking and parallel/distributed computing. Springer, New York, pp 17–33

    Google Scholar 

  8. Keahey K, Tsugawa M, Matsunaga A, Fortes J (2009) Sky computing. IEEE Int Comput 13:43–51. https://doi.org/10.1109/MIC.2009.94

    Article  Google Scholar 

  9. Toosi AN, Calheiros RN, Buyya R (2014) Interconnected cloud computing environments: challenges, taxonomy, and survey. ACM Comput Surv 47:7. https://doi.org/10.1145/2593512

    Article  Google Scholar 

  10. Hu Z, Liu L, Wang C (2011) Organization domain trust evaluation model in federa environment based on subjective logic. In: International Conference on Information Technology, Computer Engineering and Management Sciences (ICM), IEEE, Nanjing, Jiangsu, China, pp 380–384

  11. Jøsang A (2001) A logic for uncertain probabilities. Int J Uncertain Fuzziness Knowl Based Syst 9:279–311. https://doi.org/10.1142/S0218488501000831

    Article  MathSciNet  MATH  Google Scholar 

  12. Jøsang A, Hayward R, Pope S (2006) Trust network analysis with subjective logic. In: Proceedings of the 29th Australasian Computer Science Conference. Australian Computer Society, Inc., Hobart, Australia, pp 85–94

  13. Alhadad N, Busnel Y, Serrano-Alvarado P, Lamarre P (2014) Trust evaluation of a system for an activity with subjective logic. In International Conference on Trust, Privacy and Security in Digital Business, Springer, Cham, pp 48–59

  14. Cardoso RC, Gomes AJ, Freire MM (2017) A user trust system for online games—part I: an activity theory approach for trust representation. IEEE Trans Comput Intell AI Games 9(3):305–320

    Article  Google Scholar 

  15. Chen F, Wang C, Cho JH (2017) Collective subjective logic: scalable uncertainty-based opinion inference. In: 2017 IEEE International Conference on Big Data (Big Data), IEEE, pp 7–16

  16. West AG, Kannan S, Lee I, Sokolsky O (2010) An evaluation framework for reputation management systems. In: Zheng Y (ed) Trust modeling and management in digital environments: from social concept to system development. Information science reference, Hershey, PA, USA, pp 282–308

  17. Biao C, Zhishu L, Yang C, Die F, Liangyang C (2009) Trust decision making in structured P2P network. In: International Conference on Communication Software and Networks, IEEE, Macau, China, pp 679–683

  18. Zhou R, Hwang K (2007) PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18:460–473. https://doi.org/10.1109/TPDS.2007.1021

    Article  Google Scholar 

  19. Hwang K, Fox GC, Dongarra JJ (2012) Distributed and cloud computing: from parallel processing to the internet of things. Morgan Kaufmann, New York

    Google Scholar 

  20. Lin Y-J, Yang H-W, Yang C-C, Lin W (2013) A traceable and fair transaction mechanism for digital rights management on P2P networks. J Int Technol 14:1043–1051

    Google Scholar 

  21. Firdhous M, Ghazali O, Hassan S, Harun NZ, Abas A (2011) Honey bee based trust management system for cloud computing. In: 3rd International Conference on Computing and Informatics. ICOCI, Bandung, Indonesia, paper no. 126

  22. Sato H, Kanai A, Tanimoto S (2010) A cloud trust model in a security aware cloud. In: 10th IEEE/IPSJ International Symposium on Applications and the Internet, IEEE, Seoul, South Korea, pp 121–124

  23. Wang T, Ye B, Li Y, Yang Y (2010) Family gene based cloud trust model. In: Educational and Network Technology (ICENT), IEEE, Qinhuangdao, China, pp 540–544

  24. Jøsang A, Bhuiyan T (2008) Optimal trust network analysis with subjective logic. In: 2nd International Conference on Emerging Security Information, Systems and Technologies, IEEE, Cap Esterel, France, pp 179–184

  25. Bhuiyan T, Josang A, Xu Y (2010) Trust and reputation management in web-based social network. In: Web Intelligence and Intelligent Agents, InTech, Croatia, pp 207–232

  26. Ma X, Wang Z, Liu F, Bian J (2010) A trust model based on the extended subjective logic for P2P networks. In: 2nd International Conference on e-Business and Information System Security, IEEE, Wuhan, China, pp 1–4

  27. Dillon T, Wu C, Chang E (2010) Cloud computing: issues and challenges. In: 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), IEEE, Perth, WA, Australia, pp 27–33

  28. Habib SM, Ries S, Muhlhauser M (2010) Cloud computing landscape and research challenges regarding trust and reputation. In: 7th International Conference on Ubiquitous Intelligence and Computing and 7th International Conference on Autonomic and Trusted Computing, IEEE, Xian, Shaanxi, China, pp 410–415

  29. Li W, Ping L, Pan X (2010) Use trust management module to achieve effective security mechanisms in cloud environment. In: International Conference on Electronics and Information Engineering, IEEE, Kyoto, Japan, pp V1-14–V11-19

  30. Habib SM, Ries S, Muhlhauser M (2011) Towards a trust management system for cloud computing. In: 10th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE Changsha, China, pp 933–939

  31. Fan W, Perros H (2013) A reliability-based trust management mechanism for cloud services. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) IEEE, Melbourne, VIC, Australia, pp 1581–1586

  32. Muchahari MK, Sinha SK (2012) A new trust management architecture for cloud computing environment. In: International Symposium on Cloud and Services Computing, IEEE, Mangalore, India, pp 136–140

  33. Chiluka N, Andrade N, Gkorou D, Pouwelse J (2012) Personalizing eigentrust in the face of communities and centrality attack. In: 26th International Conference on Advanced Information Networking and Applications, IEEE, Fukuoka, Japan, pp 503–510

  34. Shvachko K, Kuang H, Radia S, Chansler R (2010) The hadoop distributed file system. In: 26th Symposium on Mass Storage Systems and Technologies (MSST), IEEE, Incline Village, NV, USA, pp 1–10

  35. Rao S, Wang Y, Tao XL (2010) The comprehensive trust model in P2P based on improved eigentrust algorithm. In: International Conference on Measuring Technology and Mechatronics Automation, IEEE, Changsha City, China, pp 822–825

  36. Khan SM, Hamlen KW (2012) Hatman: intra-cloud trust management for hadoop. In: 5th International Conference on Cloud Computing, IEEE, Honolulu, HI, USA, pp 494–501

  37. Nishikawa T, Fujita S (2010) An effective risk avoidance scheme for the eigentrust reputation management system. In: 1st International Conference on Networking and Computing, IEEE, Higashi-Hiroshima, Japan, pp 36–43

  38. Abrams Z, Mcgrew R, Plotkin S (2005) A non-manipulable trust system based on eigentrust. ACM SIGecom Exch 5:21–30

    Article  Google Scholar 

  39. Samlinson E, Usha M (2013) User-centric trust based identity as a service for federated cloud environment. In: 4th International Conference on Computing, Communications and Networking Technologies (ICCCNT), IEEE, Tiruchengode, India, pp 1–5

  40. Jaiganesh M, Aarthi M, Kumar AVA (2015) Fuzzy ART-based user behavior trust in cloud computing. In: Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, Springer, New Delhi, pp 341–348

  41. Jabbar S, Naseer K, Gohar M, Rho S, Chang H (2016) Trust model at service layer of cloud computing for educational institutes. J Supercomput 72(1):58–83

    Article  Google Scholar 

  42. Noor TH, Sheng QZ, Yao L, Dustdar S, Ngu AH (2016) CloudArmor: supporting reputation-based trust management for cloud services. IEEE Trans Parallel Distrib Syst 27:367–380

    Article  Google Scholar 

  43. Chahal RK, Singh S (2016) Fuzzy rule-based expert system for determining trustworthiness of cloud service providers. Int J Fuzzy Syst 19(2):338–354

    Article  Google Scholar 

  44. Selvaraj A, Sundararajan S (2017) Evidence-based trust evaluation system for cloud services using fuzzy logic. Int J Fuzzy Syst 19(2):329–337

    Article  Google Scholar 

Download references

Acknowledgements

The authors thank the Deanship of Scientific Research at King Saud University for funding this work through research Group No. RG-1438-002.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Heba Kurdi.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kurdi, H., Alfaries, A., Al-Anazi, A. et al. A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments. J Supercomput 75, 3534–3554 (2019). https://doi.org/10.1007/s11227-018-2669-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-018-2669-y

Keywords

Navigation