Skip to main content

Advances, Systems and Applications

Table 2 Characterization of existing trust and reputation (TR) models and systems

From: Trust as a facilitator in cloud computing: a survey

Properties Trust Trust Trust Trust Transfer Attack resistance Transparent
  computation customization aggregation evaluation trust across (FPA/S/W)3 trust information4
        contexts   (UI/C)
TR models Multi-criteria Multi-root (S/H) 1 Multi-context Global trust (G) Centralized (C) (Bb vs Io vs Oi) 2    
     vs vs     
     Local trust (L) Decentralized (D)     
eBay N S/- N G C Bb No -/-/- UI/C
Epinions Y S/- Y G C Bb No -/-/- UI/C
Beta Reputation N S/- N G C Bb No -/-/- UI/-
CertainTrust N S/- N L D Bb No FPA/S/- UI/C
FIRE N S/H N L D Bb No -/-/- -/-
EigenTrust N S/- N G D Bb No -/S/- -/-
socialREGRET Y S/- N L D Bb No FPA/-/- -/-
TidalTrust N S/- N L D Bb No -/-/- -/-
RFSN N S/- N L D Bb No -/-/- -/-
GridEigenTrust N S/- Y G D Io No -/-/- -/-
Abawajy’s model N S/- N G C Bb No -/-/- -/-
TESM Y S/H N L D Io No -/-/- -/-
Unitec N S/- N G D Bb No -/-/- -/-
BNTM Y S/- Y L D Bb No -/-/- -/-
Buchegger’s model N S/- N L D Bb No FPA/-/- -/-
Billhardt’s model N S/- N L D Bb Yes -/-/- -/-
Hang’s model N S/- N L D Oi No -/-/- -/-
  1. 1(S=Soft trust; H=Hard trust).
  2. 2(Bb=Black box; Io=Inside-out; Oi=Outside-in).
  3. 3(FPA=False Praise Accusation; S=Sybil attack; W=Whitewashing attack).
  4. 4(UI=User Interface; C=Comprehensiveness).