ReTREM: A responsibility based trust revision model for determining trustworthiness of fog nodes

被引:3
作者
Yadav, Ravi [1 ]
Baranwal, Gaurav [1 ]
机构
[1] Banaras Hindu Univ, Inst Sci, Dept Comp Sci, Varanasi 221005, India
关键词
Trust; Fog computing; Application placement; Internet of Things(ioT); MANAGEMENT; SECURITY; PRIVACY; REPUTATION; PLACEMENT; INTERNET; IOT;
D O I
10.1016/j.comcom.2022.10.022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing complements the Internet of Things (IoT)-Cloud paradigm by enabling local computation near IoT devices. Fog nodes support IoT applications such as health care monitoring, drone surveillance, and accident reporting. A minor breach or inaccurate results (caused when applications are placed at malicious fog nodes) can cause chaos or severe damage to users. Hence, it is of utmost vital that these applications must be processed at trustful fog nodes. In this work, we have proposed a responsibility-based trust revision model, named ReTREM, for determining and monitoring the trustworthiness of fog nodes. ReTREM categorizes fog nodes based on their response when they violate the promised service quality, i.e., their intention behind malicious behavior. A separate penalty mechanism is proposed for each category of fog node to discourage their malicious behavior. ReTREM considers two types of trust scores: TS1 and TS2. TS1 is calculated based on various metrics related to trust, such as reliability decay, data integrity, social rating, and feedback rating, while the fog broker gives TS2. Trust score (TS), i.e., the sum of TS1 and TS2, is revised based on various proposed penalty mechanisms. The proposed model rewards the fog node that does not violate the promised service. The proposed model is simulated and compared with the two variants of application placement, and it outperforms. The proposed model encourages fog nodes to provide the best service and increases the users' faith. The proposed model also tackles various trust-based attacks resulting in fair competition and opportunity among fog nodes.
引用
收藏
页码:159 / 172
页数:14
相关论文
共 47 条
[1]   An efficient framework for trust evaluation of secure service selection in fog computing based on QoS, reputation, and social criteria [J].
Afzali, Mahboubeh ;
Pourmohammadi, Hamid ;
Samani, Amin Mohammad Vali .
COMPUTING, 2022, 104 (07) :1643-1675
[2]   Subjective logic-based trust model for fog computing [J].
Al Muhtadi, Jalal ;
Alamri, Rawan A. ;
Khan, Farrukh Aslam ;
Saleem, Kashif .
COMPUTER COMMUNICATIONS, 2021, 178 :221-233
[3]   COMITMENT: A Fog Computing Trust Management Approach [J].
Al-khafajiy, Mohammed ;
Baker, Thar ;
Asim, Muhammad ;
Guo, Zehua ;
Ranjan, Rajiv ;
Longo, Antonella ;
Puthal, Deepak ;
Taylor, Mark .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 137 :1-16
[4]   A two-way trust management system for fog computing [J].
Alemneh, Esubalew ;
Senouci, Sidi-Mohammed ;
Brunet, Philippi ;
Tegegne, Tesf .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 106 (106) :206-220
[5]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[6]   Internet-of-Things and Information Fusion: Trust Perspective Survey [J].
Azzedin, Farag ;
Ghaleb, Mustafa .
SENSORS, 2019, 19 (08)
[7]  
Bao F., 2013, PROC IEEE 11 INT S A, P1
[8]   QoE Aware IoT Application Placement in Fog Computing Using Modified-TOPSIS [J].
Baranwal, Gaurav ;
Yadav, Ravi ;
Vidyarthi, Deo Prakash .
MOBILE NETWORKS & APPLICATIONS, 2020, 25 (05) :1816-1832
[9]   A cloud service selection model using improved ranked voting method [J].
Baranwal, Gaurav ;
Vidyarthi, Deo Prakash .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (13) :3540-3567
[10]  
Brennand CARL, 2016, 2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P982, DOI 10.1109/ISCC.2016.7543864