ProTrust: A Probabilistic Trust Framework for Volunteer Cloud Computing

被引:3
作者
Alsenani, Yousef S. [1 ]
Crosby, Garth, V [2 ]
Ahmed, Khaled R. [1 ]
Velasco, Tomas [3 ]
机构
[1] Southern Illinois Univ, Sch Comp, Carbondale, IL 62901 USA
[2] Texas A&M Univ, Dept Engn Technol & Ind Distribut, College Stn, TX 77843 USA
[3] Southern Illinois Univ, Sch Appl Engn & Technol, Carbondale, IL 62901 USA
来源
IEEE ACCESS | 2020年 / 8卷 / 08期
关键词
Volunteer cloud computing; volunteer computing; cloud computing; trust; reputation; IoT; REPUTATION SYSTEMS; SCHEME; MODEL;
D O I
10.1109/ACCESS.2020.3009051
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the exponential growth of large data produced by IoT applications and the need for lowcost computational resources, new paradigms such as volunteer cloud computing (VCC) have recently been introduced. In VCC, volunteers do not disclose resource information before joining the system. This leads to uncertainties about the level of trust in the system. The majority of available trust models are suitable for peerto-peer (P2P) systems, which rely on direct and indirect interaction, and might cause memory consumption overhead concerns in large systems. To address this problem, this paper introduces ProTrust, a probabilistic framework that defines the trust of a host in VCC. We expand the concept of trust in VCC and develop two new metrics: (1) trustworthiness based on the priority of a task, named loyalty, and (2) trustworthiness affected by behavioral change. We first utilized a modified Beta distribution function, and the behavior of resources are classified into different loyalty levels. Then, we present a behavior detection method to refiect recent changes in behavior. We evaluated ProTrust experimentally with a real workload trace and observed that the framework's estimation of the trust score improved by approximately 15% and its memory consumption decreased by more than 65% compared to existing methods.
引用
收藏
页码:135059 / 135074
页数:16
相关论文
共 59 条
  • [21] Reputation systems: A survey and taxonomy
    Hendrikx, Ferry
    Bubendorfer, Kris
    Chard, Ryan
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2015, 75 : 184 - 197
  • [22] Trusted Cloud Computing with Secure Resources and Data Coloring
    Hwang, Kai
    Li, Deyi
    [J]. IEEE INTERNET COMPUTING, 2010, 14 (05) : 14 - 22
  • [23] A survey of trust and reputation systems for online service provision
    Josang, Audun
    Ismail, Roslan
    Boyd, Colin
    [J]. DECISION SUPPORT SYSTEMS, 2007, 43 (02) : 618 - 644
  • [24] Josang Audun, 2002, P 15 BLED EL COMM C, V5, P2502
  • [25] Kamvar S.D., 2003, P 12 INT C WORLD WID, P640, DOI DOI 10.1145/775152.775242
  • [26] Kellerer H., 2004, Knapsack Problems, P235
  • [27] Optimal Detection of Changepoints With a Linear Computational Cost
    Killick, R.
    Fearnhead, P.
    Eckley, I. A.
    [J]. JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 2012, 107 (500) : 1590 - 1598
  • [28] Kim H, 2010, INT J GRID DISTRIB, V3
  • [29] Ko R. K. L., 2011, Proceedings of the 2011 IEEE World Congress on Services (SERVICES 2011), P584, DOI 10.1109/SERVICES.2011.91
  • [30] DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System
    Li, Beibei
    Lu, Rongxing
    Wang, Wei
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) : 2415 - 2425