Trust Model in Cloud Computing Environment Based on Fuzzy Theory


  • Lichuan Gu School of Computer and Information, Anhui Agricultural University No.130 ChangJiang Road, Hefei, Anhui, 230036 China
  • Chengji Wang School of Computer and Information, Anhui Agricultural University No.130 ChangJiang Road, Hefei, Anhui, 230036 China
  • Youhua Zhang School of Computer and Information, Anhui Agricultural University No.130 ChangJiang Road, Hefei, Anhui, 230036 China
  • Jinqin Zhong University School of International Business No.420 Linquan road, Hefei, Anhui, 230031 China
  • Zhiwei Ni School of Management, Hefei University of Technology No.9 Tunxi Road, Hefei, Anhui, 230009 China


Trust model, fuzzy theory, cloud computing


Recent years have witnessed the development of cloud computing. However,
there also come some security concerns in cloud computing environment, such
as emerging network attacks and intrusions, and instable cloud service provision due
to flexible cloud infrastructure and resources. To this end, we research on the trusted
computing in cloud computing environment. Specifically, in this paper, we propose
a trust model based on virtual machines, with two considerations. First, we introduce
timeliness strategy to ensure the response time and also minimize the idle time
of servers. Second, we extend the linear trust chain by differentiating the trust of
the platform domain and user domain. Besides, we develop a fuzzy theory based
method to calculate the trust value of cloud service providers. We also conduct some
experiments to evaluate our method.


Armbrust, Michael, et al. (2010); A view of cloud computing, Communications of the ACM, 53(4): 50-58.

Mell P., Grance T. (2011); The NIST definition of cloud computing, http://csrc.nist.

Lin C., Pervan G. (2001); A review of IS/IT investment evaluation and benefits management issues, problems and processes, in Information technology evaluation methods and management, ISBN:1-878289-90-X, 2-24.

Brodkin J. (2008); Gartner: Seven cloud-computing security risks. Infoworld (2008): 1-3.

Zissis D., Lekkas D. (2012); Addressing cloud computing security issues. Future Generation

Lonea A.M., Popescu D.E., Tianfield H.(2012); Detecting DDoS Attacks in Cloud Computing

Popescu D.E, , Lonea A.M. (2013); An Hybrid Text-Image Based Authentication for Cloud

Pearson S., Balacheff B., eds. (2003); Trusted computing platforms: TCPA technology in

Mitchell C. ed.(2005), Trusted computing, Institution of Electrical Engineers.

Sumrall N., Novoa M. (2003); Trusted Computing Group (TCG) and the TPM 1.2 Specification.

Blaze M., Feigenbaum J., Lacy J. (1996); Decentralized trust management. Security and

Josang A. (2001); A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3): 279-311.

Knapskog, S. J.(1998); A metric for trusted systems, Proc. of the 21st National Security Conference, Available at, 1-14.

Josang A. (1999); Trust-based decision making for electronic transactions, Proc. of the Fourth Nordic Workshop on Secure Computer Systems, 1-21.

Beth T., Borcherding M., Klein B. (1994); Valuation of trust in open networks, Springer

Meyer J. F. (1980); On evaluating the performability of degradable computing systems. Computers, IEEE Transactions on, 100(8): 720-731.

Isermann R. (1984); Process fault detection based on modeling and estimation methods, a survey. Automatica, 20(4): 387-404.

Arlat J. et al.(1993); Fault injection and dependability evaluation of fault-tolerant systems, Computers, IEEE Transactions on, 42(8): 913-923.

Smith S. W. (2002); Outbound authentication for programmable secure coprocessors. Computer Security, ESORICS, 2002. Springer Berlin Heidelberg, 72-89.

Abadi M.,Wobber T. (2004); A logical account of NGSCB. Formal Techniques for Networked

Chen S., Wen Y., Zhao H. (2007); Formal analysis of secure bootstrap in trusted computing,

Dyer J. G., et al. (2001); Building the IBM 4758 secure coprocessor. Computer, 34(10): 57-66.

Lie, David, et al.(2000); Architectural support for copy and tamper resistant software, ACM

Suh G. E. et al. (2003); AEGIS: architecture for tamper-evident and tamper-resistant processing. Proc. of the 17th annual international conference on Supercomputing. ACM, 1-18.

Chen B., Morris R. (2003); Certifying Program Execution with Secure Processors, HotOS,

MacDonald R. et al. (2003); Bear: An open-source virtual secure coprocessor based on

Marchesini J. et al.(2003); Experimenting with TCPA/TCG hardware, or: How I learned to

Sailer R. et al. (2004); Design and Implementation of a TCG-based Integrity Measurement Architecture. USENIX Security Symposium, 13:223-238.

Garfinkel T. et al.(2003); Terra: A virtual machine-based platform for trusted computing,

Berger S. et al. (2006); vTPM: virtualizing the trusted platform module, Proc. 15th Conf. on USENIX Security Symposium, 305-320.

Fullér R., Majlender P. (2001); An analytic approach for obtaining maximal entropy OWA

Saure D. et al. (2010); Time-of-use pricing policies for offering cloud computing as a service, Service Operations and Logistics and Informatics (SOLI), 2010 IEEE International Conference on, 300-305.

Bo Z. et al.(2010); The system architecture and security structure of trusted PDA, Chinese Journal of Computers, 33(1): 82-92.

Calheiros R. N. et al.(2011); CloudSim: a toolkit for modeling and simulation of cloud computing

Wang W. et al. (2012); Dynamic trust evaluation and scheduling framework for cloud computing.



Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.