Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

SLA-based Multi-dimensional Trust Model for Fog Computing Environments

  • Published:
Journal of Grid Computing Aims and scope Submit manuscript

Abstract

Fog computing is an extension of the cloud wherein storage, computing facilities and applications are provided as services with less latency using edge network resources for latency-sensitive smart applications. It allows smart applications to reduce network latency, enhance availability by acquiring resources in an elastic manner close to the data generating devices. This transformation has paved the way for a variety of trust, reliability and privacy-related issues, which resulted in a lack of confidence of smart application clients in the distributed public Fog service providers. Clients require Fog service providers to be trustworthy in order to confidently execute smart application tasks before sending them to cloud computing. In this paper, a multi-dimensional trust model has been presented, enabling smart application clients to determine the trustworthiness of Fog service providers in a Fog computing environment. Our contributions enabled by our proposed model focus on demonstrating three evaluations to determine the reliability of Fog service providers: i) Application’s evaluations of a Fog service provider, ii) peers' evaluations of the Fog service provider and iii) Fog auditor’s evaluations of the Fog service provider. Simulation results show that the model is feasible and can be used to determine Fog service providers' trustworthiness in a Fog computing environment. Thus, our work can help users to choose Fog service providers fairly and systematically.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Data Availability

Authors apologize that they do not own the data and cannot share it.

References

  1. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Futur. Gener. Comput. Syst. 25(6), 599–616 (2009)

    Article  Google Scholar 

  2. Mell, P., Grance, T.: The NIST definition of cloud computing. National Institute of Standards and Technology. US Department of Commerce, Special Publication. 2011, 800–145 (2011)

  3. Kim, H. S.: Fog computing and the internet of things: Extend the cloud to where the things are. Int. J. Cisco, white paper. 2016

  4. Mahmud, R., Kotagiri, R., & Buyya, R.: Fog computing: A taxonomy, survey and future directions. In Internet of everything book series, pp. 103-130. Springer, Singapore (2018)

  5. Guo, Q., Sun, D., Chang, G., Sun, L., Wang, X.: Modeling and evaluation of trust in cloud computing environments. In: 2011 3rd International Conference on Advanced Computer Control, pp. 112–116. IEEE (2011)

  6. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)

    Article  Google Scholar 

  7. Kim, H., Lee, H., Kim, W., Kim, Y.: A trust evaluation model for QoS guarantee in cloud systems. Int. J. Grid Distrib. 3(1), 1–10 (2010)

    Google Scholar 

  8. Li, X.Y., Zhou, L.T., Shi, Y., Guo, Y.: A trusted computing environment model in cloud architecture. In: 2010 International Conference on Machine Learning and Cybernetics, vol. 6, pp. 2843–2848. IEEE (2010)

  9. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th international conference on World Wide Web, pp. 640–651 (2003)

  10. Soleymani, S.A., Abdullah, A.H., Zareei, M., Anisi, M.H., Vargas-Rosales, C., Khan, M.K., Goudarzi, S.: A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing. IEEE Access 5, 15619–15629 (2017)

    Article  Google Scholar 

  11. Wang, T., Li, Y., Chen, Y., Tian, H., Cai, Y., Jia, W., Wang, B.: Fog-based evaluation approach for trustworthy communication in sensor-cloud system. IEEE Commun. Lett. 21(11), 2532–2535 (2017)

    Article  Google Scholar 

  12. Mäkitalo, N., Ometov, A., Kannisto, J., Andreev, S., Koucheryavy, Y., Mikkonen, T.: Safe, secure executions at the network edge: coordinating cloud, edge, and fog computing. IEEE Softw. 35(1), 30–37 (2017)

    Article  Google Scholar 

  13. Rahman, F.H., Au, T.W., Newaz, S.H.S., Suhaili, W.S.: Trustworthiness in Fog. In: Proceedings of the 2017 VI International Conference on Network, Communication and Computing - ICNCC 2017, pp. 207–211 (2017)

  14. Wang, T., Zhang, G., Bhuiyan, M.Z.A., Liu, A., Jia, W., Xie, M.: A novel trust mechanism based on fog computing in sensor–cloud system. Futur. Gener. Comput. Syst. 109, 573–582 (2020)

    Article  Google Scholar 

  15. Zhang, P., Zhou, M., Fortino, G.: Security and trust issues in Fog computing: A survey. Futur. Gener. Comput. Syst. 88, 16–27 (2018)

    Article  Google Scholar 

  16. Hosseinpour, F., Siddiqui, A.S., Plosila, J., Tenhunen, H.: A security framework for fog networks based on role-based access control and trust models. In International Conference on Research and Practical Issues of Enterprise Information Systems, pp. 168-180. Springer, Cham (2017)

  17. Zhang, G., Wang, T., Wang, G., Liu, A., Jia, W.: Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system. Concurr. Comput. Pract. Exp. 33(7), 1–1 (2021)

    Article  Google Scholar 

  18. Hussain, Y., Huang, Z.: TRFIoT: Trust and reputation model for Fog-based IoT, pp. 187–198. Springer, Cham (2018)

    Google Scholar 

  19. Kahla, M., Azab, M., Mansour, A.: Secure, resilient, and self-configuring fog architecture for untrustworthy IoT environments. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 49–54 (2018)

  20. Ben Amor, A., Abid, M., Meddeb, A.: A secure fog-based communication scheme. In: 2017 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), pp. 146–151 (2017)

  21. Ma, X., Li, X.: Trust evaluation model in edge computing based on integrated trust. In: Proceedings of the 2018 International Conference on Algorithms, Computing and Artificial Intelligence - ACAI 2018, pp. 1–6 (2018)

  22. Ogundoyin, S.O., Kamil, I.A.: A Fuzzy-AHP based prioritization of trust criteria in fog computing services. Appl. Soft Comput. J. 97, 106789 (2020)

    Article  Google Scholar 

  23. Al-khafajiy, M., et al.: COMITMENT: A fog computing trust management approach. J. Parallel Distrib. Comput. 137, 1–16 (2020)

    Article  Google Scholar 

  24. Alemneh, E., Senouci, S.M., Brunet, P., Tegegne, T.: A two-way trust management system for fog computing. Futur. Gener. Comput. Syst. 106, 206–220 (2020)

    Article  Google Scholar 

  25. Rahman, F.H., Au, T.W., Newaz, S.H.S., Suhaili, W.S., Lee, G.M.: Find my trustworthy fogs: A fuzzy-based trust evaluation framework. Futur. Gener. Comput. Syst. 109, 562–572 (2020)

    Article  Google Scholar 

  26. Rathee, G., Sandhu, R., Saini, H., Sivaram, M., Dhasarathan, V.: A trust computed framework for IoT devices and fog computing environment. Wirel. Netw 26(4), 2339–2351 (2020)

    Article  Google Scholar 

  27. Verma, R., Chandra, S.: A systematic survey on fog steered IoT: Architecture, prevalent threats and trust models. Int. J. Wireless Inf. Networks 28(1), 116–133 (2021)

    Article  Google Scholar 

  28. Singh, S., Sidhu, J.: Compliance-based multi-dimensional trust evaluation system fordetermining trustworthiness of cloud service providers. Futur. Gener. Comput. Syst. 67, 109–132 (2017)

    Article  Google Scholar 

  29. Sandhu, R., Toosi, A.N., Buyya, R.: An API for development of user-defined scheduling algorithms in Aneka PaaS cloud software. In: Gupta, B.B., Agarwal, P.D. (eds.) Handbook of research on cloud computing and big data applications in IoT, pp. 170–187. IGI Global, Melbourne (2019)

    Chapter  Google Scholar 

  30. Vecchiola, C., Chu, X., Buyya, R.: Aneka: A software platform for.NET based cloud compputing. Adv. Parallel Comput. 18, 267–295 (2009)

    Google Scholar 

  31. Buyya, R., Yeo, C.S., Venugopal, S.: Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities. In 2008 10th IEEE international conference on high performance computing and communications, pp. 5–13. IEEE (2008)

  32. Rédei, G.P.: Encyclopedia of genetics, genomics, proteomics, and informatics. Springer Science & Business Media (2008)

Download references

Acknowledgements

This work is partly supported by VC Research (VCR 0000071) for Prof. Chang.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Victor Chang.

Ethics declarations

Competing Interests

All the authors do not have any financial and non-financial competing interests with anyone involved.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chang, V., Sidhu, J., Singh, S. et al. SLA-based Multi-dimensional Trust Model for Fog Computing Environments. J Grid Computing 21, 4 (2023). https://doi.org/10.1007/s10723-022-09632-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10723-022-09632-z

Keywords