TY - JOUR
T1 - A Double-Blind Anonymous Evaluation-Based Trust Model in Cloud Computing Environments
AU - Zhang, Peiyun
AU - Zhou, Mengchu
AU - Kong, Yang
N1 - Funding Information:
Manuscript received May 4, 2018; revised November 18, 2018; accepted March 11, 2019. Date of publication April 4, 2019; date of current version February 17, 2021. This work was supported in part by the National Natural Science Foundation of China under Grant 61872006 and Grant 61472005, and in part by the CERNET Innovation Project under Grant NGII20160207. This paper was recommended by Associate Editor H. Tianfield. (Corresponding author: MengChu Zhou.) P. Zhang and Y. Kong are with the School of Computer and Information, Anhui Normal University, Wuhu 241003, China (e-mail: zpyanu@ahnu.edu.cn; yangkong2012@gmail.com).
Publisher Copyright:
© 2013 IEEE.
PY - 2021/3
Y1 - 2021/3
N2 - In the last ten years, cloud services provided many applications in various areas. Most of them are hosted in a heterogeneous distributed large-scale cloud computing environment and face inherent uncertainty, unreliability, and malicious attacks that trouble both service users and providers. To solve the problems of malicious attacks (including solo and collusion deception ones) in a public cloud computing environment, we for the first time propose a double-blind anonymous evaluation-based trust model. Based on it, cloud service providers and users are anonymously matched according to user requirements. It can be used to effectively handle some malicious attacks that intend to distort trust evaluations. Providers may secretly hide gain-sharing information into service results and send the results to users to ask for higher trust evaluations than their deserved ones. This paper proposes to adopt checking nodes to help detect such behavior. It then conducts gain-loss analysis for providers who intend to perform provider-user collusion deception. The proposed trust model can be used to effectively help one recognize collusion deception behavior and allow policy-makers to set suitable loss to punish malicious providers. Consequently, provider-initiated collusion deception behavior can be greatly discouraged in public cloud computing systems. Simulation results show that the proposed method outperform two updated methods, i.e., one based on fail-stop signature and another based on fuzzy mathematics in terms of malicious node detection ratio and speed.
AB - In the last ten years, cloud services provided many applications in various areas. Most of them are hosted in a heterogeneous distributed large-scale cloud computing environment and face inherent uncertainty, unreliability, and malicious attacks that trouble both service users and providers. To solve the problems of malicious attacks (including solo and collusion deception ones) in a public cloud computing environment, we for the first time propose a double-blind anonymous evaluation-based trust model. Based on it, cloud service providers and users are anonymously matched according to user requirements. It can be used to effectively handle some malicious attacks that intend to distort trust evaluations. Providers may secretly hide gain-sharing information into service results and send the results to users to ask for higher trust evaluations than their deserved ones. This paper proposes to adopt checking nodes to help detect such behavior. It then conducts gain-loss analysis for providers who intend to perform provider-user collusion deception. The proposed trust model can be used to effectively help one recognize collusion deception behavior and allow policy-makers to set suitable loss to punish malicious providers. Consequently, provider-initiated collusion deception behavior can be greatly discouraged in public cloud computing systems. Simulation results show that the proposed method outperform two updated methods, i.e., one based on fail-stop signature and another based on fuzzy mathematics in terms of malicious node detection ratio and speed.
KW - Cloud computing
KW - collusion deception
KW - double-blind anonymous evaluation
KW - gain-loss analysis
KW - trust
UR - http://www.scopus.com/inward/record.url?scp=85101067177&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85101067177&partnerID=8YFLogxK
U2 - 10.1109/TSMC.2019.2906310
DO - 10.1109/TSMC.2019.2906310
M3 - Article
AN - SCOPUS:85101067177
SN - 2168-2216
VL - 51
SP - 1805
EP - 1816
JO - IEEE Transactions on Systems, Man, and Cybernetics: Systems
JF - IEEE Transactions on Systems, Man, and Cybernetics: Systems
IS - 3
M1 - 8681408
ER -