№2, 2013

AN INVESTIGATION OF TRUST PROBLEMS OF THE CLOUD COMPUTING

Rasim M. Аlguliev, Fargana C. Abdullayeva

The paper investigates the trust problems which is a fundamental issue among security problems of cloud computing. For this purpose first of all the trust notion studied by various scientific fields is clarified. Technologies of developing of  the reputation based trust, approaches to ensure transparency in the clouds, methods of establishing trust on the basis of service level agreements, mechanisms which provide trust as service are studied. As a result, existing problems in the trust mechanizms are identified, and number of recommendations for these problems solution is offered. (pp. 3-9)

Keywords: Cloud computing, trust, service level agreement, reputation based trust, Sybil attack
References
  • Habib S.M., Hauke S., Ries S., Muhlh M. Trust as a facilitator in cloud computing: a survey // Journal of Cloud Computing: Advances, Systems and Applications, 2012, vol. 1, no 19, 33 p.
  • Alguliev R.M., Abdullayeva F.C. Identity management based security architecture of cloud computing on multi-agent systems / Proc. of the Third International Conference on Innovative Computing Technology (INTECH), 2013, pp. 123–126.
  • Əliquliyev R.M., Abdullayeva F.C. Bulud texnologiyalarının təhlükəsizlik problemlərinin tədqiqi və analizi // İnformasiya Texnologiyaları Problemləri, 2013, №1, s. 3–14.
  • Rashidi A., Movahhedinia N. A model for user trust in cloud computing // International Journal on Cloud Computing: Services and Architecture (IJCCSA), 2012, vol. 2, no. 2, pp.1–8.
  • Huang J., Nicol D.M. Trust mechanisms for cloud computing // Journal of Cloud Computing: Advances, Systems and Applications, 2013, vol. 2, no 9, 14 p.
  • Heijden V.H., Verhagen T., Creemers M., Creemers M. Understanding online purchase intentions: contributions from technology and trust perspectives // European Journal of Information Systems, 2003, vol. 12, no 1, pp. 41–48.
  • Castelfranchi C., Falcone R. Principles of trust for MAS: Cognitive anatomy social importance, and quantication / Proc. of the IEEE Third International Conference on Multi-Agent Systems, 1998, pp. 72–79.
  • Gambetta D. Can we trust trust? Trust: Making and Breaking Cooperative Relations, Basil Blackwell, Oxford, 1990, Chapter 13, pp. 213–237.
  • Montaner M., Lopez B., Rosa J.L. Opinion-based filtering through trust / Proc. of the 6th International Workshop on Cooperative Information Agents VI, 2002, pp. 164–178.
  • Jøsang A., Ismail R., Boyd C. A survey of trust and reputation systems for online service provision // Journal of Decision Support Systems, vol. 43, no 2, pp.618–644.
  • Wang Y., Vassileva J. Trust and reputation model in peer-to-peer networks / Proc. of IEEE Conference on P2P Computing, 2003, pp. 1–8.
  • Ghosh A., Arce I. Guest editors’ introduction: In Cloud Computing We Trust–But Should We? // IEEE Security & Privacy, 2010, 8, no 6, pp. 14–16.
  • Personal data in the cloud: A global survey of consumer attitudes. Fujitsu Research Institute, 2010, Japan, 23 p.
  • Columbus L. Gartner predicts infrastructure services will accelerate cloud computing Growth. http://www.forbes.com/sites/louiscolumbus/2013/02/19/gartner-predicts- infrastructure-services-will-accelerate-cloud-computing-growth/.
  • Global cloud computing market forecast 2015-2020. Market Research Media Ltd, http://www.marketresearchmedia.com/?p=839.
  • Knode R. Digital trust in the cloud: Liquid security in cloudy places, CSC.COM, 2009, 40 p.
  • Security, Trust and Assurance Registry (STAR). Cloud Security Alliance (CSA), 2011, https://cloudsecurityalliance.org/star/.
  • Security guidance for critical areas of focus in cloud computing, Cloud Security Alliance (CSA), 2011, v.3.0, 176 p.
  • Haq I.U., Brandic I., Schikuta E. SLA validation in layered cloud infrastructures / Proc. of the 7th International Conference on Economics of Grids, Clouds, Systems, and Services, 2010, pp. 153–164.
  • Wang S.X., Zhang L., Wang S., Qiu X. A cloud-based trust model for evaluating quality of web services // Journal of Computer Science and Technology, 2010, vol. 25, no 6, pp. 
    1130–1142.
  • Wieder P., Yahyapour R., Ziegler Grids and Service-Oriented Architectures for Service Level Agreements, Springer, 2010, chapter 5, 171 p.
  • EMC’s vision for trust in the cloud. Proof, not promises: Creating the trusted cloud, EMC Corporation, 2011, 15 p.
  • Zacharia G., Moukas A., Maes P. Collaborative reputation mechanisms in electronic marketplaces // Decision Support Systems, , 2000, vol. 29, no 4, pp. 371–388.
  • Yu B., Singh P.M. An evidential model of distributed reputation management / Proc. of the First International Joint Conference on Autonomous Agents and Multiagent Systems, 2002, pp. 294–301.
  • Yu B., Singh P.M. A social mechanism of reputation management in electronic communities /Proc. of Fourth International Workshop on Cooperative Information Agents, 2000, pp.154–165.
  • Schafer B.J., Konstan J., Riedl J. Recommender systems in e-commerce / ACM Conference on Electronic Commerce, 1999, pp. 158–166.
  • Chang E., Dillon T.S., Hussain F.K. Trust and reputation relationships in service-oriented environments / Proc. of the Third International Conference on Information Technology and Applications (ICITA), 2005, vol. 1, pp. 4–14.
  • Wang S.X., Zhang L., Wang S. Qiu X. A cloud-based trust model for evaluating quality of Web services // Journal of Computer Science And Technology, 2010, vol. 25, no 6, pp.1130–1142.
  • Reputation system. From Wikipedia, the free encyclopedia 
    http://en.wikipedia.org/wiki/Reputation_system.
  • Carrara E., Hogben G. Reputation-based systems: a security analysis. ENISA Position Paper, 2007, no 2, 32 p.
  • Talal H.N., Quan Z.S., Sheng A.A. Reputation attacks detection for effective trust assessment among cloud services / Proc. of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013, pp. 469–476.
  • Schreiber F.R. Sybil. Warner Books, 1973, 359 p.
  • Douceur J.R. The Sybil Attack / Proc. of 1st International Workshop on Peer-to-Peer Systems (IPTPS), 2002, pp. 1–6.