A Trust Evaluation Model for Cloud Computing Using Bayesian Network

Document Type : Original Article

Authors

1 PhD student, Miyaneh Branch, Islamic Azad University, Miyaneh, Iran

2 Professor, Miyaneh Branch, Islamic Azad University, Miyaneh, Iran

3 Assistant Professor, Miyaneh Branch, Islamic Azad University, Miyaneh, Iran

Abstract

In recent years, cloud computing has attracted much attention as a new computing model for providing infrastructure, platform, and software as a service. There is an important challenge in trust management between cloud providers, service providers, and service applicants due to the industry's rapid adaptation of cloud computing. Trust management has become very challenging in cloud computing since cloud service applicants need to choose effective, reliable, and low-risk services. One of the most important factors, which can be considered in the applicant's trust or distrust of service, is the various parameters of service. Therefore, it is necessary to use approaches to evaluate the trust of the cloud services considering their service quality parameters and their identified performance requirements. In this paper, a model is introduced to evaluate the trust for the cloud services using Bayesian network. Since the trust actually deals with probabilities, and the Bayesian network also uses probabilities to solve the problems, the Bayesian network can be used to assess the trust. The proposed method is compared with various data mining techniques to assess trust in cloud services. The results show that the accuracy, absolute error, root mean square error, and square error in the Bayesian network are 94/53, 0/037, 0/137, and 0/038, respectively. The proposed method is more efficient than different data mining techniques for trust assessment in cloud services.

Keywords


Smiley face

[1] ‏M. Armbrust, & et al., "A view of cloud computing," Commun. ACM., vol. 53., no. 4, pp. 50-58, 2010. 
[2] P. Mell & T. Grance, "The NIST definition of cloud computing", 2011.
[3] T. H. Noor, Q. Z. Sheng, & A. Bouguettaya, "Trust Management in Cloud Services," Springer, 2014.
[4] Y. Fu, Z. Hu, & Q. Zhang, "Bayesian Network based QoS Trustworthiness Evaluation Method in Service Oriented Grid," in Proceedings of the The 9th International Conference for Young Computer Scientists, pp. 293-298, 2008.
[5] S. Rizvi, K. Karpinski, B. Kelly, & T. Walker, "Utilizing Third Party Auditing to Manage Trust in the Cloud," Procedia Comput. Sci., vol. 61, pp. 191-197, 2015.
[6] A. Mani & A. Nagarajan, "Understanding quality of service for Web services," IBM Dev, 2002.
[7] D. Trabay, A. Asem, I. El-Henawy, & W. Gharibi, "A hybrid technique for evaluating the trust of cloud services," International Journal of Information Technology, vol. 13, pp. 687-695, 2021.
[8] Kefeng Liu, Lizhi Yang, & Ming Li, "Application of Cloud Model and Bayesian Network to Piracy Risk Assessment," Hindawi Mathematical  Problems in Engineering," vol. 202, 2021. 
[9] A Selvaraj, & S Sundararajan, "Dynamic Multi Attribute Trust Evaluation System for IaaS  Services," in International Journal of Applied Science and Engineering, vol. 17, no. 1, pp. 1-10, 2020.
[10] Y. Wang, S. Chandrasekhar, M. Singhal, & J. Ma, "A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing," Cluster Comput, vol. 19, no. 2, pp. 647-662, 2016.
[11] S. S. Yau, Y. Yao, & A. B. Buduru, "An adaptable distributed trust management framework for large-scale secure service-based systems," Computing, vol. 96, no. 10, pp. 925-949, 2014.
[12] D. Manuel, S. T. Selvi, & M. I. Abd-El Barr, "Trust management system for grid and cloud resources," in Advanced Computing, 2009. ICAC 2009. First International Conference on, Chennai India, pp. 176-181, 2009.
[13] M. Li, S. Yu, N. Cao, & W. Lou, "Authorized private keyword search over encrypted data in cloud computing," in Distributed Computing Systems (ICDCS), 31st International Conference on, pp. 383-392, 2011.
[14] P. Zhang & Z. Yan, "A QoS-aware system for mobile cloud computing," in Cloud Computing and Intelligence Systems (CCIS), IEEE International Conference on, Beijing, China, pp. 518-522, 2011.
[15] M. Chiregi, & N.J. Navimipour, "Trusted services identification in the cloud environment using the topological metrics," Karbala Int. J. Mod. Sci. 2, pp. 203-210, 2016.
[16] S.K. Chong, J. Abawajy, M. Ahmad, & I.R.A. Hamid, "Enhancing Trust Management in Cloud Environment," Procedia - Soc. Behav. Sci. 129, pp. 314-321, 2014.
[17] X. Wu, R. Zhang, B. Zeng, & S. Zhou, "A Trust Evaluation Model for Cloud Computing," Procedia Comput. vol. 17, pp.1170–1177, 2013.
[18] V. Hosseinnezhad, & A. A. pourhaji kazem, "Bayesian Networks Based Trust Model in Social Networks", Scientific Journal of Electronic and Cyber Defense, Vol. 6, No. 2, 2018. (In Persian)
[19] CloudArmmor Prohect Web Site, URL: https://cs.adelaide.edu.au/~cloudarmor/ds.html.
  • Receive Date: 01 February 2022
  • Revise Date: 21 April 2022
  • Accept Date: 09 August 2022
  • Publish Date: 21 January 2023