Skip to main content

Advances, Systems and Applications

Table 2 Characterization of existing trust and reputation (TR) models and systems

From: Trust as a facilitator in cloud computing: a survey

Properties

Trust

Trust

Trust

Trust

Transfer

Attack resistance

Transparent

 

computation

customization

aggregation

evaluation

trust across

(FPA/S/W)3

trust information4

       

contexts

 

(UI/C)

TR models

Multi-criteria

Multi-root (S/H) 1

Multi-context

Global trust (G)

Centralized (C)

(Bb vs Io vs Oi) 2

   
    

vs

vs

    
    

Local trust (L)

Decentralized (D)

    

eBay

N

S/-

N

G

C

Bb

No

-/-/-

UI/C

Epinions

Y

S/-

Y

G

C

Bb

No

-/-/-

UI/C

Beta Reputation

N

S/-

N

G

C

Bb

No

-/-/-

UI/-

CertainTrust

N

S/-

N

L

D

Bb

No

FPA/S/-

UI/C

FIRE

N

S/H

N

L

D

Bb

No

-/-/-

-/-

EigenTrust

N

S/-

N

G

D

Bb

No

-/S/-

-/-

socialREGRET

Y

S/-

N

L

D

Bb

No

FPA/-/-

-/-

TidalTrust

N

S/-

N

L

D

Bb

No

-/-/-

-/-

RFSN

N

S/-

N

L

D

Bb

No

-/-/-

-/-

GridEigenTrust

N

S/-

Y

G

D

Io

No

-/-/-

-/-

Abawajy’s model

N

S/-

N

G

C

Bb

No

-/-/-

-/-

TESM

Y

S/H

N

L

D

Io

No

-/-/-

-/-

Unitec

N

S/-

N

G

D

Bb

No

-/-/-

-/-

BNTM

Y

S/-

Y

L

D

Bb

No

-/-/-

-/-

Buchegger’s model

N

S/-

N

L

D

Bb

No

FPA/-/-

-/-

Billhardt’s model

N

S/-

N

L

D

Bb

Yes

-/-/-

-/-

Hang’s model

N

S/-

N

L

D

Oi

No

-/-/-

-/-

  1. 1(S=Soft trust; H=Hard trust).
  2. 2(Bb=Black box; Io=Inside-out; Oi=Outside-in).
  3. 3(FPA=False Praise Accusation; S=Sybil attack; W=Whitewashing attack).
  4. 4(UI=User Interface; C=Comprehensiveness).