indicators was defined as 0.7 and 0.3 respectively for
all participating providers.
Results show that it is possible to evaluate the
users reputation based on the use of computational re-
sources.
6 FINAL CONSIDERATIONS
This work proposed a reputation architecture for
cloud providers’ users reputation architecture based
on blockchain consortium model. The proposed ar-
chitecture aims to help cloud providers to prevent re-
source access to malicious users i.e., those whose rep-
utation value is low enough to be considered mali-
cious according to providers security policy defini-
tions. However, it is not restricted to this context and
it can be adapted and used by other computer sys-
tems. Users have their reputations calculated by com-
bining objective and subjective credibility indicators.
The objective credibility indicator is calculated with
the user resources utilization like memory, process-
ing, connection stability and payment. The subjec-
tive credibility indicator is calculated with the data
obtained in external data sources and the providers
feedback regarding user’s activities performed on the
provider. These two indicators make up the reputa-
tion value assigned to each user. Thus, reputation
value can be used by participating providers to as-
sist in their access control decisions. Results were
obtained through simulations performed with hypo-
thetical scenarios. In this way, participating providers
have access to user’s reputation values based on in-
teractions with themselves and with other participat-
ing providers through a shared and collaboratively
maintained reputation architecture. As future work,
tests are being developed with a greater number of
providers and users to assess architecture scalability
and performance.
REFERENCES
Berrached, A. and Korvin, A. (2006). Reinforcing access
control using fuzzy relation equations. In Security and
Management.
Donghong, S., Wu, L., Ping, R., and Ke, L. (2016). Reputa-
tion and attribute based dynamic access control frame-
work in cloud computing environment for privacy pro-
tection. In 2016 12th International Conference on
Natural Computation, Fuzzy Systems and Knowledge
Discovery (ICNC-FSKD), pages 1239–1245.
Du, X., Xu, J., Cai, W., Zhu, C., and Chen, Y. (2019). Oprc:
An online personalized reputation calculation model
in service-oriented computing environments. IEEE
Access, 7:87760–87768.
Greve, F., Sampaio, L., Abijaude, J., Coutinho, A. A.,
Valcy, I., and Queiroz, S. (2018). Blockchain e a
revoluc¸
˜
ao do consenso sob demanda. In Simp
´
osio
Brasileiro de Redes de Computadores e Sistemas Dis-
tribu
´
ıdos (SBRC) - Minicursos, chapter 5, page 30. So-
ciedade Brasileira de Computac¸
˜
ao - SBC.
Hendrikx, F., Bubendorfer, K., and Chard, R. (2014). Rep-
utation systems: A survey and taxonomy. Journal of
Parallel and Distributed Computing, 75.
Jansen, W. and Grance, T. (2011). Sp 800-144. guide-
lines on security and privacy in public cloud comput-
ing. Technical report, U.S Departament of Commerce,
Gaithersburg, MD, USA.
Lin, I.-C. and Liao, T.-C. (2017). A survey of blockchain
security issues and challenges. I. J. Network Security,
19:653–659.
Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L.,
and Leaf, D. (2012). NIST Cloud Computing Refer-
ence Architecture: Recommendations of the National
Institute of Standards and Technology (Special Publi-
cation 500-292). CreateSpace Independent Publishing
Platform, USA.
Mui, L., Mohtashemi, M., and Halberstadt, A. (2002).
A computational model of trust and reputation. In
Proceedings of the 35th Annual Hawaii International
Conference on System Sciences, pages 2431–2439,
Big Island, HI, USA. IEEE.
Nakamoto, S. (2009). Bitcoin: A peer-to-peer electronic
cash system,” http://bitcoin.org/bitcoin.pdf.
Nkosi, L., Tarwireyi, P., and Adigun, M. O. (2013). Detect-
ing a malicious insider in the cloud environment using
sequential rule mining. In 2013 International Confer-
ence on Adaptive Science and Technology, pages 1–
10, Pretoria, South Africa. IEEE.
Thakur, S. and Breslin, J. G. (2019). A robust reputation
management mechanism in the federated cloud. IEEE
Transactions on Cloud Computing, 7(3):625–637.
Wu, L., Zhou, S., Zhou, Z., Hong, Z., and Huang, K. (2015).
A reputation-based identity management model for
cloud computing. Mathematical Problems in Engi-
neering, 2015:1–15.
Xu, J., Du, X., Cai, W., Zhu, C., and Chen, Y. (2019).
Meurep: A novel user reputation calculation approach
in personalized cloud services. PLOS ONE, 14(6):1–
15.
Yu, X., Gao, N., and Jang, W. (2010(8)). Research on the
identity authentication technology in cloud comput-
ing. In Information Network Security, pages 71–74.
Zheng, R., Chen, J., Zhang, M., Wu, Q., Zhu, J., and
Wang, H. (2018). A collaborative analysis method
of user abnormal behavior based on reputation voting
in cloud environment. Future Gener. Comput. Syst.,
83(C):60–74.
A Consortied Ledger-based Cloud Computing Provider Users Reputation Architecture
381