Title: Analysing and evaluating malicious trust in cloud computing environments from a statistical perspective

Authors: Dawei Sun; Guiran Chang; Chunguang Tan; Xingwei Wang; Rui Guo

Addresses: School of Information Science and Engineering, Northeastern University, Shenyang 110004, China; Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China ' School of Information Science and Engineering, Northeastern University, Shenyang 110004, China ' School of Information Science and Engineering, Northeastern University, Shenyang 110004, China ' School of Information Science and Engineering, Northeastern University, Shenyang 110004, China ' Department of Computer Science and Technology, China Criminal Police University, Shenyang 110004, China

Abstract: High security issue is one of the major obstacles for opening up the new cloud computing era. Trust, as a soft social security philosophy, can fight against such security threats and consequently offers a high trustworthiness cloud computing environments. In this paper, the definition of trust in clouds is given and the properties of trust are systematically analysed by referring to the social science theories. A malicious trust analysis and evaluation model is put forward, which includes: (a) analysing malicious trust information from the popularity, activity, and cooperation among trust entities, and acquiring the trustworthiness recommendations; and (b) evaluating the malicious nodes at the data level by similarity strategy, and evaluating malicious trust information at the overall level by individual and moving range control chart strategy. Simulation results conclusively demonstrate that this malicious trust analysis and evaluation model accurately detects and prevents malicious and faulty recommendations.

Keywords: malicious trust; trust analysis; statistical perspective; high security; high trust; cloud computing; trustworthiness recommendations; control charts; simulation.

DOI: 10.1504/IJWMC.2013.056551

International Journal of Wireless and Mobile Computing, 2013 Vol.6 No.4, pp.331 - 337

Received: 16 May 2013
Accepted: 28 May 2013

Published online: 16 Oct 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article