ProTrust: A Probabilistic Trust Framework for Volunteer Cloud Computing

被引:3
作者
Alsenani, Yousef S. [1 ]
Crosby, Garth, V [2 ]
Ahmed, Khaled R. [1 ]
Velasco, Tomas [3 ]
机构
[1] Southern Illinois Univ, Sch Comp, Carbondale, IL 62901 USA
[2] Texas A&M Univ, Dept Engn Technol & Ind Distribut, College Stn, TX 77843 USA
[3] Southern Illinois Univ, Sch Appl Engn & Technol, Carbondale, IL 62901 USA
关键词
Volunteer cloud computing; volunteer computing; cloud computing; trust; reputation; IoT; REPUTATION SYSTEMS; SCHEME; MODEL;
D O I
10.1109/ACCESS.2020.3009051
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the exponential growth of large data produced by IoT applications and the need for lowcost computational resources, new paradigms such as volunteer cloud computing (VCC) have recently been introduced. In VCC, volunteers do not disclose resource information before joining the system. This leads to uncertainties about the level of trust in the system. The majority of available trust models are suitable for peerto-peer (P2P) systems, which rely on direct and indirect interaction, and might cause memory consumption overhead concerns in large systems. To address this problem, this paper introduces ProTrust, a probabilistic framework that defines the trust of a host in VCC. We expand the concept of trust in VCC and develop two new metrics: (1) trustworthiness based on the priority of a task, named loyalty, and (2) trustworthiness affected by behavioral change. We first utilized a modified Beta distribution function, and the behavior of resources are classified into different loyalty levels. Then, we present a behavior detection method to refiect recent changes in behavior. We evaluated ProTrust experimentally with a real workload trace and observed that the framework's estimation of the trust score improved by approximately 15% and its memory consumption decreased by more than 65% compared to existing methods.
引用
收藏
页码:135059 / 135074
页数:16
相关论文
共 59 条
[21]   Reputation systems: A survey and taxonomy [J].
Hendrikx, Ferry ;
Bubendorfer, Kris ;
Chard, Ryan .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2015, 75 :184-197
[22]   Trusted Cloud Computing with Secure Resources and Data Coloring [J].
Hwang, Kai ;
Li, Deyi .
IEEE INTERNET COMPUTING, 2010, 14 (05) :14-22
[23]  
Josang A., 2002, P 15 BLED EL COMM C, P2502
[24]   A survey of trust and reputation systems for online service provision [J].
Josang, Audun ;
Ismail, Roslan ;
Boyd, Colin .
DECISION SUPPORT SYSTEMS, 2007, 43 (02) :618-644
[25]  
Kamvar S. D., 2003, P 12 INT C WORLD WID, P640, DOI DOI 10.1145/775152.775242
[26]  
Kellerer H., 2004, KNAPSACK PROBLEMS, P235
[27]   Optimal Detection of Changepoints With a Linear Computational Cost [J].
Killick, R. ;
Fearnhead, P. ;
Eckley, I. A. .
JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 2012, 107 (500) :1590-1598
[28]  
Kim H, 2010, INT J GRID DISTRIB, V3
[29]  
Ko R. K. L., 2011, Proceedings of the 2011 IEEE World Congress on Services (SERVICES 2011), P584, DOI 10.1109/SERVICES.2011.91
[30]   DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System [J].
Li, Beibei ;
Lu, Rongxing ;
Wang, Wei ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) :2415-2425