TRUST BASED MODEL FOR CLOUD SECURITY
DOI:
https://doi.org/10.34185/1991-7848.itmm.2025.01.090Keywords:
cloud environments, cloud computing, distributed systems, cybersecurity, data security, trust based modelsAbstract
The rapid growth in the popularity of cloud environments requires special attention to be paid to the security of resources and data located in the cloud. The concept of trust and its properties, thanks to which it can be used to describe the interaction of components in cloud environments, are considered. Due to this, models based on this concept can be used to protect these cloud environments. Implementations of such models, namely: TNA-SL, InterTrust, ODTMF, Fuzz Art and their modifications, were considered. Requirements for them were determined, disadvantages and advantages were known. As a result, it was concluded that trust-based models can be used to protect cloud environments, but they require optimizations of both execution time and scalability for further use. It was also determined that it is worth paying attention to their use in federated cloud environments.
References
Hu Z, Liu L, Wang C (2011) Organization domain trust evaluation model in federated environment based on subjective logic. In: International conference on information technology, computer engineering and management sciences (ICM). IEEE, Nanjing, Jiangsu, China, pp 380-384
Jøsang A, Bhuiyan T (2008) Optimal trust network analysis with subjective logic. In: 2nd International conference on emerging security information, systems and technologies. IEEE, Cap Esterel, France, pp 179-184
Ma X, Wang Z, Liu F, Bian J (2010) A trust model based on the extended subjective logic for P2P networks. In: 2nd International conference on e-business and information system security. IEEE, Wuhan, China, pp 1-4
Kurdi, H., Alfaries, A., Al-Anazi, A. et al. A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments. J Supercomput 75, 3534–3554 (2019). https://doi.org/10.1007/s11227-018-2669-y
Shvachko K, Kuang H, Radia S, Chansler R (2010) The hadoop distributed file system. In: 26th Symposium on mass storage systems and technologies (MSST). IEEE, Incline Village, NV, USA, pp 1-10
Rao S, Wang Y, Tao XL (2010) The comprehensive trust model in P2P based on improved eigentrust algorithm. In: International conference on measuring technology and mechatronics automation. IEEE, Changsha City, China, pp 822-825
Khan SM, Hamlen KW (2012) Hatman: intra-cloud trust management for hadoop. In: 5th International conference on cloud computing. IEEE, Honolulu, HI, USA, pp 494-501
Nishikawa T, Fujita S (2010) An effective risk avoidance scheme for the eigentrust reputation management system. In: 1st International conference on networking and computing. IEEE, Higashi-Hiroshima, Japan, pp 36-43
Abrams Z, Mcgrew R, Plotkin S (2005) A non-manipulable trust system based on EigenTrust. ACM SIGecom Exch 5:21-30
Jaiganesh M, Aarthi M, & Kumar AVA (2015) Fuzzy ART-Based User Behavior Trust in Cloud Computing. in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, Eds.New Delhi: Springer:341-348.