Identifying fake feedback for effective trust management in cloud environments

Talal H. Noor, Quan Z. Sheng, Abdullah Alfazi, Jeriel Law, Anne H.H. Ngu

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

9 Citations (Scopus)


Managing trust in cloud environments is emerging as an important issue in recent years. The highly dynamic, distributed, and non-transparent nature of cloud services makes the trust management of these services difficult. Malicious users may collude to give multiple misleading trust feedback to disadvantage a cloud service, or create several accounts and then leave misleading trust feedback to trick users into trusting cloud services that are not actually trustworthy. In this paper, we propose techniques enabling the identification of fake trust feedbacks and thus provide significant improvement on trust management in cloud environments. In particular, we introduce a credibility model that not only identifies credible trust feedbacks from fake ones, but also preserves the privacy of cloud service consumers. The techniques have been validated by a prototype system implementation and experimental studies.

Original languageEnglish
Title of host publicationService-oriented computing - ICSOC 2012 International Workshops
Subtitle of host publicationICSOC 2012, International Workshops ASC, DISA, PAASC, SCEB, SeMaPS, WESOA, and Satellite Events, Shanghai, China, November 12-15, 2012, Revised Selected Papers
EditorsAditya Ghose, Huibiao Zhu, Qi Yu, Alex Delis, Quang Z. Sheng, Olivier Perrin, Jianmin Wang, Yan Wang
Place of PublicationHeidelberg
Number of pages12
ISBN (Print)9783642378034
Publication statusPublished - 2013
Externally publishedYes
Event2012 International Conference on Service-Oriented Computing, ICSOC 2012 - Shanghai, China
Duration: 12 Nov 201215 Nov 2012

Publication series

NameLecture Notes in Computer Science
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other2012 International Conference on Service-Oriented Computing, ICSOC 2012


  • Cloud computing
  • Credentials
  • Credibility
  • Privacy
  • Reputation
  • Security
  • Trust management


Dive into the research topics of 'Identifying fake feedback for effective trust management in cloud environments'. Together they form a unique fingerprint.

Cite this