Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 617087, 9 pages
http://dx.doi.org/10.1155/2014/617087
Research Article

Reputation Revision Method for Selecting Cloud Services Based on Prior Knowledge and a Market Mechanism

Information Engineering College, Henan University of Science and Technology, Luoyang 471023, China

Received 12 October 2013; Accepted 4 November 2013; Published 17 February 2014

Academic Editors: W. Sun, G. Zhang, and J. Zhou

Copyright © 2014 Qingtao Wu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Z. Yan, Y. Chen, and Y. Shen, “A practical reputation system for pervasive social chatting,” Journal of Computer and System Sciences, vol. 79, no. 5, pp. 556–572, 2013. View at Publisher · View at Google Scholar
  2. A. Satsiou and L. Tassiulas, “Reputation-based resource allocation in P2P systems of rational users,” IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 4, pp. 466–479, 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. T. Chen, A. Bansal, and S. Zhong, “A reputation system for wireless mesh networks using network coding,” Journal of Network and Computer Applications, vol. 34, no. 2, pp. 535–541, 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. B. Qureshi, G. Min, and D. Kouvatsos, “Countering the collusion attack with a multidimensional decentralized trust and reputation model in disconnected MANETs,” Multimedia Tools and Applications, vol. 66, no. 2, pp. 303–323, 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. Z. Li, H. Shen, and K. Sapra, “Leveraging social networks to combat collusion in reputation systems for peer-to-peer networks,” in Proceedings of the 25th IEEE International Parallel and Distributed Processing Symposium (IPDPS '11), pp. 532–543, May 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. L. Jiang, L. Ding, J. Liu, and J. Chen, “Reputation rating modeling for open environment lack of communication by using online social cognition,” Journal of Network and Computer Applications, vol. 35, no. 3, pp. 881–891, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. F. Faniyi and R. Bahsoon, “Self-managing SLA compliance in cloud architectures: a market-based approach,” in Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems, pp. 61–70, ACM, 2012.
  8. X. Wu, “A fuzzy reputation-based trust management scheme for cloud computing,” International Journal of Digital Content Technology and Its Applications, vol. 6, no. 17, pp. 437–445, 2012. View at Google Scholar
  9. N. Yang, X. Chen, and H. Yu, “A reputation evaluation technique for web services,” International Journal of Security and Its Applications, vol. 6, no. 2, pp. 329–334, 2012. View at Google Scholar
  10. A. Ghaffarinejad and M. K. Akbari, “An incentive compatible and distributed reputation mechanism based on context similarity for service oriented systems,” Future Generation Computer Systems, vol. 29, no. 3, pp. 863–875, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. H. Zhao, X. Yang, and X. Li, “An incentive mechanism to reinforce truthful reports in reputation systems,” Journal of Network and Computer Applications, vol. 35, no. 3, pp. 951–961, 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. X. Su, M. Zhang, Y. Mu et al., “A robust trust model for service oriented systems,” Journal of Computer and System Sciences, vol. 79, no. 5, pp. 596–608, 2013. View at Google Scholar
  13. T. Kaszuba, A. Hupa, and A. Wierzbicki, “Advanced feedback management for internet auction reputation systems,” IEEE Internet Computing, vol. 14, no. 5, pp. 31–37, 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. X. Li, F. Zhou, and X. Yang, “Scalable feedback aggregating (SFA) overlay for large-scale P2P trust management,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 10, pp. 1944–1957, 2012. View at Publisher · View at Google Scholar
  15. Z. Yan, P. Zhang, and R. H. Deng, “TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications,” Personal and Ubiquitous Computing, vol. 16, no. 5, pp. 485–506, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. M. Hawa, L. As-Sayid-Ahmad, and L. D. Khalaf, “On enhancing reputation management using Peer-to-Peer interaction history,” Peer-To-Peer Networking and Applications, vol. 6, no. 1, pp. 101–113, 2013. View at Google Scholar
  17. K. Lu, H. Jiang, M. Li et al., “Resources collaborative scheduling model based on trust mechanism in cloud,” in Proceedings of the IEEE 11th International Conference on Security and Privacy in Computing and Communications (TrustCom '12), pp. 863–868, IEEE, 2012.
  18. Y. A. Kim and R. Phalak, “A trust prediction framework in rating-based experience sharing social networks without a Web of Trust,” Information Sciences, vol. 191, pp. 128–145, 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. C. Gui, Q. Jian, H. Wang, and Q. Wu, “Repeated game theory based penalty-incentive mechanism in internet-based virtual computing environment,” Journal of Software, vol. 21, no. 12, pp. 3042–3055, 2010. View at Publisher · View at Google Scholar · View at Scopus
  20. O. Kussul, N. Kussul, and S. Skakun, “Assessing security threat scenarios for utility-based reputation model in grids,” Computers & Security, vol. 34, pp. 1–15, 2013. View at Google Scholar
  21. P. Dong-Sheng, L. Chuang, and L. Wei-Dong, “A distributed trust mechanism directly evaluating reputation of nodes,” Journal of Software, vol. 19, no. 4, pp. 946–955, 2008. View at Publisher · View at Google Scholar · View at Scopus
  22. J. Gorner, J. Zhang, and R. Cohen, “Improving trust modelling through the limit of advisor network size and use of referrals,” Electronic Commerce Research and Applications, vol. 12, no. 2, pp. 112–123, 2013. View at Google Scholar
  23. S. Zhao, G. Wu, G. Chen, and H. Chen, “Reputation-aware service selection based on QOS similarity,” Journal of Networks, vol. 6, no. 7, pp. 950–957, 2011. View at Publisher · View at Google Scholar · View at Scopus
  24. Y. Cui, M. Li, Y. Xiang, Y. Ren, and S. Cesare, “A QoS-based fine-grained reputation system in the grid environment,” Concurrency Computation Practice and Experience, vol. 24, no. 17, pp. 1990–2006, 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. M. Hussin, Y. C. Lee, and A. Y. Zomaya, “Reputation-based resource allocation in market-oriented distributed systems,” in Algorithms and Architectures for Parallel Processing, pp. 443–452, Springer, Berlin, Germany, 2011. View at Google Scholar
  26. Z. Bankovic, D. Fraga, J. Manuel Moya et al., “Improving security in WMNs with reputation systems and self-organizing maps,” Journal of Network and Computer Applications, vol. 34, no. 2, pp. 455–463, 2011. View at Publisher · View at Google Scholar · View at Scopus