Research Article

TrustyFeer: A Subjective Logic Trust Model for Smart City Peer-to-Peer Federated Clouds

Table 1

Comparison of different trust management systems.

TypeSystemsEnvironmentTool usedTrust value evaluationPerformance measured

Peer-based trust systemsEigenTrust [30]P2P networkP2P simulatorCalculating the sum of positive and negative ratingsNumber of inauthentic files
PeerTrust [37]Decentralized P2P networkMathematica 4.0Normalizing the transaction ratingTrust computation error against malicious behaviors
PowerTrust [38]P2P Grid computingDiscrete-event driven simulatorBayesian theoryReputation convergence overhead, ranking discrepancy, and aggregation errors
HonestPeer [35]P2P networkP2P trust simulatorCalculating the global reputation of other peersSuccess rate and the percentage of inauthentic downloads
CuboidTrust [39]P2P network-Using power iterationNumber of inauthentic resource downloads under various threat models
BP-P2P [40]P2P networkMATLABUsing belief propagation distributed messageError in the reputation values of peers, the computational complexity, and the communication overhead
GossipTrust [41]P2P networkP2P trust simulatorUsing gossip protocolQuery success rate
HFTrust [42]P2P networkSimulation using JavaUsing fuzzy logicNumber of inauthentic files in the system
VectorTrust [43]P2P networkVTSim simulator using NetlogoUsing Bellman-Ford-based algorithmConvergence speed, communication overhead, malicious peer detection rate and detection speed
TNA-SL [28]P2P network-Using subjective logic-
Trust model for reliable file exchange [44]P2P private cloud-Calculating the sum of all metric values multiplied by a given weight-
Reputation-based trust model [45]P2P private cloudCloudAnalyst environment tool.Using a mathematical modelTrust rate
Trust modeling [46]P2P cloudsPeerSim simulatorUsing game theoryLevel of trust in terms of trusted and untrusted peers
Service trust worthiness [47]Intercloud computing-Based on quorum-

File-based trust systemsReputation management system [48]Structured P2P network-Using file reputation and peer reputationDegree of preventing untrustworthy files from spreading compared to existing systems

Hybrid-based trust systemsAuthenticPeer [49]P2P sensor networkP2P trust simulatorUsing [30] for peer quality and [48] for file qualitySuccess rate and the failure rate of authentic files