Loading…

Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms

Using cloud data storage, large amounts of data can be stored by data owners in a flexible way and at low cost. Hence, there has been a major increase in online cloud service providers and their users. The privacy and security of data in the cloud computing environment is a major issue. Data privacy...

Full description

Saved in:
Bibliographic Details
Published in:IEEE access 2021, Vol.9, p.161488-161506
Main Authors: Alshammari, Salah T., Alsubhi, Khalid, Aljahdali, Hani Moaiteq Abdullah, Alghamdi, Ahmed Mohammed
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c408t-709515c3b7fe8b1fc265509eb2b314cfb6ccdc5a01e1d0ab17bec200b6d9de443
cites cdi_FETCH-LOGICAL-c408t-709515c3b7fe8b1fc265509eb2b314cfb6ccdc5a01e1d0ab17bec200b6d9de443
container_end_page 161506
container_issue
container_start_page 161488
container_title IEEE access
container_volume 9
creator Alshammari, Salah T.
Alsubhi, Khalid
Aljahdali, Hani Moaiteq Abdullah
Alghamdi, Ahmed Mohammed
description Using cloud data storage, large amounts of data can be stored by data owners in a flexible way and at low cost. Hence, there has been a major increase in online cloud service providers and their users. The privacy and security of data in the cloud computing environment is a major issue. Data privacy can be ensured by using a cryptographic access control method, so that data can only be accessed by authorized customers while keeping it inaccessible to unauthorized users. However, this type of cryptographic approach does not address the issue of trust. An integration between several trust models and cryptographic access control models has been presented in many research papers, the aim of which is to make data stored in cloud storage systems more secure. The objective of this study is to determine a solution that can suitably handle trust issues in access control models to decrease the risk as greater security to cloud storage systems, and the quality of decisions being made by data owners and cloud operators is improved. In this paper, we have presented a taxonomy for trust criteria and reputation attacks in cloud computing. Also, some of the fundamental concepts regarding trust management of services within cloud environments have been presented in this paper, along with the latest technologies. There are three layers in the model, and a series of dimensions are further determined for every layer (which are the assessment criteria), which serve as the benchmark to evaluate many research prototypes of trust models in a cloud computing environment by comparing these criteria when evaluating several trust models in a cloud computing environment. In this paper, a comparison of fifteen representative trust management research samples in cloud computing and the appropriate research domains were also carried out by employing this analytical model.
doi_str_mv 10.1109/ACCESS.2021.3132580
format article
fullrecord <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_b0ce14acaa3f4b7ebd264442883c48da</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9634007</ieee_id><doaj_id>oai_doaj_org_article_b0ce14acaa3f4b7ebd264442883c48da</doaj_id><sourcerecordid>2610170700</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-709515c3b7fe8b1fc265509eb2b314cfb6ccdc5a01e1d0ab17bec200b6d9de443</originalsourceid><addsrcrecordid>eNpNkVtvEzEQhVcIJKrSX9AXSzwnjC974y1aAlRqhUTCszW2Z8uGrB1sb0X-PRu2qpiXGY3OOTPSVxS3HNacQ_th03Xb3W4tQPC15FKUDbwqrgSv2pUsZfX6v_ltcZPSAeZq5lVZXxXjPk4pswf0-Egj-cx255RpTGzwrDuGybEdxafBUmJb_zTE4C-qj2yPf4IP45mFnn2n05QxD8GzTc5ofyWG3rFP1JNPxB7I_kQ_pDG9K970eEx089yvix-ft_vu6-r-25e7bnO_sgqavKqhLXlppal7agzvrajKEloywkiubG8qa50tEThxB2h4bcgKAFO51pFS8rq4W3JdwIM-xWHEeNYBB_1vEeKjxpgHeyRtwBJXaBFlr0xNxolKKSWaRlrVOJyz3i9Zpxh-T5SyPoQp-vl9LSoOvIYaYFbJRWVjSClS_3KVg75g0gsmfcGknzHNrtvFNRDRi6OtpAKo5V_LU4_2</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2610170700</pqid></control><display><type>article</type><title>Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms</title><source>IEEE Xplore Open Access Journals</source><creator>Alshammari, Salah T. ; Alsubhi, Khalid ; Aljahdali, Hani Moaiteq Abdullah ; Alghamdi, Ahmed Mohammed</creator><creatorcontrib>Alshammari, Salah T. ; Alsubhi, Khalid ; Aljahdali, Hani Moaiteq Abdullah ; Alghamdi, Ahmed Mohammed</creatorcontrib><description>Using cloud data storage, large amounts of data can be stored by data owners in a flexible way and at low cost. Hence, there has been a major increase in online cloud service providers and their users. The privacy and security of data in the cloud computing environment is a major issue. Data privacy can be ensured by using a cryptographic access control method, so that data can only be accessed by authorized customers while keeping it inaccessible to unauthorized users. However, this type of cryptographic approach does not address the issue of trust. An integration between several trust models and cryptographic access control models has been presented in many research papers, the aim of which is to make data stored in cloud storage systems more secure. The objective of this study is to determine a solution that can suitably handle trust issues in access control models to decrease the risk as greater security to cloud storage systems, and the quality of decisions being made by data owners and cloud operators is improved. In this paper, we have presented a taxonomy for trust criteria and reputation attacks in cloud computing. Also, some of the fundamental concepts regarding trust management of services within cloud environments have been presented in this paper, along with the latest technologies. There are three layers in the model, and a series of dimensions are further determined for every layer (which are the assessment criteria), which serve as the benchmark to evaluate many research prototypes of trust models in a cloud computing environment by comparing these criteria when evaluating several trust models in a cloud computing environment. In this paper, a comparison of fifteen representative trust management research samples in cloud computing and the appropriate research domains were also carried out by employing this analytical model.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2021.3132580</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Access control ; authorization ; Cloud computing ; clouds ; Computational modeling ; Control methods ; Criteria ; Cryptography ; Cybersecurity ; Data storage ; Evaluation ; information security ; Internet ; Management systems ; online services ; Privacy ; Scientific papers ; secure storage ; Security ; security management ; Storage systems ; Taxonomy ; Trust management ; Trustworthiness</subject><ispartof>IEEE access, 2021, Vol.9, p.161488-161506</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-709515c3b7fe8b1fc265509eb2b314cfb6ccdc5a01e1d0ab17bec200b6d9de443</citedby><cites>FETCH-LOGICAL-c408t-709515c3b7fe8b1fc265509eb2b314cfb6ccdc5a01e1d0ab17bec200b6d9de443</cites><orcidid>0000-0003-4707-4691 ; 0000-0001-5617-4198 ; 0000-0002-3236-6504 ; 0000-0001-7644-5039</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9634007$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4024,27633,27923,27924,27925,54933</link.rule.ids></links><search><creatorcontrib>Alshammari, Salah T.</creatorcontrib><creatorcontrib>Alsubhi, Khalid</creatorcontrib><creatorcontrib>Aljahdali, Hani Moaiteq Abdullah</creatorcontrib><creatorcontrib>Alghamdi, Ahmed Mohammed</creatorcontrib><title>Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms</title><title>IEEE access</title><addtitle>Access</addtitle><description>Using cloud data storage, large amounts of data can be stored by data owners in a flexible way and at low cost. Hence, there has been a major increase in online cloud service providers and their users. The privacy and security of data in the cloud computing environment is a major issue. Data privacy can be ensured by using a cryptographic access control method, so that data can only be accessed by authorized customers while keeping it inaccessible to unauthorized users. However, this type of cryptographic approach does not address the issue of trust. An integration between several trust models and cryptographic access control models has been presented in many research papers, the aim of which is to make data stored in cloud storage systems more secure. The objective of this study is to determine a solution that can suitably handle trust issues in access control models to decrease the risk as greater security to cloud storage systems, and the quality of decisions being made by data owners and cloud operators is improved. In this paper, we have presented a taxonomy for trust criteria and reputation attacks in cloud computing. Also, some of the fundamental concepts regarding trust management of services within cloud environments have been presented in this paper, along with the latest technologies. There are three layers in the model, and a series of dimensions are further determined for every layer (which are the assessment criteria), which serve as the benchmark to evaluate many research prototypes of trust models in a cloud computing environment by comparing these criteria when evaluating several trust models in a cloud computing environment. In this paper, a comparison of fifteen representative trust management research samples in cloud computing and the appropriate research domains were also carried out by employing this analytical model.</description><subject>Access control</subject><subject>authorization</subject><subject>Cloud computing</subject><subject>clouds</subject><subject>Computational modeling</subject><subject>Control methods</subject><subject>Criteria</subject><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Data storage</subject><subject>Evaluation</subject><subject>information security</subject><subject>Internet</subject><subject>Management systems</subject><subject>online services</subject><subject>Privacy</subject><subject>Scientific papers</subject><subject>secure storage</subject><subject>Security</subject><subject>security management</subject><subject>Storage systems</subject><subject>Taxonomy</subject><subject>Trust management</subject><subject>Trustworthiness</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>DOA</sourceid><recordid>eNpNkVtvEzEQhVcIJKrSX9AXSzwnjC974y1aAlRqhUTCszW2Z8uGrB1sb0X-PRu2qpiXGY3OOTPSVxS3HNacQ_th03Xb3W4tQPC15FKUDbwqrgSv2pUsZfX6v_ltcZPSAeZq5lVZXxXjPk4pswf0-Egj-cx255RpTGzwrDuGybEdxafBUmJb_zTE4C-qj2yPf4IP45mFnn2n05QxD8GzTc5ofyWG3rFP1JNPxB7I_kQ_pDG9K970eEx089yvix-ft_vu6-r-25e7bnO_sgqavKqhLXlppal7agzvrajKEloywkiubG8qa50tEThxB2h4bcgKAFO51pFS8rq4W3JdwIM-xWHEeNYBB_1vEeKjxpgHeyRtwBJXaBFlr0xNxolKKSWaRlrVOJyz3i9Zpxh-T5SyPoQp-vl9LSoOvIYaYFbJRWVjSClS_3KVg75g0gsmfcGknzHNrtvFNRDRi6OtpAKo5V_LU4_2</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Alshammari, Salah T.</creator><creator>Alsubhi, Khalid</creator><creator>Aljahdali, Hani Moaiteq Abdullah</creator><creator>Alghamdi, Ahmed Mohammed</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-4707-4691</orcidid><orcidid>https://orcid.org/0000-0001-5617-4198</orcidid><orcidid>https://orcid.org/0000-0002-3236-6504</orcidid><orcidid>https://orcid.org/0000-0001-7644-5039</orcidid></search><sort><creationdate>2021</creationdate><title>Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms</title><author>Alshammari, Salah T. ; Alsubhi, Khalid ; Aljahdali, Hani Moaiteq Abdullah ; Alghamdi, Ahmed Mohammed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-709515c3b7fe8b1fc265509eb2b314cfb6ccdc5a01e1d0ab17bec200b6d9de443</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Access control</topic><topic>authorization</topic><topic>Cloud computing</topic><topic>clouds</topic><topic>Computational modeling</topic><topic>Control methods</topic><topic>Criteria</topic><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Data storage</topic><topic>Evaluation</topic><topic>information security</topic><topic>Internet</topic><topic>Management systems</topic><topic>online services</topic><topic>Privacy</topic><topic>Scientific papers</topic><topic>secure storage</topic><topic>Security</topic><topic>security management</topic><topic>Storage systems</topic><topic>Taxonomy</topic><topic>Trust management</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alshammari, Salah T.</creatorcontrib><creatorcontrib>Alsubhi, Khalid</creatorcontrib><creatorcontrib>Aljahdali, Hani Moaiteq Abdullah</creatorcontrib><creatorcontrib>Alghamdi, Ahmed Mohammed</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Xplore Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) Online</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Directory of Open Access Journals (DOAJ)</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alshammari, Salah T.</au><au>Alsubhi, Khalid</au><au>Aljahdali, Hani Moaiteq Abdullah</au><au>Alghamdi, Ahmed Mohammed</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2021</date><risdate>2021</risdate><volume>9</volume><spage>161488</spage><epage>161506</epage><pages>161488-161506</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Using cloud data storage, large amounts of data can be stored by data owners in a flexible way and at low cost. Hence, there has been a major increase in online cloud service providers and their users. The privacy and security of data in the cloud computing environment is a major issue. Data privacy can be ensured by using a cryptographic access control method, so that data can only be accessed by authorized customers while keeping it inaccessible to unauthorized users. However, this type of cryptographic approach does not address the issue of trust. An integration between several trust models and cryptographic access control models has been presented in many research papers, the aim of which is to make data stored in cloud storage systems more secure. The objective of this study is to determine a solution that can suitably handle trust issues in access control models to decrease the risk as greater security to cloud storage systems, and the quality of decisions being made by data owners and cloud operators is improved. In this paper, we have presented a taxonomy for trust criteria and reputation attacks in cloud computing. Also, some of the fundamental concepts regarding trust management of services within cloud environments have been presented in this paper, along with the latest technologies. There are three layers in the model, and a series of dimensions are further determined for every layer (which are the assessment criteria), which serve as the benchmark to evaluate many research prototypes of trust models in a cloud computing environment by comparing these criteria when evaluating several trust models in a cloud computing environment. In this paper, a comparison of fifteen representative trust management research samples in cloud computing and the appropriate research domains were also carried out by employing this analytical model.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2021.3132580</doi><tpages>19</tpages><orcidid>https://orcid.org/0000-0003-4707-4691</orcidid><orcidid>https://orcid.org/0000-0001-5617-4198</orcidid><orcidid>https://orcid.org/0000-0002-3236-6504</orcidid><orcidid>https://orcid.org/0000-0001-7644-5039</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2021, Vol.9, p.161488-161506
issn 2169-3536
2169-3536
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_b0ce14acaa3f4b7ebd264442883c48da
source IEEE Xplore Open Access Journals
subjects Access control
authorization
Cloud computing
clouds
Computational modeling
Control methods
Criteria
Cryptography
Cybersecurity
Data storage
Evaluation
information security
Internet
Management systems
online services
Privacy
Scientific papers
secure storage
Security
security management
Storage systems
Taxonomy
Trust management
Trustworthiness
title Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T12%3A09%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Trust%20Management%20Systems%20in%20Cloud%20Services%20Environment:%20Taxonomy%20of%20Reputation%20Attacks%20and%20Defense%20Mechanisms&rft.jtitle=IEEE%20access&rft.au=Alshammari,%20Salah%20T.&rft.date=2021&rft.volume=9&rft.spage=161488&rft.epage=161506&rft.pages=161488-161506&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2021.3132580&rft_dat=%3Cproquest_doaj_%3E2610170700%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c408t-709515c3b7fe8b1fc265509eb2b314cfb6ccdc5a01e1d0ab17bec200b6d9de443%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2610170700&rft_id=info:pmid/&rft_ieee_id=9634007&rfr_iscdi=true