Research Article
Game Theory Based Trust Model for Cloud Environment
Table 4
Comparison of existing and proposed methods.
| S. No | Method | Parameters | Achievements | Observations |
| 1 | Hard trust | Security features, interfaces, and service semantics. | Semantics defined for all the key attributes. Considering context level semantics. | Defining semantics for initial provider is a little complex. |
| 2 | Metric based trust | Subjective service trust metric, objective service trust metric, and trust rate. | “Services selected and trusted according to their security features, and they are discovered according to their interfaces or semantic descriptions.” | Honesty of service providers at bootstrapping level is evaluated in a lighter sense. |
| 3 | Proposed (NEM) | Risk type, application type, belief, and uncertainty. | Considering risk involved with respect to both user and service provider. | Method facilitates mutual agreement at the boot loading level. |
|
|