{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:48:18Z","timestamp":1774968498787,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,8,21]],"date-time":"2024-08-21T00:00:00Z","timestamp":1724198400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,8,21]],"date-time":"2024-08-21T00:00:00Z","timestamp":1724198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Vellore Institute of Technology, Vellore"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Cloud computing has become integral to modern computing infrastructure, offering scalability, flexibility, and cost-effectiveness. Trust is a critical aspect of cloud computing, influencing user decisions in selecting Cloud Service Providers (CSPs). This paper provides a comprehensive review of existing trust models in cloud computing, including agreement-based, SLA-based, certificate-based, feedback-based, domain-based, prediction-based, and reputation-based models. Building on this foundation, we propose a novel methodology for creating a trust model in cloud computing using digital twins for CSPs. The digital twin is augmented with a fuzzy inference system, which computes the trust score of a CSP based on trust-related parameters. The architecture of the digital twin with the fuzzy inference system is detailed, outlining how it processes security parameter values obtained through penetration testing mechanisms. These parameter values are transformed into crisp values using a linear ridge regression function and then fed into the fuzzy inference system to calculate a final trust score for the CSP. The paper also presents the outputs of the fuzzy inference system, demonstrating how different security parameter inputs yield various trust scores. This methodology provides a robust framework for assessing CSP trustworthiness and enhancing decision-making processes in cloud service selection.<\/jats:p>","DOI":"10.1186\/s13677-024-00694-w","type":"journal-article","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T14:49:40Z","timestamp":1724338180000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculation"],"prefix":"10.1186","volume":"13","author":[{"given":"Jomina","family":"John","sequence":"first","affiliation":[]},{"given":"John Singh","family":"K","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,21]]},"reference":[{"key":"694_CR1","doi-asserted-by":"publisher","unstructured":"Singh S & Kumar D (2023) Vulnerability of cyber security in cloud computing environment. In 2023 4th International conference on electronics and sustainable communication systems (ICESC)\u00a0572\u2013580. https:\/\/doi.org\/10.1109\/ICESC57686.2023.10193087","DOI":"10.1109\/ICESC57686.2023.10193087"},{"key":"694_CR2","first-page":"19","volume":"16","author":"P Shynu","year":"2016","unstructured":"Shynu P, Singh KJ (2016) A comprehensive survey and analysis on access control schemes in cloud environment. Cybern Inf Technol 16:19\u201338","journal-title":"Cybern Inf Technol"},{"key":"694_CR3","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MITP.2018.2877312","volume":"20","author":"T Weil","year":"2018","unstructured":"Weil T (2018) Taking compliance to the cloud\u2014using iso standards (tools and techniques). IT Prof 20:20\u201330. https:\/\/doi.org\/10.1109\/MITP.2018.2877312","journal-title":"IT Prof"},{"key":"694_CR4","doi-asserted-by":"publisher","unstructured":"Mohammed AM, Morsy EI & Omara FA (2018) Trust model for cloud service consumers. In 2018 International conference on Innovative Trends in Computer Engineering (ITCE)\u00a0122\u2013129.\u00a0https:\/\/doi.org\/10.1109\/ITCE.2018.8316610","DOI":"10.1109\/ITCE.2018.8316610"},{"key":"694_CR5","doi-asserted-by":"publisher","unstructured":"Lakshmi DV et al (2023) Approaches of security in cloud computing. In 2023 3rd International Conference on Smart Data Intelligence (ICSMDI)\u00a0211\u2013215.\u00a0\nhttps:\/\/doi.org\/10.1109\/ICSMDI57622.2023.00047","DOI":"10.1109\/ICSMDI57622.2023.00047"},{"key":"694_CR6","doi-asserted-by":"publisher","first-page":"43752","DOI":"10.1109\/ACCESS.2020.2978452","volume":"8","author":"H Hassan","year":"2020","unstructured":"Hassan H, El-Desouky AI, Ibrahim A, El-Kenawy E-SM, Arnous R (2020) Enhanced qos-based model for trust assessment in cloud computing environment. IEEE Access 8:43752\u201343763. https:\/\/doi.org\/10.1109\/ACCESS.2020.2978452","journal-title":"IEEE Access"},{"key":"694_CR7","doi-asserted-by":"publisher","first-page":"5171","DOI":"10.1109\/ACCESS.2017.2695657","volume":"5","author":"X Zheng","year":"2017","unstructured":"Zheng X, Xu LD, Chai S (2017) Qos recommendation in cloud services. IEEE Access 5:5171\u20135177. https:\/\/doi.org\/10.1109\/ACCESS.2017.2695657","journal-title":"IEEE Access"},{"key":"694_CR8","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.jnca.2014.07.019","volume":"45","author":"L Sun","year":"2014","unstructured":"Sun L, Dong H, Hussain FK, Hussain OK, Chang E (2014) Cloud service selection: State-of-the-art and future research directions. J Netw Comput Appl 45:134\u2013150","journal-title":"J Netw Comput Appl"},{"key":"694_CR9","doi-asserted-by":"crossref","unstructured":"Hassan H, El-Desoky A & Ibrahim A (2017) An economic model for cloud service composition based on user\u2019s preferences. In 2017 13th International Computer Engineering Conference (ICENCO)195\u2013201\u00a0(IEEE)","DOI":"10.1109\/ICENCO.2017.8289787"},{"key":"694_CR10","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s00521-016-2364-y","volume":"29","author":"J Xiahou","year":"2018","unstructured":"Xiahou J, Lin F, Huang Q, Zeng W (2018) Multi-datacenter cloud storage service selection strategy based on ahp and backward cloud generator model. Neural Comput Appl 29:71\u201385","journal-title":"Neural Comput Appl"},{"key":"694_CR11","first-page":"1964","volume":"9","author":"V Damera","year":"2020","unstructured":"Damera V, Nagesh A, Nagaratna M (2020) Trust evaluation models for cloud computing. Int J Sci Technol Res 9:1964\u20131971","journal-title":"Int J Sci Technol Res"},{"key":"694_CR12","doi-asserted-by":"crossref","unstructured":"Spanoudakis G, Damiani E & Ma\u00f1a A (2012) Certifying services in cloud: The case for a hybrid, incremental and multi-layer approach. In 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering\u00a0175\u2013176 IEEE","DOI":"10.1109\/HASE.2012.16"},{"key":"694_CR13","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/2408776.2408789","volume":"56","author":"A Sunyaev","year":"2013","unstructured":"Sunyaev A, Schneider S (2013) Cloud services certification. Commun ACM 56:33\u201336","journal-title":"Commun ACM"},{"key":"694_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2192-113X-2-9","volume":"2","author":"J Huang","year":"2013","unstructured":"Huang J, Nicol DM (2013) Trust mechanisms for cloud computing. J Cloud Comput Adv Syst Appl 2:1\u201314","journal-title":"J Cloud Comput Adv Syst Appl"},{"key":"694_CR15","doi-asserted-by":"crossref","unstructured":"Mu\u00f1oz A & Ma\u00f1a A (2013) Bridging the gap between software certification and trusted computing for securing cloud computing. In 2013 IEEE ninth world congress on services, 103\u2013110 IEEE","DOI":"10.1109\/SERVICES.2013.15"},{"key":"694_CR16","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s10489-014-0537-x","volume":"41","author":"M Mehdi","year":"2014","unstructured":"Mehdi M, Bouguila N, Bentahar J (2014) Probabilistic approach for qos-aware recommender system for trustworthy web service selection. Appl Intell 41:503\u2013524","journal-title":"Appl Intell"},{"key":"694_CR17","doi-asserted-by":"crossref","unstructured":"Qu C & Buyya R (2014) A cloud trust evaluation system using hierarchical fuzzy inference system for service selection. In 2014 IEEE 28th International conference on advanced information networking and applications, 850\u2013857 IEEE","DOI":"10.1109\/AINA.2014.104"},{"key":"694_CR18","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.jpdc.2016.05.008","volume":"96","author":"H Ma","year":"2016","unstructured":"Ma H, Hu Z, Li K, Zhang H (2016) Toward trustworthy cloud service selection: A time-aware approach using interval neutrosophic set. J Parallel Distributed Comput 96:75\u201394","journal-title":"J Parallel Distributed Comput"},{"key":"694_CR19","doi-asserted-by":"crossref","unstructured":"Ramaswamy A, Balasubramanian A, Vijaykumar P & Varalakshmi P (2011) A mobile agent based approach of ensuring trustworthiness in the cloud. In 2011 International Conference on Recent Trends in Information Technology (ICRTIT) 678\u2013682 IEEE","DOI":"10.1109\/ICRTIT.2011.5972467"},{"key":"694_CR20","doi-asserted-by":"publisher","first-page":"2276","DOI":"10.1016\/j.jss.2013.03.011","volume":"86","author":"H Mouratidis","year":"2013","unstructured":"Mouratidis H, Islam S, Kalloniatis C, Gritzalis S (2013) A framework to support selection of cloud providers based on security and privacy requirements. J Syst Softw 86:2276\u20132293","journal-title":"J Syst Softw"},{"key":"694_CR21","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1093\/comjnl\/bxu138","volume":"58","author":"A Kanwal","year":"2015","unstructured":"Kanwal A, Masood R, Shibli MA, Mumtaz R (2015) Taxonomy for trust models in cloud computing. The Comput J 58:601\u2013626","journal-title":"The Comput J"},{"key":"694_CR22","unstructured":"Prabu Ragavendiran SD, Sowmiya N SP. Analysis of Trust Score of CSPS by Comparing Service Broker Policies and Load Balancing Policies using Cloud Analyst and Fuzzy Inference System.\u00a0Int J Eng Res Technol (IJERT) RTICCT. 2019;7(01)."},{"key":"694_CR23","volume-title":"Trusted service selection in cloud computing using topsis","author":"B Parmar","year":"2018","unstructured":"Parmar B, Chauhan S (2018) Trusted service selection in cloud computing using topsis"},{"key":"694_CR24","doi-asserted-by":"crossref","unstructured":"Wang Y, Wen J, Wang X, Tao B, Zhou W. A cloud service trust evaluation model based on combining weights and gray correlation analysis. Secur Commun Netw. 2019;2019(1):2437062.","DOI":"10.1155\/2019\/2437062"},{"key":"694_CR25","first-page":"4956","volume":"34","author":"TN Mujawar","year":"2022","unstructured":"Mujawar TN, Bhajantri LB (2022) Behavior and feedback based trust computation in cloud environment. J King Saud Univ Inf Sci 34:4956\u20134967","journal-title":"J King Saud Univ Inf Sci"},{"key":"694_CR26","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1016\/j.future.2019.12.024","volume":"105","author":"A Hussain","year":"2020","unstructured":"Hussain A, Chun J, Khan M (2020) A novel customer-centric methodology for optimal service selection (moss) in a cloud environment. Futur Gener Comput Syst 105:562\u2013580","journal-title":"Futur Gener Comput Syst"},{"key":"694_CR27","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1093\/comjnl\/bxs042","volume":"55","author":"A Mu\u00f1oz","year":"2012","unstructured":"Mu\u00f1oz A, Gonzalez J, Ma\u00f1a A (2012) A performance-oriented monitoring system for security properties in cloud computing applications. The Comput J 55:979\u2013994","journal-title":"The Comput J"},{"key":"694_CR28","doi-asserted-by":"crossref","unstructured":"Tao F, Zhang M & Nee A (2019) Digital twin and cloud, fog, edge computing, 171\u2013181. Elsevier","DOI":"10.1016\/B978-0-12-817630-6.00008-4"},{"key":"694_CR29","doi-asserted-by":"publisher","first-page":"19990","DOI":"10.1109\/ACCESS.2018.2890566","volume":"7","author":"Y Xu","year":"2019","unstructured":"Xu Y, Sun Y, Liu X, Zheng Y (2019) A digital-twin-assisted fault diagnosis using deep transfer learning. IEEE Access 7:19990\u201319999. https:\/\/doi.org\/10.1109\/ACCESS.2018.2890566","journal-title":"IEEE Access"},{"key":"694_CR30","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.jmsy.2020.06.017","volume":"58","author":"M Liu","year":"2021","unstructured":"Liu M, Fang S, Dong H, Xu C (2021) Review of digital twin about concepts, technologies, and industrial applications. J Manuf Syst 58:346\u2013361. https:\/\/doi.org\/10.1016\/j.jmsy.2020.06.017. (DT3digital twin concepts can be taken)","journal-title":"J Manuf Syst"},{"key":"694_CR31","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1007\/s12652-018-0911-3","volume":"10","author":"Y Zheng","year":"2019","unstructured":"Zheng Y, Yang S, Cheng H (2019) An application framework of digital twin and its case study. J Ambient Intell Humaniz Comput 10:1141\u20131153","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"694_CR32","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-319-38756-7_4","volume-title":"Transdiscipl. perspectives on complex systems: New findings approaches","author":"M Grieves","year":"2017","unstructured":"Grieves M, Vickers J (2017) Digital twin: Mitigating unpredictable, undesirable emergent behavior in complex systems. Transdiscipl. perspectives on complex systems: New findings approaches. pp 85\u2013113"},{"key":"694_CR33","doi-asserted-by":"crossref","unstructured":"Schluse M & Rossmann J (2016) From simulation to experimentable digital twins: Simulation-based development and operation of complex technical systems. In 2016 IEEE international symposium on systems engineering (ISSE) 1\u20136 IEEE","DOI":"10.1109\/SysEng.2016.7753162"},{"key":"694_CR34","doi-asserted-by":"publisher","first-page":"1722","DOI":"10.1109\/TII.2018.2804917","volume":"14","author":"M Schluse","year":"2018","unstructured":"Schluse M, Priggemeyer M, Atorf L, Rossmann J (2018) Experimentable digital twins\u2014streamlining simulation-based systems engineering for industry 4.0. IEEE Trans Ind Inform 14:1722\u20131731","journal-title":"IEEE Trans Ind Inform"},{"key":"694_CR35","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1080\/0951192X.2019.1599433","volume":"32","author":"T Delbr\u00fcgger","year":"2019","unstructured":"Delbr\u00fcgger T, Rossmann J (2019) Representing adaptation options in experimentable digital twins of production systems. Int J Comput Integr Manuf 32:352\u2013365","journal-title":"Int J Comput Integr Manuf"},{"key":"694_CR36","doi-asserted-by":"publisher","first-page":"7","DOI":"10.3390\/systems7010007","volume":"7","author":"AM Madni","year":"2019","unstructured":"Madni AM, Madni CC, Lucero SD (2019) Leveraging digital twin technology in model-based systems engineering. Systems 7:7","journal-title":"Systems"},{"key":"694_CR37","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1080\/17517575.2018.1526324","volume":"13","author":"J Bao","year":"2019","unstructured":"Bao J, Guo D, Li J, Zhang J (2019) The modelling and operations for the digital twin in the context of manufacturing. Enterp Inf Syst 13:534\u2013556","journal-title":"Enterp Inf Syst"},{"key":"694_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.aei.2018.11.003","volume":"39","author":"AS Ullah","year":"2019","unstructured":"Ullah AS (2019) Modeling and simulation of complex manufacturing phenomena using sensor signals from the perspective of industry 4.0. Adv Eng Inform 39:1\u201313","journal-title":"Adv Eng Inform"},{"key":"694_CR39","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1109\/ACCESS.2017.2657006","volume":"5","author":"KM Alam","year":"2017","unstructured":"Alam KM, Saddik AE (2017) C2ps: A digital twin architecture reference model for the cloud-based cyber-physical systems. IEEE Access 5:2050\u20132062. https:\/\/doi.org\/10.1109\/ACCESS.2017.2657006","journal-title":"IEEE Access"},{"key":"694_CR40","doi-asserted-by":"publisher","unstructured":"Halenarova, L., Halenar, I. & Tanuska, P.\u00a0 (2022) Digital twin proposal using the matlab-stateflow model and docker containers. Institute of Electrical and Electronics Engineers Inc.\u00a0https:\/\/doi.org\/10.1109\/KI55792.2022.9925931","DOI":"10.1109\/KI55792.2022.9925931"},{"key":"694_CR41","doi-asserted-by":"publisher","unstructured":"Zhang, H., Luo, T. & Wang, Q. (2023) Adaptive digital twin server deployment for dynamic edge networks in iot system. Institute of Electrical and Electronics Engineers Inc.\u00a0https:\/\/doi.org\/10.1109\/ICCC57788.2023.10233465","DOI":"10.1109\/ICCC57788.2023.10233465"},{"key":"694_CR42","doi-asserted-by":"crossref","unstructured":"John J, John Singh K. Trust value evaluation of cloud service providers using fuzzy inference based analytical process. Sci Rep. 2024;14(1):18028.","DOI":"10.1038\/s41598-024-69134-8"},{"key":"694_CR43","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1002\/gepi.21750","volume":"37","author":"E Cule","year":"2013","unstructured":"Cule E, De Iorio M (2013) Ridge regression in prediction problems: automatic choice of the ridge parameter. Genet Epidemiol 37:704\u2013714","journal-title":"Genet Epidemiol"},{"key":"694_CR44","doi-asserted-by":"publisher","unstructured":"Sanchez, A., Zamiri, E. & Castro, A. D.\u00a0 2023 Digital controllers design using the esa control toolbox in matlab simulink. Institute of Electrical and Electronics Engineers Inc.\u00a0https:\/\/doi.org\/10.1109\/ESPC59009.2023.10298161","DOI":"10.1109\/ESPC59009.2023.10298161"},{"key":"694_CR45","doi-asserted-by":"crossref","unstructured":"Mu\u00f1oz, A., Ma\u00f1a, A. & Serrano, D.\u00a0 (2009) Avispa in the validation of ambient intelligence scenarios. In 2009 International Conference on Availability, Reliability and Security 420\u2013426 IEEE","DOI":"10.1109\/ARES.2009.80"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00694-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00694-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00694-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T13:08:57Z","timestamp":1724504937000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00694-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,21]]},"references-count":45,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["694"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00694-w","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,21]]},"assertion":[{"value":"9 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"134"}}