Loading…
Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms
Using cloud data storage, large amounts of data can be stored by data owners in a flexible way and at low cost. Hence, there has been a major increase in online cloud service providers and their users. The privacy and security of data in the cloud computing environment is a major issue. Data privacy...
Saved in:
Published in: | IEEE access 2021, Vol.9, p.161488-161506 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c408t-709515c3b7fe8b1fc265509eb2b314cfb6ccdc5a01e1d0ab17bec200b6d9de443 |
---|---|
cites | cdi_FETCH-LOGICAL-c408t-709515c3b7fe8b1fc265509eb2b314cfb6ccdc5a01e1d0ab17bec200b6d9de443 |
container_end_page | 161506 |
container_issue | |
container_start_page | 161488 |
container_title | IEEE access |
container_volume | 9 |
creator | Alshammari, Salah T. Alsubhi, Khalid Aljahdali, Hani Moaiteq Abdullah Alghamdi, Ahmed Mohammed |
description | Using cloud data storage, large amounts of data can be stored by data owners in a flexible way and at low cost. Hence, there has been a major increase in online cloud service providers and their users. The privacy and security of data in the cloud computing environment is a major issue. Data privacy can be ensured by using a cryptographic access control method, so that data can only be accessed by authorized customers while keeping it inaccessible to unauthorized users. However, this type of cryptographic approach does not address the issue of trust. An integration between several trust models and cryptographic access control models has been presented in many research papers, the aim of which is to make data stored in cloud storage systems more secure. The objective of this study is to determine a solution that can suitably handle trust issues in access control models to decrease the risk as greater security to cloud storage systems, and the quality of decisions being made by data owners and cloud operators is improved. In this paper, we have presented a taxonomy for trust criteria and reputation attacks in cloud computing. Also, some of the fundamental concepts regarding trust management of services within cloud environments have been presented in this paper, along with the latest technologies. There are three layers in the model, and a series of dimensions are further determined for every layer (which are the assessment criteria), which serve as the benchmark to evaluate many research prototypes of trust models in a cloud computing environment by comparing these criteria when evaluating several trust models in a cloud computing environment. In this paper, a comparison of fifteen representative trust management research samples in cloud computing and the appropriate research domains were also carried out by employing this analytical model. |
doi_str_mv | 10.1109/ACCESS.2021.3132580 |
format | article |
fullrecord | <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_b0ce14acaa3f4b7ebd264442883c48da</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9634007</ieee_id><doaj_id>oai_doaj_org_article_b0ce14acaa3f4b7ebd264442883c48da</doaj_id><sourcerecordid>2610170700</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-709515c3b7fe8b1fc265509eb2b314cfb6ccdc5a01e1d0ab17bec200b6d9de443</originalsourceid><addsrcrecordid>eNpNkVtvEzEQhVcIJKrSX9AXSzwnjC974y1aAlRqhUTCszW2Z8uGrB1sb0X-PRu2qpiXGY3OOTPSVxS3HNacQ_th03Xb3W4tQPC15FKUDbwqrgSv2pUsZfX6v_ltcZPSAeZq5lVZXxXjPk4pswf0-Egj-cx255RpTGzwrDuGybEdxafBUmJb_zTE4C-qj2yPf4IP45mFnn2n05QxD8GzTc5ofyWG3rFP1JNPxB7I_kQ_pDG9K970eEx089yvix-ft_vu6-r-25e7bnO_sgqavKqhLXlppal7agzvrajKEloywkiubG8qa50tEThxB2h4bcgKAFO51pFS8rq4W3JdwIM-xWHEeNYBB_1vEeKjxpgHeyRtwBJXaBFlr0xNxolKKSWaRlrVOJyz3i9Zpxh-T5SyPoQp-vl9LSoOvIYaYFbJRWVjSClS_3KVg75g0gsmfcGknzHNrtvFNRDRi6OtpAKo5V_LU4_2</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2610170700</pqid></control><display><type>article</type><title>Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms</title><source>IEEE Xplore Open Access Journals</source><creator>Alshammari, Salah T. ; Alsubhi, Khalid ; Aljahdali, Hani Moaiteq Abdullah ; Alghamdi, Ahmed Mohammed</creator><creatorcontrib>Alshammari, Salah T. ; Alsubhi, Khalid ; Aljahdali, Hani Moaiteq Abdullah ; Alghamdi, Ahmed Mohammed</creatorcontrib><description>Using cloud data storage, large amounts of data can be stored by data owners in a flexible way and at low cost. Hence, there has been a major increase in online cloud service providers and their users. The privacy and security of data in the cloud computing environment is a major issue. Data privacy can be ensured by using a cryptographic access control method, so that data can only be accessed by authorized customers while keeping it inaccessible to unauthorized users. However, this type of cryptographic approach does not address the issue of trust. An integration between several trust models and cryptographic access control models has been presented in many research papers, the aim of which is to make data stored in cloud storage systems more secure. The objective of this study is to determine a solution that can suitably handle trust issues in access control models to decrease the risk as greater security to cloud storage systems, and the quality of decisions being made by data owners and cloud operators is improved. In this paper, we have presented a taxonomy for trust criteria and reputation attacks in cloud computing. Also, some of the fundamental concepts regarding trust management of services within cloud environments have been presented in this paper, along with the latest technologies. There are three layers in the model, and a series of dimensions are further determined for every layer (which are the assessment criteria), which serve as the benchmark to evaluate many research prototypes of trust models in a cloud computing environment by comparing these criteria when evaluating several trust models in a cloud computing environment. In this paper, a comparison of fifteen representative trust management research samples in cloud computing and the appropriate research domains were also carried out by employing this analytical model.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2021.3132580</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Access control ; authorization ; Cloud computing ; clouds ; Computational modeling ; Control methods ; Criteria ; Cryptography ; Cybersecurity ; Data storage ; Evaluation ; information security ; Internet ; Management systems ; online services ; Privacy ; Scientific papers ; secure storage ; Security ; security management ; Storage systems ; Taxonomy ; Trust management ; Trustworthiness</subject><ispartof>IEEE access, 2021, Vol.9, p.161488-161506</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-709515c3b7fe8b1fc265509eb2b314cfb6ccdc5a01e1d0ab17bec200b6d9de443</citedby><cites>FETCH-LOGICAL-c408t-709515c3b7fe8b1fc265509eb2b314cfb6ccdc5a01e1d0ab17bec200b6d9de443</cites><orcidid>0000-0003-4707-4691 ; 0000-0001-5617-4198 ; 0000-0002-3236-6504 ; 0000-0001-7644-5039</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9634007$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4024,27633,27923,27924,27925,54933</link.rule.ids></links><search><creatorcontrib>Alshammari, Salah T.</creatorcontrib><creatorcontrib>Alsubhi, Khalid</creatorcontrib><creatorcontrib>Aljahdali, Hani Moaiteq Abdullah</creatorcontrib><creatorcontrib>Alghamdi, Ahmed Mohammed</creatorcontrib><title>Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms</title><title>IEEE access</title><addtitle>Access</addtitle><description>Using cloud data storage, large amounts of data can be stored by data owners in a flexible way and at low cost. Hence, there has been a major increase in online cloud service providers and their users. The privacy and security of data in the cloud computing environment is a major issue. Data privacy can be ensured by using a cryptographic access control method, so that data can only be accessed by authorized customers while keeping it inaccessible to unauthorized users. However, this type of cryptographic approach does not address the issue of trust. An integration between several trust models and cryptographic access control models has been presented in many research papers, the aim of which is to make data stored in cloud storage systems more secure. The objective of this study is to determine a solution that can suitably handle trust issues in access control models to decrease the risk as greater security to cloud storage systems, and the quality of decisions being made by data owners and cloud operators is improved. In this paper, we have presented a taxonomy for trust criteria and reputation attacks in cloud computing. Also, some of the fundamental concepts regarding trust management of services within cloud environments have been presented in this paper, along with the latest technologies. There are three layers in the model, and a series of dimensions are further determined for every layer (which are the assessment criteria), which serve as the benchmark to evaluate many research prototypes of trust models in a cloud computing environment by comparing these criteria when evaluating several trust models in a cloud computing environment. In this paper, a comparison of fifteen representative trust management research samples in cloud computing and the appropriate research domains were also carried out by employing this analytical model.</description><subject>Access control</subject><subject>authorization</subject><subject>Cloud computing</subject><subject>clouds</subject><subject>Computational modeling</subject><subject>Control methods</subject><subject>Criteria</subject><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Data storage</subject><subject>Evaluation</subject><subject>information security</subject><subject>Internet</subject><subject>Management systems</subject><subject>online services</subject><subject>Privacy</subject><subject>Scientific papers</subject><subject>secure storage</subject><subject>Security</subject><subject>security management</subject><subject>Storage systems</subject><subject>Taxonomy</subject><subject>Trust management</subject><subject>Trustworthiness</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>DOA</sourceid><recordid>eNpNkVtvEzEQhVcIJKrSX9AXSzwnjC974y1aAlRqhUTCszW2Z8uGrB1sb0X-PRu2qpiXGY3OOTPSVxS3HNacQ_th03Xb3W4tQPC15FKUDbwqrgSv2pUsZfX6v_ltcZPSAeZq5lVZXxXjPk4pswf0-Egj-cx255RpTGzwrDuGybEdxafBUmJb_zTE4C-qj2yPf4IP45mFnn2n05QxD8GzTc5ofyWG3rFP1JNPxB7I_kQ_pDG9K970eEx089yvix-ft_vu6-r-25e7bnO_sgqavKqhLXlppal7agzvrajKEloywkiubG8qa50tEThxB2h4bcgKAFO51pFS8rq4W3JdwIM-xWHEeNYBB_1vEeKjxpgHeyRtwBJXaBFlr0xNxolKKSWaRlrVOJyz3i9Zpxh-T5SyPoQp-vl9LSoOvIYaYFbJRWVjSClS_3KVg75g0gsmfcGknzHNrtvFNRDRi6OtpAKo5V_LU4_2</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Alshammari, Salah T.</creator><creator>Alsubhi, Khalid</creator><creator>Aljahdali, Hani Moaiteq Abdullah</creator><creator>Alghamdi, Ahmed Mohammed</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-4707-4691</orcidid><orcidid>https://orcid.org/0000-0001-5617-4198</orcidid><orcidid>https://orcid.org/0000-0002-3236-6504</orcidid><orcidid>https://orcid.org/0000-0001-7644-5039</orcidid></search><sort><creationdate>2021</creationdate><title>Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms</title><author>Alshammari, Salah T. ; Alsubhi, Khalid ; Aljahdali, Hani Moaiteq Abdullah ; Alghamdi, Ahmed Mohammed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-709515c3b7fe8b1fc265509eb2b314cfb6ccdc5a01e1d0ab17bec200b6d9de443</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Access control</topic><topic>authorization</topic><topic>Cloud computing</topic><topic>clouds</topic><topic>Computational modeling</topic><topic>Control methods</topic><topic>Criteria</topic><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Data storage</topic><topic>Evaluation</topic><topic>information security</topic><topic>Internet</topic><topic>Management systems</topic><topic>online services</topic><topic>Privacy</topic><topic>Scientific papers</topic><topic>secure storage</topic><topic>Security</topic><topic>security management</topic><topic>Storage systems</topic><topic>Taxonomy</topic><topic>Trust management</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alshammari, Salah T.</creatorcontrib><creatorcontrib>Alsubhi, Khalid</creatorcontrib><creatorcontrib>Aljahdali, Hani Moaiteq Abdullah</creatorcontrib><creatorcontrib>Alghamdi, Ahmed Mohammed</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Xplore Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) Online</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Directory of Open Access Journals (DOAJ)</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alshammari, Salah T.</au><au>Alsubhi, Khalid</au><au>Aljahdali, Hani Moaiteq Abdullah</au><au>Alghamdi, Ahmed Mohammed</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2021</date><risdate>2021</risdate><volume>9</volume><spage>161488</spage><epage>161506</epage><pages>161488-161506</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Using cloud data storage, large amounts of data can be stored by data owners in a flexible way and at low cost. Hence, there has been a major increase in online cloud service providers and their users. The privacy and security of data in the cloud computing environment is a major issue. Data privacy can be ensured by using a cryptographic access control method, so that data can only be accessed by authorized customers while keeping it inaccessible to unauthorized users. However, this type of cryptographic approach does not address the issue of trust. An integration between several trust models and cryptographic access control models has been presented in many research papers, the aim of which is to make data stored in cloud storage systems more secure. The objective of this study is to determine a solution that can suitably handle trust issues in access control models to decrease the risk as greater security to cloud storage systems, and the quality of decisions being made by data owners and cloud operators is improved. In this paper, we have presented a taxonomy for trust criteria and reputation attacks in cloud computing. Also, some of the fundamental concepts regarding trust management of services within cloud environments have been presented in this paper, along with the latest technologies. There are three layers in the model, and a series of dimensions are further determined for every layer (which are the assessment criteria), which serve as the benchmark to evaluate many research prototypes of trust models in a cloud computing environment by comparing these criteria when evaluating several trust models in a cloud computing environment. In this paper, a comparison of fifteen representative trust management research samples in cloud computing and the appropriate research domains were also carried out by employing this analytical model.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2021.3132580</doi><tpages>19</tpages><orcidid>https://orcid.org/0000-0003-4707-4691</orcidid><orcidid>https://orcid.org/0000-0001-5617-4198</orcidid><orcidid>https://orcid.org/0000-0002-3236-6504</orcidid><orcidid>https://orcid.org/0000-0001-7644-5039</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2021, Vol.9, p.161488-161506 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_doaj_primary_oai_doaj_org_article_b0ce14acaa3f4b7ebd264442883c48da |
source | IEEE Xplore Open Access Journals |
subjects | Access control authorization Cloud computing clouds Computational modeling Control methods Criteria Cryptography Cybersecurity Data storage Evaluation information security Internet Management systems online services Privacy Scientific papers secure storage Security security management Storage systems Taxonomy Trust management Trustworthiness |
title | Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T12%3A09%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Trust%20Management%20Systems%20in%20Cloud%20Services%20Environment:%20Taxonomy%20of%20Reputation%20Attacks%20and%20Defense%20Mechanisms&rft.jtitle=IEEE%20access&rft.au=Alshammari,%20Salah%20T.&rft.date=2021&rft.volume=9&rft.spage=161488&rft.epage=161506&rft.pages=161488-161506&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2021.3132580&rft_dat=%3Cproquest_doaj_%3E2610170700%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c408t-709515c3b7fe8b1fc265509eb2b314cfb6ccdc5a01e1d0ab17bec200b6d9de443%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2610170700&rft_id=info:pmid/&rft_ieee_id=9634007&rfr_iscdi=true |