{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T00:49:32Z","timestamp":1778028572079,"version":"3.51.4"},"reference-count":54,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,2,25]],"date-time":"2018-02-25T00:00:00Z","timestamp":1519516800000},"content-version":"vor","delay-in-days":55,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007809","name":"Saudi Aramco","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006919","name":"Massachusetts Institute of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006919","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002383","name":"King Saud University","doi-asserted-by":"publisher","award":["RG-1438-002"],"award-info":[{"award-number":["RG-1438-002"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>Cloud computing plays a major role in smart cities development by facilitating the delivery of various services in an efficient and effective manner. In a Peer\u2010to\u2010Peer (P2P) federated clouds ecosystem, multiple Cloud Service Providers (CSPs) collaborate and share services among them when experiencing a shortage in certain resources. Hence, incoming service requests to this specific resource can be delegated to other members. Nevertheless, the lack of preexisting trust relationship among CSPs in this distributed environment can affect the quality of service (QoS). Therefore, a trust management system is required to assist trustworthy peers in seeking reliable communication partners. We address this challenge by proposing TrustyFeer, a trust management system that allows peers to evaluate the trustworthiness of other peers based on subjective logic opinions, formulated using peers\u2019 reputations and Service Level Agreements (SLAs). To demonstrate the utility of TrustyFeer, we evaluate the performance of our method against two long\u2010standing trust management systems. The simulation results show that TrustyFeer is more robust in decreasing the percentage of services that do not conform to SLAs and increasing the success rate of exchanged services by good CSPs conforming to SLAs. This should provide a trustworthy federated clouds ecosystem for a better, more sustainable future.<\/jats:p>","DOI":"10.1155\/2018\/1073216","type":"journal-article","created":{"date-parts":[[2018,2,25]],"date-time":"2018-02-25T23:30:27Z","timestamp":1519601427000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["TrustyFeer: A Subjective Logic Trust Model for Smart City Peer\u2010to\u2010Peer Federated Clouds"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4776-2216","authenticated-orcid":false,"given":"Heba","family":"Kurdi","sequence":"first","affiliation":[]},{"given":"Bushra","family":"Alshayban","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8535-4729","authenticated-orcid":false,"given":"Lina","family":"Altoaimy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3054-5015","authenticated-orcid":false,"given":"Shada","family":"Alsalamah","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,2,25]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"crossref","unstructured":"KaurM. J.andMaheshwariP. Building smart cities applications using IoT and cloud-based architectures Proceedings of the International Conference on Industrial Informatics and Computer Systems CIICS 2016 March 2016 UAE 2-s2.0-84969517288 https:\/\/doi.org\/10.1109\/ICCSII.2016.7462433.","DOI":"10.1109\/ICCSII.2016.7462433"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"e_1_2_9_3_2","article-title":"The NIST definition of cloud computing","volume":"53","author":"Mell P.","year":"2009","journal-title":"National Institute of Standards and Technology"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2522968.2522980"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.05.022"},{"key":"e_1_2_9_6_2","doi-asserted-by":"crossref","unstructured":"RiteauP. Building dynamic computing infrastructures over distributed clouds Proceedings of the 1st IEEE Symposium on Network Cloud Computing and Applications NCCA 2011 November 2011 fra 127\u2013130 2-s2.0-84856360230 https:\/\/doi.org\/10.1109\/NCCA.2011.27.","DOI":"10.1109\/NCCA.2011.27"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0153-4.ch001"},{"key":"e_1_2_9_8_2","first-page":"83","article-title":"A survey on federated clouds environment","volume":"5","author":"Shareef O.","year":"2015","journal-title":"Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"e_1_2_9_9_2","doi-asserted-by":"crossref","unstructured":"BabaogluO. MarzollaM. andTamburiniM. Design and implementation of a P2P Cloud system Proceedings of the 27th Annual ACM Symposium on Applied Computing SAC 2012 March 2012 Italy 412\u2013417 2-s2.0-84863587905 https:\/\/doi.org\/10.1145\/2245276.2245357.","DOI":"10.1145\/2245276.2245357"},{"key":"e_1_2_9_10_2","volume-title":"TRUST::DATA: A New Framework for Identity and Data Sharing","author":"Hardjono T.","year":"2016"},{"key":"e_1_2_9_11_2","article-title":"Trust: models and architecture in cloud computing","volume":"13","author":"Kaur U.","year":"2015","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"key":"e_1_2_9_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.872882"},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2015.05.06"},{"key":"e_1_2_9_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0278-0984(02)11030-3"},{"key":"e_1_2_9_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.10.007"},{"key":"e_1_2_9_16_2","doi-asserted-by":"crossref","unstructured":"HuangJ. NieF. HuangH. andTuY.-C. Trust prediction via aggregating heterogeneous social networks Proceedings of the 21st ACM International Conference on Information and Knowledge Management CIKM 2012 November 2012 USA 1774\u20131778 2-s2.0-84871041326 https:\/\/doi.org\/10.1145\/2396761.2398515.","DOI":"10.1145\/2396761.2398515"},{"key":"e_1_2_9_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2008.08.001"},{"key":"e_1_2_9_18_2","doi-asserted-by":"crossref","unstructured":"IltafN.andGhafoorA. A fuzzy based credibility evaluation of recommended trust in pervasive computing environment Proceedings of the 2013 IEEE 10th Consumer Communications and Networking Conference CCNC 2013 January 2013 USA 617\u2013620 2-s2.0-84875998328 https:\/\/doi.org\/10.1109\/CCNC.2013.6488510.","DOI":"10.1109\/CCNC.2013.6488510"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.89"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/mic.2005.136"},{"key":"e_1_2_9_21_2","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2013.12.04"},{"key":"e_1_2_9_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.07.043"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2012.09.001"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1043"},{"key":"e_1_2_9_25_2","doi-asserted-by":"crossref","unstructured":"MullerT.andSchweitzerP. On Beta Models with Trust Chains Proceedings of the Trust Management VII: 7th IFIP WG 11.11 International Conference IFIPTM 2013 Malaga Spain https:\/\/doi.org\/10.1007\/978-3-642-38323-6_4.","DOI":"10.1007\/978-3-642-38323-6_4"},{"key":"e_1_2_9_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2007.12.025"},{"key":"e_1_2_9_27_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000831"},{"key":"e_1_2_9_28_2","unstructured":"J\u00f8sangA. HaywardR. andPopeS. Trust network analysis with subjective logic Proceedings of the 29th Australasian Computer Science Conference (ACSC2006) CRPIT January 2006 Hobart Australia."},{"key":"e_1_2_9_29_2","unstructured":"ZhouR.andHwangK. Trust overlay networks for global reputation aggregation in P2P grid computing Proceedings of the 20th IEEE International Parallel Distributed Processing Symposium Rhodes Island 2006."},{"key":"e_1_2_9_30_2","doi-asserted-by":"crossref","unstructured":"KamvarS. D. SchlosserM. T. andGarcia-MolinaH. The EigenTrust algorithm for reputation management in P2P networks Proceedings of the 12th International Conference on World Wide Web (WWW \u203203) May 2003 Budapest Hungary 640\u2013651 https:\/\/doi.org\/10.1145\/775152.775242 2-s2.0-84880467894.","DOI":"10.1145\/775152.775242"},{"key":"e_1_2_9_31_2","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4361719"},{"key":"e_1_2_9_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2754934"},{"key":"e_1_2_9_33_2","doi-asserted-by":"crossref","unstructured":"AlhadadN. BusnelY. Serrano-AlvaradoP. andLamarreP. Trust evaluation of a system for an activity with subjective logic 8647 Proceedings of the International Conference on Trust Privacy and Security in Digital Business 2014 Munich Germany 48\u201359 https:\/\/doi.org\/10.1007\/978-3-319-09770-1_5 2-s2.0-84906735819.","DOI":"10.1007\/978-3-319-09770-1_5"},{"key":"e_1_2_9_34_2","doi-asserted-by":"crossref","unstructured":"ChooE. JiangJ. andYuT. COMPARS: toward an empirical approach for comparing the resilience of reputation systems Proceedings of the 4th ACM Conference on Data and Application Security and Privacy CODASPY 2014 March 2014 USA 87\u201398 https:\/\/doi.org\/10.1145\/2557547.2557565 2-s2.0-84899030739.","DOI":"10.1145\/2557547.2557565"},{"key":"e_1_2_9_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2014.10.002"},{"key":"e_1_2_9_36_2","unstructured":"QTM: P2P Trust Simulator 2009 https:\/\/rtg.cis.upenn.edu\/qtm\/p2psim.php3."},{"key":"e_1_2_9_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"e_1_2_9_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1021"},{"key":"e_1_2_9_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73547-2_22"},{"key":"e_1_2_9_40_2","doi-asserted-by":"crossref","unstructured":"AydayE.andFekriF. BP-P2P: Belief propagation-based trust and reputation management for P2P networks Proceedings of the 2012 9th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks SECON 2012 June 2012 Republic of Korea 578\u2013586 2-s2.0-84867947052 https:\/\/doi.org\/10.1109\/SECON.2012.6275830.","DOI":"10.1109\/SECON.2012.6275830"},{"key":"e_1_2_9_41_2","doi-asserted-by":"crossref","unstructured":"ZhouR.andHwangK. Gossip-based reputation aggregation for unstructured peer-to-peer networks Proceedings of the 21st International Parallel and Distributed Processing Symposium IPDPS 2007 March 2007 USA 2-s2.0-34548807996 https:\/\/doi.org\/10.1109\/IPDPS.2007.370285.","DOI":"10.1109\/IPDPS.2007.370285"},{"key":"e_1_2_9_42_2","doi-asserted-by":"crossref","unstructured":"HuaiqingL. XuezhiW. andHaitaoL. Hierarchical fuzzy trust management for peer-to-peer network Proceedings of the 2009 Second ISECS International Colloquium on Computing Communication Control and Management CCCM 2009 August 2009 China 377\u2013380 2-s2.0-70449836186 https:\/\/doi.org\/10.1109\/CCCM.2009.5270416.","DOI":"10.1109\/CCCM.2009.5270416"},{"key":"e_1_2_9_43_2","doi-asserted-by":"crossref","unstructured":"ZhaoH.andLiX. VectorTrust: Trust vector aggregation scheme for trust management in peer-to-peer networks Proceedings of the 18th International Conference on Computer Communications and Networks (ICCCN \u203209) August 2009 IEEE https:\/\/doi.org\/10.1109\/ICCCN.2009.5235290 2-s2.0-70349583369.","DOI":"10.1109\/ICCCN.2009.5235290"},{"key":"e_1_2_9_44_2","article-title":"Trust model for reliable file exchange in cloud computing","volume":"4","author":"Canedo E. D.","year":"2012","journal-title":"International Journal of Computer Science & Information Technology (IJCSIT)"},{"key":"e_1_2_9_45_2","unstructured":"DladluN.andEkabuaO. O. Implementation of a novel peer-to-peer reputation-based trust management model in a cloud service provisioning environment The International Conference on Digital Information Processing E-Business and Cloud Computing 2016 Kuala Lumpur Malaysia."},{"key":"e_1_2_9_46_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJCC.2012.046714"},{"key":"e_1_2_9_47_2","doi-asserted-by":"crossref","unstructured":"AbawajyJ. Determining service trustworthiness in intercloud computing environments Proceedings of the 10th International Symposium on Pervasive Systems Algorithms and Networks I-SPAN 2009 December 2009 Taiwan 784\u2013788 2-s2.0-77949862450 https:\/\/doi.org\/10.1109\/I-SPAN.2009.155.","DOI":"10.1109\/I-SPAN.2009.155"},{"key":"e_1_2_9_48_2","doi-asserted-by":"crossref","unstructured":"LeeS. Y. KwonO.-H. KimJ. andHongS. J. A reputation management system in structured peer-to-peer networks Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE \u203205) June 2005 362\u2013367 https:\/\/doi.org\/10.1109\/wetice.2005.9 2-s2.0-33846262184.","DOI":"10.1109\/WETICE.2005.9"},{"key":"e_1_2_9_49_2","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/637831"},{"key":"e_1_2_9_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"e_1_2_9_51_2","doi-asserted-by":"crossref","unstructured":"RuohomaaS. KutvonenL. andKoutrouliE. Reputation management survey Proceedings of the 2nd International Conference on Availability Reliability and Security ARES 2007 April 2007 Australia 103\u2013111 2-s2.0-34250181031 https:\/\/doi.org\/10.1109\/ARES.2007.123.","DOI":"10.1109\/ARES.2007.123"},{"key":"e_1_2_9_52_2","unstructured":"KaurD.andGuptaJ. S. Proposed P2P reputation-based model to secure grid Proceedings of the International Conference on Recent Advances Trends in Information Technology (iRAFIT) 2012 Patiala Punjab India."},{"key":"e_1_2_9_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.005"},{"key":"e_1_2_9_54_2","doi-asserted-by":"crossref","unstructured":"WickremasingheB. CalheirosR. N. andBuyyaR. CloudAnalyst: a cloudsim-based visual modeller for analysing cloud computing environments and applications Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications (AINA \u203210) April 2010 Perth Wash USA 446\u2013452 https:\/\/doi.org\/10.1109\/AINA.2010.32 2-s2.0-77954342012.","DOI":"10.1109\/AINA.2010.32"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/1073216.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/1073216.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/1073216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T07:42:08Z","timestamp":1723016528000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/1073216"}},"subtitle":[],"editor":[{"given":"Syed H.","family":"Ahmed","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":54,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/1073216"],"URL":"https:\/\/doi.org\/10.1155\/2018\/1073216","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2017-11-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-01-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-02-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"1073216"}}