1.
P. Varalakshmi, T. Judgi, and D. Balaji, “Trust Management Model Based on Malicious Filtered Feedback in Cloud,” Commun. Comput. Inf. Sci., vol. 804, pp. 178–187, 2018, doi: 10.1007/978-981-10-8603-8_15.
2.
T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu, “Trust management of services in cloud environments,” ACM Comput. Surv., vol. 46, no. 1, pp. 1–30, 2013, doi: 10.1145/2522968.2522980.
3.
S. Soltani, M. Asadi, D. Gaševi?, M. Hatala, and E. Bagheri, “Automated planning for feature model configuration based on functional and non-functional requirements,” in Proceedings of the 16th International Software Product Line Conference-Volume 1, pp. 56–65,2012, doi: 10.1145/2362536.2362548
4.
X. Yang, S. Wang, B. Yang, C. Ma, and L. Kang, “A service satisfaction-based trust evaluation model for cloud manufacturing,” Int. J. Comput. Integr. Manuf., vol. 32, no. 6, pp. 533–545, 2019, doi: 10.1080/0951192X.2019.1575982.
5.
E. Kristiani, C. T. Yang, Y. T. Wang, and C. Y. Huang, “Implementation of an edge computing architecture using openstack and kubernetes,” Lect. Notes Electr. Eng., vol. 514, pp. 675–685, 2019, doi: 10.1007/978-981-13-1056-0_66.
6.
G.Aghaee, G. Mehran, and M. Ramin, “A new multi ? level trust management framework ( MLTM ) for solving the invalidity and sparse problems of user feedback ratings in cloud environments,” J. Supercomput., no. 0123456789, 2020, doi: 10.1007/s11227-020-03348-1.
7.
P. Varalakshmi, T. Judgi, and D. Balaji, “Trust Management Model Based on Malicious Filtered Feedback in Cloud,” Commun. Comput. Inf. Sci., vol. 804, pp. 178–187, 2018, doi: 10.1007/978-981-10-8603-8_15.
8.
M. R. Thanka, P. Uma Maheswari, and E. B. Edwin, “An improved efficient: Artificial Bee Colony algorithm for security and QoS aware scheduling in cloud computing environment,” Cluster Comput., vol. 22, no. 5, pp. 10905–10913, 2019.
9.
H. Kurdi, A. Alfaries, A. A. S. Alkharji, M. Addegaither, L. Altoaimy, and S. Hassan, “A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments,” J. Supercomput., 2018, doi: 10.1007/s11227-018-2669-y.
10.
S. S. Manvi and G. Krishna Shyam, “Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey,” J. Netw. Comput. Appl., vol. 41, no. 1, pp. 424–440, 2014, doi: 10.1016/j.jnca.2013.10.004.
11.
E. Kristiani, C. T. Yang, Y. T. Wang, and C. Y. Huang, “Implementation of an edge computing architecture using openstack and kubernetes,” Lect. Notes Electr. Eng., vol. 514, pp. 675–685, 2019, doi: 10.1007/978-981-13-1056-0_66.
12.
https://en.wikipedia.org/wiki/Cloud_computing
13.
S. S. Manvi and G. Krishna Shyam, “Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey,” J. Netw. Comput. Appl., vol. 41, no. 1, pp. 424–440, 2014, doi: 10.1016/j.jnca.2013.10.004.
14.
Machhi, Sandip, and G. B. Jethava. "Feedback based trust management for cloud environment." In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, pp. 1-5. 2016.
15.
Siani Pearson. Privacy, security and trust in cloud computing. In Privacy and security for cloud computing, pages 3–42. Springer, 2013.
16.
Talal H Noor, Quan Z Sheng, SheraliZeadally, and Jian Yu. Trust management of services in cloud environments: Obstacles and solutions. ACM Computing Surveys (CSUR), 46(1):1–30, 2013.
17.
R Thirukkumaran et al. Survey: Security and trust management in internet of things. In 2018 IEEE global conference on wireless computing and networking (GCWCN), pages 131–134. IEEE, 2018.
18.
J. Huang and M. S. Fox, “An ontology of trust - Formal semantics and transitivity,” ACM Int. Conf. Proceeding Ser., no. January, pp. 259–270, 2006, doi: 10.1145/1151454.1151499.
19.
V. K. Damera, A. Nagesh, and M. Nagaratna, “Trust evaluation models for cloud computing,” Int. J. Sci. Technol. Res., vol. 9, no. 2, pp. 1964–1971, 2020.
20.
M. Chiregi and N. J. Navimipour, “A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leader’s entities and removing the effect of troll entities,” Comput. Human Behav., vol. 60, pp. 280–292, Jul. 2016, doi: 10.1016/j.chb.2016.02.029.
21.
R. Nagarajan, R. Thirunavukarasu, and S. Shanmugam, “A Fuzzy-Based Intelligent Cloud Broker with MapReduce Framework to Evaluate the Trust Level of Cloud Services Using Customer Feedback,” Int. J. Fuzzy Syst., vol. 20, no. 1, pp. 339–347, 2018, doi: 10.1007/s40815-017-0347-5
22.
Q. Duan, “Cloud service performance evaluation: status, challenges, and opportunities – a survey from the system modeling perspective,” Digit. Commun. Networks, vol. 3, no. 2, pp. 101–111, 2017, doi: 10.1016/j.dcan.2016.12.002.
23.
M. Tang, X. Dai, J. Liu, and J. Chen, “Towards a trust evaluation middleware for cloud service selection,” Futur. Gener. Comput. Syst., vol. 74, pp. 302–312, 2017, doi: 10.1016/j.future.2016.01.009.
24.
M. B. Smithamol and S. Rajeswari, “TMM: Trust Management Middleware for Cloud Service Selection by Prioritization,” J. Netw. Syst. Manag., vol. 27, no. 1, pp. 66–92, 2019, doi: 10.1007/s10922-018-9457-0.
25.
W. Fan and H. Perros, “A Reliability-based Trust Management Mechanism for Cloud Services,” 2013, doi: 10.1109/TrustCom.2013.194.
26.
S. K. Garg, S. Versteeg, and R. Buyya, “SMICloud?: A Framework for Comparing and Ranking Cloud Services,” no. Vm, 2011, doi: 10.1109/UCC.2011.36.
27.
N. Yadav and M. S. Goraya, “Two-way Ranking Based Service Mapping in Cloud Environment,” Futur. Gener. Comput. Syst., 2017, doi: 10.1016/j.future.2017.11.027.
28.
Y. Wang, J. Wen, X. Wang, B. Tao, and W. Zhou, “A cloud service trust evaluation model based on combining weights and gray correlation analysis,” Secur. Commun. Networks, vol. 2019, 2019, doi: 10.1155/2019/2437062.
29.
G. Obulaporam, N. Somu, G. R. ManiIyer Ramani, A. K. Boopathy, and S. S. Vathula Sankaran, “GCRITICPA: A CRITIC and grey relational analysis based service ranking approach for cloud service selection,” in International Conference on Intelligent Information Technologies, 2018, pp. 3–16.
30.
N. N. a. C. V. V. a. B. M. A. a. o. Kumbhar, “The Comprehensive Approach for Data Security in Cloud,” International Journal of Computer Applications},, vol. 39, 2012.
31.
R. R. Kumar and C. Kumar, “A multi criteria decision making method for cloud service selection and ranking,” Int. J. Ambient Comput. Intell., vol. 9, no. 3, pp. 1–14, 2018.
32.
M. Jouini and L. B. A. Rabai, “A security framework for secure cloud computing environments,” in Cloud security: Concepts, methodologies, tools, and applications, IGI Global, 2019, pp. 249–263., DOI: 10.4018/978-1-5225-8176-5.ch011.
33.
F. Nadeem, “A Unified Framework for User-Preferred Multi-Level Ranking of Cloud Computing Services Based on Usability and Quality of Service Evaluation,” IEEE Access, vol. 8, pp. 180054–180066, 2020.
34.
E. Kristiani, C.-T. Yang, Y. T. Wang, and C.-Y. Huang, “Implementation of an edge computing architecture using openstack and kubernetes,” in International Conference on Information Science and Applications, 2018, pp. 675–685.
35.
S. R. a. M. M. Sheikh Mahbub Habib, “Towards a trust management systemfor cloud computing,” p. 933–939, 2011.
36.
S. Kaushik and C. Gandhi, “Multi-level Trust Agreement in Cloud Environment,” 2019 12th Int. Conf. Contemp. Comput. IC3 2019, pp. 1–5, 2019, doi:10.1109/IC3.2019.8844933.
37.
A C. Qu, R. Buyya, A cloud trust evaluation system using hierarchical fuzzy inference system for service selection, in: Proc. - Int. Conf. Adv. Inf. Netw. Appl. AINA, no. May, 2014, pp. 850–857. doi:10.1109/AINA.2014.104.
38.
A. K. Jaithunbi, S. Sabena, and L. SaiRamesh, “Trustevaluation of public cloud service providers using genetic algorithm with intelligent rules,” Wirel. Pers. Commun., vol. 121, no. 4, pp. 3281–3295, 2021.
39.
M. B. Chhetri, Q. B. Vo, R. Kowalczyk, Policy-based automation of SLA establishment for cloud computing services, in: Proc. - 12th IEEE/ACM Int. Symp. Clust. Cloud Grid Comput. CCGrid 2012, IEEE, 2012, pp. 164–171. doi:10.1109/CCGrid.2012.116.
40.
W. Jiang, G. Wang, M. Z. A. Bhuiyan, and J. Wu, “Understanding graph-based trust evaluation in online social networks: Methodologies and challenges,” Acm Comput. Surv., vol. 49, no. 1, pp. 1–35, 2016.
41.
Ali-Eldin, A. M. T. (2022). A hybrid trust computing approach for IoT using social similarity and machine learning. PLoS ONE, 17(7 July) doi:10.1371/journal.pone.0265658.
42.
Ali-Eldin, A. M. T. (2018). Trust prediction in online social rating networks. Ain Shams Engineering Journal, 9(4), 3103-3112. doi:10.1016/j.asej.2018.03.005
43.
Hallappanavar, V. L., & Birje, M. N. (2022). Prediction of quality of service of fog nodes for service recommendation in fog computing based on the trustworthiness of users. Journal of Reliable Intelligent Environments, 8(2), 193-210. doi:10.1007/s40860-021-00149-y.
44.
Sivabalaselvamani, D., Vidhyasree, S., Pavithra, P., Soundarya, G., &Preethika, M. (2019). Books and movies recommendation and rating prediction based on collaborative filtering networks. International Journal of Advanced Science and Technology, 29(5), 705-714.
45.
Selvaraj, A., & Sundararajan, S. (2017). Evidence-based trust evaluation system for cloud services using fuzzy logic. International Journal of Fuzzy Systems, 19(2), 329-337. doi:10.1007/s40815-016-0146-4.
46.
Pandey, S., & Daniel, A. K. (2016). Fuzzy logic-based cloud service trustworthiness model. Paper presented at the Proceedings of 2nd IEEE International Conference on Engineering and Technology, ICE TECH 2016, 73-78. doi:10.1109/ICETECH.2016.7569215.
47.
Wu, Z., & Zhou, Y. (2016). Customized cloud service trustworthiness evaluation and comparison using fuzzy neural networks. Paper presented at the Proceedings - International Computer Software and Applications Conference, 1 433-442. doi:10.1109/COMPSAC.2016.86.
48.
Wang, J., Wang, M., Zhang, Z., & Zhu, H. (2022). Towards A trust evaluation framework against malicious behaviors of industrial IoT. IEEE Internet of Things Journal, 1-1. doi:10.1109/JIOT.2022.3179428.
49.
Siadat, S., Rahmani, A. M., &Navid, H. (2017). Identifying fake feedback in cloud trust management systems using feedback evaluation component and bayesian game model. Journal of Supercomputing, 73(6), 2682-2704. doi:10.1007/s11227-016-1950-1.
50.
D. a. P. V. a. P. A. a. S. A. a. S. S. Grimaldi, “A Feedback-Control Approach for Resource Management in Public Clouds,” 2015.
51.
H. Kurdi et al., “A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments,” J. Supercomput., vol. 75, no. 7, pp. 3534–3554, 2019,doi: 10.1007/s11227-018-2669-y.
52.
A. M. Mohammed, E. I. Morsy, and F. A. Omara,“Trust model for cloud service consumers,” in 2018 International Conference on Innovative Trends in Computer Engineering (ITCE), 2018, pp. 122–129, doi: 10.1109/ITCE.2018.8316610.
53.
H. Kurdi, A. Alfaries, A. A. S. Alkharji, M. Addegaither, L. Altoaimy, and S. Hassan, “A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments,” J. Supercomput., 2018, DOI: 10.1007/s11227-018-2669-y.
54.
P. Varalakshmi, T. Judgi, and D. Balaji, “Trust Management Model Based on Malicious Filtered Feedback in Cloud,” Commun. Comput. Inf. Sci., vol. 804, pp. 178–187, 2018, doi: 10.1007/978-981-10-8603-8_15.