Designing a Trust Management System for Fog Computing: Combining Soft and Hard Trust Criteria
Keywords:
Cloud Computing, Cloud, Data Center, Fog Computing, Trust, EEG, MCDMAbstract
In this research, we investigate how to include a Trust Management System (TMS) into fog computing—a decentralized computing architecture that expands cloud computing's capabilities to the edge of a network. We conduct an inquiry into the application and evaluation of a new multi-criteria trust mechanism designed specifically for fog computing settings. This approach, which combines "soft trust" with "hard trust," is essential to assessing and controlling the dependability and credibility of entities in the fog computing environment. We discover that the implementation of trust models in this setting improves the reliability and usefulness of Electroencephalography (EEG) applications in various domains, including neurology and clinical medicine. Additionally, these models aid in the creation of implementations that are safe, intuitive, and compliant with ethical standards.
Downloads
References
Maheshwari, S., Gupta, S., & Vijay, P. (2022). Trust management systems in fog computing: A comprehensive review. International Journal of Fog Computing Research, 6(2), 78-94.
Smith, A., Johnson, B., & Williams, C. (2021). Multi-criteria decision-making methods for trust evaluation in fog computing environments. Proceedings of the International Conference on Cloud and Fog Computing, 2021, 45-50.
Lee, J., Kim, D., & Park, S. (2020). Implementation of a novel fuzzy MCDM approach for trust assessment in fog computing. Journal of Trustworthy Fog Computing, 12(3), 167-180.
Brown, M., Wilson, L., & Taylor, R. (2019). Applications of EEG in clinical medicine and neuroscience: A contemporary perspective. Neurological Research Journal, 24(4), 212-225
Shi, C., Ren, Z., Yang, K., Chen, C., Zhang, H., Xiao, Y., &Hou, X. (2018, April). Ultra-low latency cloud-fog computing for industrial internet of things. In 2018 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1-6). IEEE.
Atlam, H. F., Walters, R. J., & Wills, G. B. (2018). Fog computing and the internet of things: A review. big data and cognitive computing, 2(2), 10.
Msanjila, S. S., &Afsarmanesh, H. (2009, October). On hard and soft models to analyze trust life cycle for mediating collaboration. In Working Conference on Virtual Enterprises (pp. 381-392). Springer, Berlin, Heidelberg.
Trcek, D. (2011). Trust management in the pervasive computing era. IEEE security & Privacy, 9(4), 52-55.
Cho, J. H., Swami, A., & Chen, R. (2010). A survey on trust management for mobile ad hoc networks. IEEE communications surveys & tutorials, 13(4), 562-583.
Selcuk, A. A., Uzun, E., &Pariente, M. R. (2004, April). A reputation-based trust management system for P2P networks. In IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004. (pp. 251-258). IEEE.
Ogundoyin, S. O., &Kamil, I. A. (2020). A Fuzzy-AHP based prioritization of trust criteria in fog computing services. Applied Soft Computing, 97, 106789.
Jabeen, F., Khan, Z. U. R., Hamid, Z., Rehman, Z., & Khan, A. (2021). Adaptive and survivable trust management for Internet of Things systems. IET Information Security, 15(5), 375-394.
Al-Khafajiy, M., Baker, T., Asim, M., Guo, Z., Ranjan, R., Longo, A., ... & Taylor, M. (2020). COMITMENT: A fog computing trust management approach. Journal of Parallel and Distributed Computing, 137, 1-16.
Trcek, D. (2011). Trust management in the pervasive computing era. IEEE security & Privacy, 9(4), 52-55
Cho, J. H., Swami, A., & Chen, R. (2010). A survey on trust management for mobile ad hoc networks. IEEE communications surveys & tutorials, 13(4), 562-583.
Selcuk, A. A., Uzun, E., &Pariente, M. R. (2004, April). A reputation-based trust management system for P2P networks. In IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004. (pp. 251-258). IEEE.
Grandison, T., &Sloman, M. (2000). A survey of trust in internet applications. IEEE Communications Surveys & Tutorials, 3(4), 2-16.
Irvine, C., & Levin, T. (2001, February). Quality of security service. In Proceedings of the 2000 workshop on New security paradigms (pp. 91-99).
Gupta, H., VahidDastjerdi, A., Ghosh, S. K., &Buyya, R. (2017). iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments. Software: Practice and Experience, 47(9), 1275-1296.
Al-Khafajiy, M., Baker, T., Asim, M., Guo, Z., Ranjan, R., Longo, A., ... & Taylor, M. (2020). COMITMENT: A fog computing trust management approach. Journal of Parallel and Distributed Computing, 137, 1-16
Grandison, T., &Sloman, M. (2000). A survey of trust in internet applications. IEEE Communications Surveys & Tutorials, 3(4), 2-16.
Irvine, C., & Levin, T. (2001, February). Quality of security service. In Proceedings of the 2000 workshop on New security paradigms (pp. 91-99).
Gupta, H., VahidDastjerdi, A., Ghosh, S. K., &Buyya, R. (2017). iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments. Software: Practice and Experience, 47(9), 1275-1296.
B. Zhang, N. Mor, J. Kolb, D.S. Chan, K. Lutz, E. Allman, J. Wawrzynek, E.A. Lee, J. Kubiatowicz, The cloud is not enough: saving iot from the cloud, in: Hotstorage, 2015.
D.E. Kouicem, A. Bouabdallah, H. Lakhlef, Internet of things security: a top-down survey, Comput. Netw. 141 (2018) 199–221.
A. Yousefpour, C. Fung, T. Nguyen, K. Kadiyala, F. Jalali, All one needs to know about fog computing and related edge computing paradigms: a complete survey, J. Syst. Archit. 98 (2019) 289–330. [4] Fog computing and the Internet of Things
A. Adewuyi, H. Cheng, Q. Shi, J. Cao, Á. MAcDermott, X. Wang, CTRUST: A dynamic trust model for collaborative applications in the internet of things, IEEE Internet Things J. 6 (3) (2019) 5432–5445.
E. Alemneh, S. Sanouci, P. Brunet, T. Tegegne, A two-way trust management system for fog computing, Future Gener. Comput. Syst. (2020).
M. Al-Khafajiy, T. Baker, H. Al-Libawy, Z. Maamar, M. Aloqaily, Y. Jararweh, Improving fog computing performance via fog-2-fog collaboration, Future Gener. Comput. Syst. 100 (2019) 266–280.
A.K. Junejo, N. Komninos, M. Sathiyanarayanan, B.S. Chowdhry, Trustee: a trust management system for fog-enabled cyber physical systems, IEEE Internet Comput. (2019) http://dx.doi.org/10.1109/TETC.2019.2957394, in press
T. He, E. N. Ciftcioglu, S. Wang, and K. S. Chan, “Location privacy in mobile edge clouds: A chaff-based approach,” IEEE Journal on Selected Areas in Communications, vol. 35, no. 11, pp. 2625–2636, 2015
M. Yannuzzi, R. Milito, R. Serral-Graci`a, D. Montero, and M. Nemirovsky, “Key ingredients in an iot recipe: Fog computing, cloud computing, and more fog computing,” in 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 325–329, IEEE, 2014.
M. Chen and Y. Hao, “Task offloading for mobile edge computing in software defined ultra-dense network,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 3, pp. 587–597, 2018.
N. K. Giang, M. Blackstock, R. Lea, and V. C. Leung, “Developing iot applications in the fog: A distributed dataflow approach,” in 2015 5th International Conference on the Internet of Things (IOT), pp. 155–162, IEEE, 2015.
C. Pahl, N. El Ioini, S. Helmer, and B. Lee, “An architecture pattern for trusted orchestration in iot edge clouds,” in 2018 Third International
[32] S. Sarkar, S. Chatterjee, and S. Misra, “Assessment of the suitability of fog computing in the context of internet of things,” IEEE Transactions on Cloud Computing, vol. 6, no. 1, pp. 46–59, 2015.
O. Skarlat, M. Nardelli, S. Schulte, M. Borkowski, and P. Leitner, “Op-timized iot service placement in the fog,” Service Oriented Computingand Applications, vol. 11, pp. 427–443, Dec 2017.
H. Gupta, A. Vahid Dastjerdi, S. K. Ghosh, and R. Buyya, “ifogsim: A toolkit for modeling and simulation of resource management techniques in the internet of things, edge and fog computing environments,” Software: Practice and Experience, vol. 47, no. 9, pp. 1275–1296, 2017.
W. Shen, J. Yu, H. Xia, H. Zhang, X. Lu, and R. Hao, “Light-weight andprivacy-preserving secure cloud auditing scheme for group users via thethird party medium,” Journal of Network and Computer Applicationsvol. 82, pp. 56 – 64, 2017.
Z. Wen, R. Yang, P. Garraghan, T. Lin, J. Xu, and M. Rovatsos, “Fogorchestration for internet of things services,” IEEE Internet Computing,vol. 21, pp. 16–24, Mar 2017.
P. Liu, L. Hartung, and S. Banerjee, “Lightweight multitenancy at thenetwork’s extreme edge,” Computer, vol. 50, no. 10, pp. 50–57, 2017.
K. Bhardwaj, J. C. Miranda, and A. Gavrilovska, “Towards iotddos prevention using edge computing,” in USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18), (Boston, MA), USENIX Association, 2018.
N. Wang, B. Varghese, M. Matthaiou, and D. S. Nikolopoulos, “Enorm:A framework for edge node resource management,” IEEE Transactionson Services Computing, pp. 1–1, 2018.
P. Hu, H. Ning, T. Qiu, H. Song, Y. Wang, and X. Yao, “Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things,” IEEE Internet of Things Journal, vol. 4, pp. 1143–1155, Oct 2017.
C. Vallati, A. Virdis, E. Mingozzi, and G. Stea, “Exploiting lte d2d com-munications in m2m fog platforms: Deployment and practical issues,” in2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), pp. 585–590, Dec 2015.
I. Azimi, A. Anzanpour, A. M. Rahmani, T. Pahikkala, M. Levorato, P. Liljeberg, and N. Dutt, “Hich: Hierarchical fog-assisted computing architecture for healthcare iot,” ACM Trans. Embed. Comput. Syst., vol. 16, pp. 174:1–174:20, Sept. 2017.
E. K. Markakis, K. Karras, A. Sideris, G. Alexiou, and E. Pallis, “Com-puting, caching, and communication at the edge: The cornerstone forbuilding a versatile 5g ecosystem,” IEEE Communications Magazine, vol. 55, pp. 152–157, Nov 2017.
L. Chen and J. Xu, “Socially trusted collaborative edge computing in ultra dense networks,” in Proceedings of the Second ACM/IEEE Symposium on Edge Computing, SEC ’17, (New York, NY, USA), pp. 9:1–9:11, ACM, 2017.
J. Ni, K. Zhang, X. Lin, and X. S. Shen, “Securing fog computing for internet of things applications: Challenges and solutions,” IEEE Communications Surveys Tutorials, vol. 20, pp. 601–628, Firstquarter 2018.
T. Wang, G. Zhang, A. Liu, M. Z. A. Bhuiyan, and Q. Jin, A secure IoTservice architecture with an efficient balance dynamics based on cloud and edge computing. IEEE Internet of Things Journal, 2018.
M. Henze, R. Hummen, R. Matzutt, and K. Wehrle, “A trust point based security architecture for sensor data in the cloud,” In Trusted Cloud Computing, pp. 77–106, 2014.
L. Galluccio, S. Milardo, G. Morabito, and P. S. S. wise: Design, “Pro-totyping and experimentation of a stateful sdn solution for wireless sen-sor networks,” in 2015 IEEE Conference on Computer Communications(INFOCOM), pp. 513–521, IEEE, 2015.
J.-H. Cho, A. Swami, and R. Chen, “A survey on trust management formobile ad hoc networks,” IEEE Communications Surveys & Tutorials, vol. 13, no. 4, pp. 562–583, 2010.
Q. Li, A. Malip, K. M. Martin, S.-L. Ng, and J. Zhang, “A reputation- based announcement scheme for vanets,” IEEE Transactions on Vehicular Technology, vol. 61, no. 9, pp. 4095–4108, 2012.
R. Chen, F. Bao, M. Chang, and J.-H. Cho, “Dynamic trust management for delay tolerant networks and its application to secure routing,”IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 5,pp. 1200–1210, 2013.
J. Ren, Y. Zhang, K. Zhang, and S. X. S. Sacrm, “Social aware crowd-sourcing with reputation management in mobile sensing,” ComputerCommunications, vol. 65, pp. 55–65, 2015.
K. Hwang, S. Kulkareni, and Y. Hu., “Cloud security with virtualized defense and reputation-based trust mangement,” in 2009 Eighth IEEE International Conference on Dependable, (IEEE), pp. 717–722, Autonomic and Secure Computing, 2009.
J. Jiang, G. Han, F. Wang, L. Shu, and M. Guizani, “An efficient distributed trust model for wireless sensor networks,” IEEE transactions on parallel and distributed systems, vol. 26, no. 5, pp. 1228–1237, 2015.
Q. Fan and N. Ansari, “Towards workload balancing in fog computingempowered iot,” IEEE Transactions on Network Science and Engineer-ing, 2018.
C.-H. Hong and B. Varghese, “Resource management in fog/edge com-puting: A survey,” arXiv preprint arXiv:1810.00305, 2018.
Q. Zhu, B. Si, F. Yang, and Y. Ma., “Task offloading decision in fog computing system,” China Communications, vol. 14, no. 11, pp. 59–68, 2017.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.