35,829 research outputs found

    A Multi-Dimensional and Multi-Factor Trust Computation Framework for Cloud Services

    Get PDF
    In this paper, we propose a novel trust computation framework (TCF) for cloud services. Trust is computed by taking into consideration multi-dimensional quality of service (QoS) evidence and user feedback. Feedback provides ample evidence regarding the quality of experience (QoE) of cloud service users. However, in some cases, users may behave maliciously and report false feedback. Users can carry out collusion and Sybil attacks to slander/self-promote cloud services. Trust computed in such cases could be misleading and inaccurate. Evaluating the credibility of user feedback can help in not only preventing the collusion and Sybil attacks but also remunerating the affected cloud services. Despite the advantages of credibility evaluation, very few studies take into consideration feedback credibility and multi-dimensional evaluation criteria. Considering the limitations of existing studies, we propose a new TCF in which trust is computed by aggregating multi-dimensional evidence from QoS and QoE. We have used multi-dimensional QoS attributes to compute the objective trust of cloud services. The QoS attributes are divided into three dimensions, i.e., node profile, average resource consumption, and performance. The node profile of a cloud service is attributed to CPU frequency, memory size, and hard disk capacity. The average resource consumption is quantified based on the current CPU utilisation rate, current memory utilisation rate, current hard disk utilisation rate, and energy consumption. Moreover, the performance of a cloud service is measured by the average response time and task success ratio. Besides that, the credibility of feedback is evaluated to prevent the malicious behaviour of cloud users. Our results demonstrate the effectiveness of our proposed TCF in computing accurate trust in cloud services

    Just-in-Time Memoryless Trust for Crowdsourced IoT Services

    Full text link
    We propose just-in-time memoryless trust for crowdsourced IoT services. We leverage the characteristics of the IoT service environment to evaluate their trustworthiness. A novel framework is devised to assess a service's trust without relying on previous knowledge, i.e., memoryless trust. The framework exploits service-session-related data to offer a trust value valid only during the current session, i.e., just-in-time trust. Several experiments are conducted to assess the efficiency of the proposed framework.Comment: 8 pages, Accepted and to appear in 2020 IEEE International Conference on Web Services (ICWS). Content may change prior to final publicatio

    Trustee: A Trust Management System for Fog-enabled Cyber Physical Systems

    Get PDF
    In this paper, we propose a lightweight trust management system (TMS) for fog-enabled cyber physical systems (Fog-CPS). Trust computation is based on multi-factor and multi-dimensional parameters, and formulated as a statistical regression problem which is solved by employing random forest regression model. Additionally, as the Fog-CPS systems could be deployed in open and unprotected environments, the CPS devices and fog nodes are vulnerable to numerous attacks namely, collusion, self-promotion, badmouthing, ballot-stuffing, and opportunistic service. The compromised entities can impact the accuracy of trust computation model by increasing/decreasing the trust of other nodes. These challenges are addressed by designing a generic trust credibility model which can countermeasures the compromise of both CPS devices and fog nodes. The credibility of each newly computed trust value is evaluated and subsequently adjusted by correlating it with a standard deviation threshold. The standard deviation is quantified by computing the trust in two configurations of hostile environments and subsequently comparing it with the trust value in a legitimate/normal environment. Our results demonstrate that credibility model successfully countermeasures the malicious behaviour of all Fog-CPS entities i.e. CPS devices and fog nodes. The multi-factor trust assessment and credibility evaluation enable accurate and precise trust computation and guarantee a dependable Fog-CPS system

    Integrating Taxonomies into Theory-Based Digital Health Interventions for Behavior Change: A Holistic Framework

    Full text link
    Digital health interventions have been emerging in the last decade. Due to their interdisciplinary nature, digital health interventions are guided and influenced by theories (e.g., behavioral theories, behavior change technologies, persuasive technology) from different research communities. However, digital health interventions are always coded using various taxonomies and reported in insufficient perspectives. The inconsistency and incomprehensiveness will bring difficulty for conducting systematic reviews and sharing contributions among communities. Based on existing related work, therefore, we propose a holistic framework that embeds behavioral theories, behavior change technique (BCT) taxonomy, and persuasive system design (PSD) principles. Including four development steps, two toolboxes, and one workflow, our framework aims to guide digital health intervention developers to design, evaluate, and report their work in a formative and comprehensive way
    • …
    corecore