4.7 Article

A Double-Blind Anonymous Evaluation-Based Trust Model in Cloud Computing Environments

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TSMC.2019.2906310

关键词

Cloud computing; Computational modeling; Resists; Face; Reliability; Mathematics; Security; Cloud computing; collusion deception; double-blind anonymous evaluation; gain– loss analysis; trust

资金

  1. National Natural Science Foundation of China [61872006, 61472005]
  2. CERNET Innovation Project [NGII20160207]

向作者/读者索取更多资源

This paper proposes a trust model based on double-blind anonymous evaluation to address malicious attacks in public cloud computing environments. By anonymously matching cloud service providers and users, it effectively handles malicious attacks and discourages collusion deception behavior.
In the last ten years, cloud services provided many applications in various areas. Most of them are hosted in a heterogeneous distributed large-scale cloud computing environment and face inherent uncertainty, unreliability, and malicious attacks that trouble both service users and providers. To solve the problems of malicious attacks (including solo and collusion deception ones) in a public cloud computing environment, we for the first time propose a double-blind anonymous evaluation-based trust model. Based on it, cloud service providers and users are anonymously matched according to user requirements. It can be used to effectively handle some malicious attacks that intend to distort trust evaluations. Providers may secretly hide gain-sharing information into service results and send the results to users to ask for higher trust evaluations than their deserved ones. This paper proposes to adopt checking nodes to help detect such behavior. It then conducts gain-loss analysis for providers who intend to perform provider-user collusion deception. The proposed trust model can be used to effectively help one recognize collusion deception behavior and allow policy-makers to set suitable loss to punish malicious providers. Consequently, provider-initiated collusion deception behavior can be greatly discouraged in public cloud computing systems. Simulation results show that the proposed method outperform two updated methods, i.e., one based on fail-stop signature and another based on fuzzy mathematics in terms of malicious node detection ratio and speed.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据