Browse > Article
http://dx.doi.org/10.3745/JIPS.03.0153

Service Oriented Cloud Computing Trusted Evaluation Model  

Jiao, Hongqiang (Information Engineering College, Handan College)
Wang, Xinxin (Art College, Hebei University of Science and Technology)
Ding, Wanning (Information Engineering College, Handan College)
Publication Information
Journal of Information Processing Systems / v.16, no.6, 2020 , pp. 1281-1292 More about this Journal
Abstract
More and more cloud computing services are being applied in various fields; however, it is difficult for users and cloud computing service platforms to establish trust among each other. The trust value cannot be measured accurately or effectively. To solve this problem, we design a service-oriented cloud trust assessment model using a cloud model. We also design a subjective preference weight allocation (SPWA) algorithm. A flexible weight model is advanced by combining SPWA with the entropy method. Aiming at the fuzziness and subjectivity of trust, the cloud model is used to measure the trust value of various cloud computing services. The SPWA algorithm is used to integrate each evaluation result to obtain the trust evaluation value of the entire cloud service provider.
Keywords
Cloud Computing; Subjective Weight; Trust Evaluation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Huang and D. M. Nicol, "Trust mechanisms for cloud computing," Journal of Cloud Computing, vol. 2, article no. 9, 2013.
2 P. Manuel, "A trust model of cloud computing based on Quality of Service," Annals of Operations Research, vol. 233, no. 1, pp. 281-292, 2015.   DOI
3 R. Z. Du, J. F. Tian, and H. G. Zhang, "Cloud service selection model based on trust and personality preferences," Journal of Zhejiang University (Engineering Science), vol. 47, no. 1, pp. 53-61, 2013.
4 Z. Yang, X. Qin, Y. Yang, and T. Yagink, "A hybrid trust service architecture for cloud computing," in Proceedings of 2013 International Conference on Computer Sciences and Applications, Wuhan, China, 2013, pp. 674-680.
5 C. Li, S. Wang, L. Kang, L. Guo, and Y. Cao, "Trust evaluation model of cloud manufacturing service platform," The International Journal of Advanced Manufacturing Technology, vol. 75, no. 1-4, pp. 489-501, 2014.   DOI
6 U. A. Kashif, Z. A. Memon, A. R. Balouch, and J. A. Chandio, "Distributed trust protocol for IaaS cloud computing," in Proceedings of 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, 2015, pp. 275-279.
7 M. Chiregi, and N. J. Navimipour, "A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll entities," Computers in Human Behavior, vol. 60, pp. 280-292, 2016.   DOI
8 R. K. Chahal and S. Singh, "Fuzzy rule-based expert system for determining trustworthiness of cloud service providers," International Journal of Fuzzy Systems, vol. 19, no. 2, pp. 338-354, 2017.   DOI
9 T. Lynn, L. van der Werff, G. Hunt, and P. Healy, "Development of a cloud trust label: a Delphi approach," Journal of Computer Information Systems, vol. 56, no. 23, pp. 185-193, 2016.   DOI
10 A. Selvaraj and S. Sundararajan, "Evidence-based trust evaluation system for cloud services using fuzzy logic," International Journal of Fuzzy Systems, vol. 19, no. 2, pp. 329-337, 2017.   DOI
11 J. Sidhu and S. Singh, "Improved topsis method based trust evaluation framework for determining trustworthiness of cloud service providers," Journal of Grid Computing, vol. 15, no. 1, pp. 81-105, 2017.   DOI
12 M. Tang, X. Dai, J. Liu, and J. Chen, "Towards a trust evaluation middleware for cloud service selection," Future Generation Computer Systems, vol. 74, pp. 302-312, 2017.   DOI
13 S. Singh and J. Sidhu, "Compliance-based multi-dimensional trust evaluation system for determining trustworthiness of cloud service providers," Future Generation Computer Systems, vol. 67, pp. 109-132, 2017.   DOI
14 Y. Wang, J. Wen, X. Wang, and W. Zhou, "Cloud service evaluation model based on trust and privacy-aware," Optik, vol. 134, pp. 269-279, 2017.   DOI
15 N. Somu, G. R. MR, K. Kirthivasan, and S. S. VS, "A trust centric optimal service ranking approach for cloud service selection," Future Generation Computer Systems, vol. 86, pp. 234-252, 2018.   DOI
16 M. Alhanahnah, P. Bertok, Z. Tari, and S. Alouneh, "Context-aware multifaceted trust framework for evaluating trustworthiness of cloud providers," Future Generation Computer Systems, vol. 79, pp. 488-499, 2018.   DOI
17 M. B. Smithamol and S. Rajeswari, "TMM: trust management middleware for cloud service selection by prioritization," Journal of Network and Systems Management, vol. 27, no. 1, pp. 66-92, 2019.   DOI
18 D. Li, H. Meng, and X. Sui, "Membership clouds and membership cloud generators," Computer Research and Development, vol. 32, no. 6, pp. 15-20, 1995.
19 X. Y. Meng, G. W. Zhang, C. Y. Liu, J. C. Kang, and H. S. Li, "Research on subjective trust management model based on cloud model," Journal of System Simulation, vol. 19, no. 14, pp. 3310-3317, 2007.
20 H. Chen and B. Li, "Approach to uncertain reasoning based on cloud model," Journal of Chinese Computer Systems, vol. 32, no. 12, pp. 2449-2455, 2011.
21 G. W. Zhang, D. Y. Li, P. Li, J. C. Kang, and G. S. Chen, "A collaborative filtering recommendation algorithm based on cloud model," Journal of Software, vol. 18, no. 10, pp. 2403-2411, 2007.   DOI
22 G. Qiang and Y. M. Bi, "Effectiveness evaluation of command of missile information war based on cloud model," Command Control & Simulation, vol. 30, no. 4, pp. 61-64, 2008.   DOI
23 J. Tian, H. Jiao, B. Wang, and C. Chen, "An e-commerce trust model based on expanded subjective logic," International Journal of High Performance Computing and Networking, vol. 9, no. 5-6, pp. 372-381, 2016.   DOI
24 Y. Du, Z. Song, and D. Li, "Mining association rules based on cloud model," Journal of PLA University of Science and Technology, vol. 1, no. 1, pp. 29-34, 2000.   DOI
25 L. M. Vaquero, L. Rodero-Merino, and D. Moran, "Locking the sky: a survey on IaaS cloud security," Computing, vol. 91, no. 1, pp. 93-118, 2011.   DOI
26 M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, et al., "A view of cloud computing," Communications of the ACM, vol. 53, no.4, pp. 50-58, 2010.   DOI
27 D. G. Feng, M. Zhang, Y. Zhang, and Z. Xu, "Study on cloud computing security," Journal of Software, vol. 22, no. 1, pp. 71-83, 2011.   DOI
28 Q. Xie, J. Wu, G. Wang, W. Liu, D. Chen, and X. Yu, "Provably secure authentication protocol based on convertible proxy signcryption in cloud computing," Scientia Sinica Informationis, vol. 42, no. 3, pp. 303-313, 2012.   DOI
29 K. Hashizume, D. G. Rosado, E. Fernandez-Medina, and E. B. Fernandez, "An analysis of security issues for cloud computing," Journal of Internet Services and Applications, vol. 4, article no. 5, 2013.
30 C. Lin, W. B. Su, K. Meng, Q. Liu, and W. D. Liu, "Cloud computing security: architecture, mechanism and modeling," Chinese Journal of Computers, vol. 36, no. 9, pp. 1765-1784, 2013.   DOI