Browse > Article
http://dx.doi.org/10.3837/tiis.2017.04.001

A Method for Service Evaluation Based on Fuzzy Theory for Cloud Computing  

Guo, Liangmin (School of Mathematics and Computer Science, Anhui Normal University)
Luo, Yonglong (School of Mathematics and Computer Science, Anhui Normal University)
He, Xiaokang (School of Mathematics and Computer Science, Anhui Normal University)
Hu, Guiyin (School of Mathematics and Computer Science, Anhui Normal University)
Dong, Yan (School of Mathematics and Computer Science, Anhui Normal University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.11, no.4, 2017 , pp. 1820-1840 More about this Journal
Abstract
Aiming at the phenomenon of false information issued by service providers in cloud computing environment, a method for service evaluation based on fuzzy theory is put forward in this paper. According to the quality of services provided by cloud service providers and their behavior during interactions, a trust relationship between cloud service providers and cloud service consumers is established, which can be quantified by using fuzzy theory. The quality of services is evaluated by drawing on the trust relationship. In our method, the recommendation credibility of a cloud service consumer is determined through behavior similarity with evaluators and a praise factor. The introduction of the praise factor better suits the phenomenon of a high-quality service getting more repeat customers. The negative impact of dishonest customers is reduced, and the accuracy of trust and cloud service quality evaluation is improved by introducing a confidence factor that can be dynamically adjusted. The experimental results show that our method can effectively and accurately evaluate the trust value and service quality of providers, while weakening the influence of dishonest consumers, and quickly detect dishonest service providers. This is beneficial for consumers trying to find high quality service providers for similar services.
Keywords
Cloud service evaluation; trust; fuzzy theory; confidence factor;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Shanshan Song, Kai Hwang, Runfang Zhou, Yu-Kwong Kwok, "Trusted P2P transactions with fuzzy reputation aggregation," IEEE Internet Computing Magzine Special Issue on Security for P2P and AdHoc Networks, vol. 9, no. 6, pp. 24-34, 2005.
2 Tang Wen, Hu Jianbin, and Chen Zhong, "Research on a fuzzy logical-based subjective trust management model," Journal of Computer Research and Development, vol. 42, no. 10, pp. 1654-1659, 2005.   DOI
3 S. D. Ramchurn, C. Sierra, L. Godo, N. R. Jennings, "Devising a trust model for multi-agent interactions using confidence and reputation," International Journal of Applied Artificial Intelligence, vol. 18, no. 10, pp. 833-852, 2003.
4 M. Supriya, L. J. Venkataramana, K. Sangeeta, G. K. Patra, "Estimating trust value for cloud service providers using fuzzy logic," International Journal of Computer Application, vol. 48, no. 19, pp. 28-34, 2012.   DOI
5 A. Selvaraj, S. Sundararajan, "Evidence-based trust evaluation system for cloud services using fuzzy logic," International Journal of Fuzzy Systems, pp. 1-9, 2016.
6 Changsong Li, Shilong Wang, Ling Kang, Liang Guo, Yang Cao, "Trust evaluation model of cloud manufacturing service platform," International Journal of Advanced Manufacturing Technology, vol. 75, no. 1, pp. 489-501, 2014.   DOI
7 M. Alhamad, T. Dillon, and E. Chang, "SLA-based trust model for cloud computing," in Proc. of the IEEE 13th International Conference on Network-Based Information Systems, Takayama, Japan, pp. 321-324, 2010.
8 S. Chakraborty and K. Roy, "An sla-based framework for estimating trustworthiness of a cloud," in Proc. of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, pp. 321-324. 2012.
9 S. M. Habib, S. Ries, and M. Muhlhauser, "Towards a trust management system for cloud computing," in Proc. of the IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, pp. 933-939, 2011.
10 T. H. Noor and Q. Z. Sheng, "Trust as a service: a framework for trust management in cloud environments," in Proc. of the IEEE 12th International Conference on Web Information System Engineering, Sydney, Australia, pp. 314-321, 2011.
11 T. H. Noor, Q. Z. Sheng, A. Ngu, J. Law, "CloudArmor: A platform for credibility-based trust management of cloud services," in Proc. of the 22nd ACM Conference on Information and Knowledge Management, San Francisco, USA, pp. 2509-2512, 2013.
12 X. L. Xie, L. Liu, P. Zhao, "Trust model based on double incentive and deception detection for cloud computing," Journal of Electronics & Information Technology, vol. 34, no. 4, pp. 812-817, 2012.
13 Hiroyuki Sato, Atsushi Kanai, Shigeaki Tanimoto, "A cloud trust model in a security aware cloud," in Proc. of the 10th Annual International Symposium on Applications and the Internet, Seoul, Korea, pp. 121-124, 2010.
14 L. F. Wang, Z. P. Wu, "A novel trustworthiness measurement model for cloud service," in Proc. of the IEEE/ACM 7th International Conference on Utility and Cloud Computing, London, UK, pp. 928-933, 2014.
15 W. J. Fan, S. L. Yang, H. Perros, J. Pei, "A multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning approach," International Journal of Automation and Computing, vol. 12, no. 2, pp. 208-219, 2015.   DOI
16 Y. Huang, "The research on evaluation model of cloud service based on QoS and application," Master, Thesis, Zhejiang GongShang University, CN, 2013.
17 Cloud computing, 2012.
18 M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, and I. Stoica, "Above the clouds: a berkeley view of cloud computing," 2009.
19 Chunming Rong, Son T. Nguyen, Martin G. Jaatun, "Beyond lightning: A survey on security challenges in cloud computing," Computer and Electrical Engineering, no. 39, pp. 47-54, 2013.
20 C. R. Choi, H. Y. Jeong, "Quality evaluation and best service choice for cloud computing based on user preference and weights of attributes using the analytic network process," Electronic Commerce Research, vol. 14, no. 3, pp. 245-270, 2014.   DOI
21 M. Blaze, J. Feigenbaum, J. Lacy, "Decentralized trust management," in Proc. of the IEEE 17th Symposium on Security and Privacy, Oakland, CA, pp. 164-173, 1996.
22 M. Chiregi, N. J. Navimipour, "A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll entities," Computers in Human Behavior, vol. 60, pp. 280-292, 2016.   DOI
23 S. G. Wang, Z. P. Liu, Q. B. Sun, H. Zou, F. C. Yang, "Towards an accurate evaluation of quality of cloud service in service-oriented cloud computing," Journal of Intelligent Manufacturing, vol. 25, no. 2, pp. 283-291, 2014.   DOI
24 C. H. Hu, X. X. Luo, S. C. Wang, Y. Liu, "Approach of service evaluation based on trust reasoning for cloud computing," Journal on Communications, vol. 32, no.12, pp. 72-81, 2011.
25 M. D. Tang, X. L. Dai, J. X. Liu, J. J. Chen, "Towards a trust evaluation middleware for cloud service selection," Future Generation Computer Systems, 2016.
26 V. Viji Rajendran, S. Swamynathan, "Hybrid model for dynamic evaluation of trust in cloud services," Wireless Networks, vol. 22, pp. 1807-1818, 2016.   DOI
27 C. Elizabeth, H. Farookh, D. Tharam, "Trust and reputation for service-oriented environments: technologies for building business intelligence and consumer confidence," New York: Wiley, 2006.
28 H. Ma, Z. G. H, "User preferences-aware recommendation for trustworthy cloud services based on fuzzy clustering," Journal of Central South University, vol. 22, no. 9, pp. 3495-3505, 2015.   DOI
29 C. H. Hu, B. G. Chang, H. Xu, Q. L. Zhao, "Approach of service combination based on deepness trust reasoning in complex cross-organizational collaboration," Journal of Central South University (Science and Technology), vol. 43, no. 2, pp. 567-575, 2012.
30 C. H. Hu, X. H. Chen, M. Wu, J. X. Liu, "A service trust negotiation and access control strategy based on SLA in cloud computing," Science China: Information Sciences, vol. 42, no. 3, pp. 314-332, 2012.
31 A. A. Rahman, S. Hailes, "A distributed trust model," in Proc. of the new Security Paradigms Workshop, Cambria, UK, pp. 48-60, 1998.
32 A. Josang and R. Ismail, "The beta reputation system," in Proc. of the 15th Bled Electronic Commerce Conference, Bled, pp. 41-55, 2002.
33 W. T. Teacy, J. Patel, N. R. Jennings, M. Luck, "Travos: trust and reputation in the context of inaccurate information sources," Autonomous Agents and Multi-Agent Systems, vol. 12, no. 2, pp.183-198, 2006.   DOI
34 R. Zhou, K. Hwang, "Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing," IEEE Transactions on Parallel and Distributed Systems, vol.18, no. 4, pp. 1-14, 2007.   DOI