A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net

Authors

1 Master, Mazandaran University of Science and Technology, Behshahr, Iran

2 Associate Professor, Faculty of Computer Science, Islamic Azad University, Sari Branch, Sari, Iran

3 Assistant Professor, University of Science and Technology, Tehran, Iran

Abstract

Trust brings a novel means to improve the security and enable interoperability of current heterogeneous independent cloud platforms. In fact, trust is the most complex relationship among entities, because it is extremely subjective, context-dependant, non-symmetric, uncertain, partially transitive, and difficult to evaluate and establish. In the cloud environment, however, entities potentiallyinitiate transactions with each other without having had prior contacts. However, there  is  no  special  trust  evaluation  model  for a  cloud  computing  environment. This paper,  presents  a  trust  model  based  on  fuzzy  logic  and  fuzzy  mathematics  in  cloud computing  environment  according  to  success  and  failure  interaction  between cloud entities based on the properties and semantics of trust. To compute trust in cloud systems, an algorithm based on proposed model is given and also, we designed the proposed moded with petri net. Simulation results show that the proposed model has some identification and containment capability in synergies cheating, malicious entities identification, promotes interaction between entities, and improves the performance of the entire cloud environment.
 

Keywords


[1]         S. M. Habib, S. Hauke, and S. Ries, “Trust as a facilitator in cloud computing a survey,” Journal of Cloud Computing: Advances, Systems and Applications, 1:19, 2012.##
[2]         J. Huang and D. M. Nl, “Trust mechanisms for cloud computing,” Journal of Cloud Computing: Springer open Journal Advances, Systems and Applications, 2:9, 2013.##
[3]         H. Kim, H. Lee, W. Kim, and Y. Kim, “A Trust Evaluation Model for QoS Guarantee in Cloud Systems,” International Journal of Grid and Distributed Computing, vol. 3, no. 1, March 2010.##
[4]         J. Abawajy, “Establishing Trust in Hybrid Cloud Computing Environments,” IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communication, pp.   118-125, Changsha, 2011.##
[5]         D. Sun, G. Chang, L. Sun, F. Li, and X. Wang, “A dynamic multi-dimensional trust evaluation model to enhance security of cloud computing environments,” Int. J. Innovative Computing and Applications, vol. 3, no. 4, 2011.##
[6]         Z. X. ZHOU, H. XU, and S. P. WANG, “A Novel Weighted Trust Model based on Cloud,” Advances in Information Sciences and Service Sciences, vol. 3, no. 3, April 2011.##
[7]         D. A. D'Melloa and V. S. Ananthanarayana, “Dynamic Selection Mechanism for Quality of Service Aware Web Services,” Journal of Enterprise Information Systems, vol. 4, no. 1, pp. 23-60, USA, 2010.##
[8]         X. S. Wang, X. Q. Wen, and D. Liu, “Trust Model Based on Cloud Theory in Pervasive Environment,” Computer Engineering, vol. 36, no. 7, pp. 282-284, 2010.##
[9]         Z. Yang, L. Qiao, C. Liu, C. Wan, “A Collaborative Trust Model Of Firewall Through Based On Cloud Computing,” 14th International Conference On Computer Supported Cooperative Work In Design (CSCWD), pp. 329-334, Shanghai, China, 2010.##
[10]         S. X. Wang, L. Zhang, and H. S. Li, “Evaluation Approach of Subjective Trust Based on Cloud Model,” Journal of Software, vol. 21, no. 6, pp. 1341-1352, 2010.##
[11]         A. J. Bidgoly and B. T. Ladani, “Trust Modeling and Verification Using Colored Petri Nets,” 2011 8th International ISC Conference on Information Security and Cryptology (ISCISC), September  2011.##
[12]         N. Griffiths, K. M. Chao, and M. Younas, “Fuzzy trust for peer-to-peer systems,” in: ICDCSW Workshops 2006, 26th IEEE International Conference on Distributed Computing Systems Workshops 2006, pp. 73–73, July 2006.##
[13]         Q. J. Sun and F. P. Zeng, “Trust Model Based on Reputation and Cloud Model in P2P Environment,” Mini-micro Systems, vol. 31, no. 7, pp. 1328-1332, 2010.##
[14]         J. Luo, X. Liu, and M. Fan, “A trust model based on fuzzy recommendation for mobile ad-hoc networks,” Journal of Computer Networks, Elsevier, pp. 2396–2407, 2009.##
[15]         H. Liao, Q. Wang, and G. Li, “A Fuzzy Logic-based Trust Model in Grid,” International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 608-614, 2009.##
[16]         W. Li and L. Ping, “Trust Model to Enhance Security and Interoperability of Cloud Environment,” Cloud Com 2009, LNCS 5931, pp. 69–79, 2009.##
[17]         D. Kovac and D. Trcek, “Qualitative trust modeling in SOA,” Journal of Systems Architecture, vol. 55, pp. 255–263, 2009.##
[18]         Z. Shuqin, L. Dongxin, and Y. Yongtian, “A Fuzzy Set Based Trust and Reputation Model in P2P Networks,” IDEAL 2004, LNCS 3177, pp. 211–217, 2004.##
[19]         X. Wang, P. Liang, H. Ma, D. Xing, and B. Wang, “A P2P Trust Model Based on Multi-Dimensional Trust Evaluation,” LSMS 2007, LNCS 4688, pp. 347–356, 2007.##
[20]         J. Li, X. Wang, B. Liu, Q. Wang, and G. Zhang, “A reputation management scheme based on global trust model for peer-to-peer virtual communities,” in: WAIM, pp. 205–216, 2006.##
[21]         L. Jing-Tao, J. Yi-Nan, X. Xiao-Chun, W. Xue-Ping, and Z. Gen-Du, “A trust model based on similarity-weighted recommendation for p2p environments,” Mob. Netw. Appl., vol. 18, no. 1, pp. 157–167, 2007.##
[22]         B. Sarwar, G. Karypis, J. Konstan, and J. Riedl,    “Item-Based Collaborative Filtering Recommendation Algorithms,” WWW10, May 1-5, Hong Kong, ACM 1-58113-348-0/01/0005 , 2001.##
[23]         R. Buyya, R. Ranjan, and R. N. Calheiros, “Modeling and simulation of scalable cloud computing environments and the Clouds toolkit: challenges and opportunities,’ Proceedings of the 2009 International Conference on High Performance Computing & Simulation, (HPCS 2009), pp. 1–11, June 2009.##
W. J. Guojun Wang and J. Wu, “Generating trusted graphs for trust evaluation in online social networks Future Generation Computer Systems,” 2012##
  • Receive Date: 16 February 2015
  • Revise Date: 12 August 2020
  • Accept Date: 19 September 2018
  • Publish Date: 20 April 2016