Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2015, Article ID 709827, 10 pages
Research Article

Game Theory Based Trust Model for Cloud Environment

Ramanujan Computing Centre, Anna University, Sardar Patel Road, Chennai, Tamil Nadu 602001, India

Received 10 March 2015; Revised 4 July 2015; Accepted 21 July 2015

Academic Editor: Sung Won Kim

Copyright © 2015 K. Gokulnath and Rhymend Uthariaraj. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Bradai, W. Ben-Ameur, and H. Afifi, “Byzantine resistant reputation-based trust management,” in Proceedings of the 9th International Conference Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 269–278, Austin, Tex, USA, October 2013.
  2. A. Josang and R. Ismail, “The Beta reputation system,” in Proceedings of the 15th Bled E-Commerce Conference, Bled, Slovenia, June 2002.
  3. K. Govindan and P. Mohapatra, “Trust computations and trust dynamics in mobile adhoc networks: a survey,” IEEE Communications Surveys and Tutorials, vol. 14, no. 2, pp. 279–298, 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. H. Li and M. Singhal, “Trust in distributed systems,” in Network Security, IEEE Computer Society, 2007. View at Google Scholar
  6. Cloud Vulnerabilities Working Group, Cloud Computing Vulnerability Incidents: A Statistical Overview, CSA, 2013.
  7. C. Daskalakis, P. W. Goldberg, and C. H. Papadimitriou, “The complexity of computing a nash equilibrium,” SIAM Journal on Computing, vol. 39, no. 1, pp. 195–259, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  8. G. Zacharia, A. Moukas, and P. Maes, “Collaborative reputation mechanisms for electronic marketplaces,” Decision Support Systems, vol. 29, no. 4, pp. 371–388, 2000. View at Publisher · View at Google Scholar · View at Scopus
  9. N. Dragoni, “Toward trustworthy web services—approaches, weaknesses and trust-by-contract framework,” in Proceedings of the IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies (WI-IAT '09), vol. 3, pp. 599–606, IET, Milan, Italy, September 2009. View at Publisher · View at Google Scholar
  10. S. Gayatri, Towards reliable reputations for distributed applications [Ph.D. dissertation], University of California, Santa Barbara, Santa Barbara, Calif, USA, 2008.
  11. E. M. Maximilien and M. P. Singh, “Toward automatic web services trust and selection,” in Proceedings of the 2nd International Conference on Service Oriented Computing (ICSOC '04), pp. 212–221, ACM, November 2004. View at Scopus
  12. Z. Malik and A. Bouguettaya, “Reputation bootstrapping for trust establishment among web services,” IEEE Internet Computing, vol. 13, no. 1, pp. 40–47, 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. A. Abdul-Rahman and S. Hailes, “Supporting in virtual communities,” in Proceedings of the Hawaii International Conference on System Sciences (HICSS '00), Maui, Hawaii, USA, January 2000.
  14. Z. M. Aljazzaf, M. A. M. Capretz, and M. Perry, “Trust bootstrapping services and service providers,” in Proceedings of the 9th Annual International Conference on Privacy, Security and Trust (PST '11), pp. 7–15, IEEE, Montreal, Canada, July 2011. View at Publisher · View at Google Scholar
  15. I. M. Abbadi and M. Alawneh, “A framework for establishing trust in the cloud,” Computers & Electrical Engineering, vol. 38, no. 5, pp. 1073–1087, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. A. Josang and S. Lo Presti, “Analysing the relationship between risk and trust,” in Trust Management, Lecture Notes in Computer Science, pp. 135–145, Springer, 2004. View at Google Scholar
  17. J. F. Nash, “Equilibrium points in n-person games,” Proceedings of the National Academy of Sciences of the United States of America, vol. 36, pp. 48–49, 1950. View at Google Scholar
  18. R. Porter, E. Nudelman, and Y. Shoham, “Simple search methods for finding a Nash equilibrium,” Games and Economic Behavior, vol. 63, no. 2, pp. 642–662, 2008. View at Publisher · View at Google Scholar · View at Scopus
  19. F. Ishmanov and S. W. Kim, “A secure trust establishment in wireless sensor networks,” in Proceedings of the International Conference on Electrical Engineering and Informatics (ICEEI '11), July 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. R. N. Calheiros, R. Ranjan, C. A. F. De Rose, and R. Buyya, “Cloudsim: a novel framework for modeling and simulation of cloud computing infrastructure and services,” Tech. Rep. GRIDS-TR-2009-1, Grid Computing and Ditributed Systems Laboratory, University of Melbourne, Melbourne, Australia, 2009. View at Google Scholar