Previous Article in Journal
Encrypted Client Hello Is Coming: A View from Passive Measurements
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Service Recommendation Model in Cloud Environment Based on Trusted Graph-Based Collaborative Filtering Recommender System

1
School of IT and Engineering (SITE), Melbourne Institute of Technology (MIT), 288 La Trobe Street, Melbourne, VIC 3000, Australia
2
Department of Computer Science and Engineering, Manav Rachna International Institute of Research and Studies, Faridabad 121004, India
*
Author to whom correspondence should be addressed.
Network 2025, 5(3), 30; https://doi.org/10.3390/network5030030
Submission received: 30 June 2025 / Revised: 6 August 2025 / Accepted: 8 August 2025 / Published: 13 August 2025

Abstract

Cloud computing has increasingly adopted multi-tenant infrastructures to enhance cost efficiency and resource utilization by enabling the shared use of computational resources. However, this shared model introduces several security and privacy concerns, including unauthorized access, data redundancy, and susceptibility to malicious activities. In such environments, the effectiveness of cloud-based recommendation systems largely depends on the trustworthiness of participating nodes. Traditional collaborative filtering techniques often suffer from limitations such as data sparsity and the cold-start problem, which significantly degrade rating prediction accuracy. To address these challenges, this study proposes a Trusted Graph-Based Collaborative Filtering Recommender System (TGBCF). The model integrates graph-based trust relationships with collaborative filtering to construct a trust-aware user network capable of generating reliable service recommendations. Each node’s reliability is quantitatively assessed using a trust metric, thereby improving both the accuracy and robustness of the recommendation process. Simulation results show that TGBCF achieves a rating prediction accuracy of 93%, outperforming the baseline collaborative filtering approach (82%). Moreover, the model reduces the influence of malicious nodes by 40–60%, demonstrating its applicability in dynamic and security-sensitive cloud service environments.

1. Introduction

Recommendation systems have become an integral part of daily decision-making, influencing choices such as selecting an academic institution, purchasing a vehicle, or choosing a travel destination. In the context of cloud computing, they play a pivotal role in enhancing the user experience by guiding service selection based on prior interactions and preferences. The concept of recommendation systems was first introduced in the 1990s by Tapestry, which used collaborative mechanisms to collect user feedback and suggest relevant services and products [1]. Since then, these systems have evolved significantly and are now core components of major e-commerce and content delivery platforms such as Amazon, Flipkart, Google, Netflix, and YouTube [2,3]. They support business strategies through personalized product suggestions and content delivery.
A persistent challenge in cloud service delivery is the selection of the most suitable service from a diverse and dynamic pool. Recommendation systems are now considered essential for identifying user needs and enhancing interactions between service users (SUs) and service providers (SPs) [4,5]. In cloud environments, each node may function as both a service provider and a service user. The decision to recommend or reject a cloud service is often influenced by feedback collected from neighboring nodes within the computing domain.
Over the years, various algorithmic approaches have been developed for recommendation tasks, including the following:
  • Content-Based Filtering—Analyzes user preferences to recommend items similar to those previously selected.
  • Collaborative Filtering—Identifies users with similar behavior patterns and recommends items based on shared interests.
  • Hybrid Models—Combines content-based and collaborative filtering techniques to enhance accuracy and address individual limitations.
  • Knowledge-Based Recommendation Systems (RS)—Relies on domain-specific knowledge and explicit user requirements.
  • Graph-Based RS—Represents users and services as nodes in a graph, where edges denote interactions or recommendations; a random walk through the graph helps identify the most relevant service.
An overview of these recommendation schemes is illustrated in Figure 1.
In recent years, trust management systems have garnered significant attention for their potential to enhance recommendation systems, particularly in the context of cloud security. Trust-aware recommendation models are increasingly being explored as a means to ensure not only the reliability of recommended services but also protection against threats such as malicious feedback, reputation manipulation, and service-level attacks. Notably, even prominent e-commerce platforms such as Amazon and Flipkart have experienced data breaches, underscoring the urgent need for robust, trust-integrated recommendation mechanisms. Incorporating trust into recommendation frameworks is thus essential—not only to improve service reliability and user satisfaction but also to strengthen the credibility and resilience of cloud ecosystems. Effectively addressing these challenges can help bridge existing gaps in intrusion detection and enable secure, personalized, and scalable cloud service delivery [6,7,8,9].

1.1. Cloud Security

Given the multi-tenant nature of cloud systems, the attack surface is significantly expanded, increasing the risk of unauthorized access and malicious activity. Traditional access control models—such as those based on Access Control Lists (ACLs)—define user permissions according to predefined roles and attributes. However, these models are typically static and do not consider the dynamic trustworthiness of users and roles involved in service interactions. Security in cloud computing is generally categorized into hard and soft security mechanisms. Among hard security approaches, cryptographic techniques and access control policies remain the most widely adopted solutions for ensuring data confidentiality, integrity, and controlled access. In contrast, soft security mechanisms emphasize trust management and recommendation-based trust computation, providing adaptive, behavior-driven protection that complements hard security. Incorporating trust values into access control mechanisms is increasingly recognized as an effective means of enhancing the resilience and security of cloud computing environments, thereby safeguarding the integrity of data owners’ assets. Figure 2 illustrates the various security mechanisms employed in cloud systems.
Recent advancements [10,11,12,13] have aimed to enhance traditional Role-Based Access Control (RBAC) mechanisms by incorporating encryption techniques and trust-aware frameworks. For example, Saxena and Alam [10] utilized partial homomorphic encryption to enable secure role-based data access, while [11] extended this approach by integrating identity- and broadcast-based encryption to strengthen confidentiality. Additionally, ref. [12] suggested a trust-oriented RBAC model that dynamically assesses user trustworthiness to preserve data integrity during access requests. The framework introduced in [13] implemented a reinforced access control strategy to ensure reliable computing in cloud environments. While these approaches have significantly advanced the security and flexibility of access control systems, ongoing challenges include the dynamic adaptation of trust metrics, real-time scalability, and the integration of privacy-preserving techniques across heterogeneous and distributed cloud infrastructures.

1.1.1. Hard Security Mechanism—Cryptography and Access Control

Ensuring data security in public cloud environments has long been a concern, particularly because outsourced data is accessible to all service users within an organization. Implementing appropriate user-to-role mapping restrictions is essential for identifying malicious users and enforcing restricted access control. In such models, a service request is only forwarded if the requesting user_id holds a valid mapping in the ACL. The role or inheritance hierarchy governs access privileges (e.g., read, write) based on the permissions associated with each role and its subordinate levels. Once the key management policy is effectively enforced, only the authorized service users receive the decryption keys necessary to access requested data. Therefore, users must possess a legitimate and authenticated role within the organization to gain access to stored data.
However, for open and decentralized environments like the cloud, traditional hard security mechanisms—such as cryptography and RBAC—provide limited protection, mainly confined to access restriction and encryption. To enhance security beyond these boundaries, soft security mechanisms such as trust and recommendation systems must be integrated. These mechanisms help preserve the reputation of Trust Management Systems (TMS) and support the identification and recommendation of trustworthy cloud services.

1.1.2. Soft Security Mechanism—Trust

Trust is widely acknowledged as a fundamental soft security mechanism, particularly effective in assessing whether a service node is reliable or potentially malicious. Unlike hard security, trust is inherently subjective, shaped by the perceptions, sentiments, and experiences of individuals, stakeholders, and user communities. It reflects a belief or expectation about the behavior and dependability of an entity.
In cloud computing environments, SUs rely on SPs for secure resource allocation, user authentication, role assignments, and the detection of malicious nodes. Notably, trust is dynamic and time-sensitive, evolving through continued interactions and experiences. Recent years have seen an erosion of trust in cloud services due to escalating incidents of data breaches and targeted attacks, undermining user confidence and disrupting service continuity. Once users lose trust in a provider, future engagement—not only with the service but potentially with the broader business—is jeopardized.
Reputation can be viewed as the long-term accumulation of trust, built through consistent and positive interactions. Historical data, feedback, and previous recommendations are valuable indicators when evaluating a provider’s trustworthiness. Trust assessment generally encompasses multiple dimensions: defining trust parameters, trust propagation models, trust management, and quantification.
Trust computation can be classified into three key categories:
  • Direct Trust (DIT): Based on a user’s personal transaction history with the service provider.
  • Indirect Trust (IDT): Derived from feedback or recommendations by neighboring nodes.
  • Weighted Trust (WT): Combines direct and indirect trust using assigned weight factors to deliver a comprehensive trust score.
An overview of trust analysis and classification across domains is illustrated in Figure 3.
In dynamic cloud environments, traditional access control mechanisms often fall short in addressing adaptive and evolving threats. In contrast, trust-based access control models offer a flexible and context-aware alternative, enhancing security through dynamic decision-making. Trust values in such systems can be derived from self-observation or recommendations from other entities, both of which contribute to the continuous adjustment of trust scores.
In trust-enhanced access control systems, the ACL maintains trust scores associated with service nodes, which influence the authentication and authorization processes. The authenticity and access privileges of a service node or user are therefore contingent upon its evaluated trust value.
Over time, trust has been effectively incorporated into RBAC frameworks [14,15,16,17,18,19,20,21,22]. In these models, resource owners assign access privileges to roles based not only on static permissions but also on established trust and reputation. Service users mapped to these roles are permitted to access resources only if their individual trust scores meet or exceed a predefined threshold. Moreover, fluctuations in a user’s trust score dynamically influence the reputation of the associated role, thereby triggering real-time updates to access permissions throughout the system.

1.1.3. Trusted Recommendations

Trust-based recommendation systems are essential for identifying user preferences and enhancing interactions between SUs and SPs in cloud environments [23,24]. Beyond service personalization, such systems play a pivotal role in computing trust, which can be harnessed as a form of soft security.
In distributed cloud architectures, services may be recommended or rejected based on feedback and ratings from neighboring nodes, influencing trust-based decision-making. Over time, various algorithmic techniques have been developed to improve the accuracy and relevance of recommendations. Recent advancements indicate that TMSs can complement these models to address growing security challenges in cloud environments.
By integrating trust into recommendation frameworks, systems can more effectively distinguish between reliable and potentially malicious services, thereby strengthening both service reliability and cloud security. While selecting a trustworthy cloud service remains a primary concern for users, accurately modeling user preferences and predicting future service needs is equally critical. Trust-aware recommendation systems thus represent a promising approach for enabling secure, personalized, and adaptive service selection in dynamic and distributed cloud infrastructures [25,26,27,28].

1.2. Novelty and Contributions

This work proposes a novel and enhanced approach—Trust Graph-Based Collaborative Filtering for cloud service recommendation. In this framework, both SUs and SPs are represented as nodes, and Pearson’s Correlation Coefficient is employed to compute similarity between these nodes.
TGBCF is a hybrid approach, combining collaborative filtering with graph-based techniques. The collaborative filtering component utilizes the service-user matrix to assess similarity and predict ratings, while the graph-based component constructs a trust network and facilitates trust propagation. The recommendations generated are subsequently used to derive indirect trust, which is then leveraged in the computation of weighted trust.
Given that trust serves as a soft security mechanism, the proposed model addresses reputation-based attacks and enhances the overall security and reliability of cloud computing systems. Furthermore, restricted access control is incorporated by identifying and mitigating the influence of untrusted rating values. To bridge the identified research gaps, the TGBCF model contributes the following:
  • Refinement of Trust Values through recommendation-based security analysis to detect and isolate malicious entities.
  • Compute Shortest Distance between the service users using cosine similarity, based on the angular proximity of users in a distributed environment.
  • Inference of Trust and construction of a Trusted User Network Set (TUNS) to enable propagation of trust.
  • Similarity Index (SI) computation between the SUs on the basis of the evaluated distance between them.
  • Weighted Trust computation, by assigning weights with the evaluated parameters SI and Overall Aggregate Trust (OAT) values.
  • Prediction of Trusted Ratings for cloud services by utilizing the SI values of users within the TUNS and the OAT, followed by updates to the service-user matrix (SUM).
The remainder of this paper is organized as follows: Section 2 presents a review of the literature on recommendation systems and trust-based models; Section 3 outlines the identified research gaps and motivation behind the TGBCF model; Section 4 describes the TGBCF framework in detail; Section 5 discusses the simulation setup, evaluation metrics, experimental results, and comparative analysis; Section 6 provides a formal analysis of the proposed work; Section 7 concludes the paper; Section 8 highlights future research directions.

2. Literature Review

Trust and reputation, though closely related, are conceptually distinct. Trust is typically established directly between two entities based on prior interactions or observations, whereas reputation is derived from aggregated feedback, ratings, or recommendations from a broader community. In cloud computing environments, an SP’s reputation is significantly influenced by feedback received from service users, SUs, over time. Reputation-based trust can thus be seen as a cumulative indicator of an SP’s reliability and service quality, informed by historical interactions and community evaluations [29,30,31].
In trust-based access control systems, a trust threshold is employed to determine user authorization. Entities with trust values falling below this threshold are removed from the ACL and added to a revocation list. This mechanism helps isolate potentially malicious users and maintain the integrity of the cloud environment [32]. To address cloud-specific security challenges, Trust and Reputation-Based Access Control (TRRBAC) models have been developed. For instance, the model proposed in [33] demonstrates improved resilience against various security threats when compared to traditional RBAC. However, such models often entail increased computational complexity, particularly when integrating penalty mechanisms for negative feedback.
Trust serves as a foundational element in ensuring security and privacy within cloud systems [34]. Several models have explored trust-policy integration to enhance system protection [35,36,37,38,39]. Among these, recommendation systems play a pivotal role in establishing reputation by leveraging user feedback and rating data. These systems span multiple categories, including Content-Based Filtering, Collaborative Filtering, Hybrid Recommender Systems, Knowledge-Based RS, and Graph-Based RS [40,41,42,43].
Despite their strengths, recommendation systems face inherent limitations, such as data sparsity—resulting from limited available ratings—and the cold-start problem, which arises when there is insufficient historical data for new users or services [44,45,46]. Nevertheless, trust computation via recommendation mechanisms has proven effective for identifying malicious nodes. A critical vulnerability arises when malicious nodes outnumber trusted ones, leading to threats such as Sybil attacks, collusion, Denial-of-Service (DoS) attacks, and on/off attacks. For example, in on/off attacks, adversaries act legitimately over time before introducing malicious behavior, thereby evading detection. In DoS attacks, malicious users exhaust system resources to disrupt service availability. Mapping user item ratings to trust values—and filtering those that fall below a trust threshold—is vital for mitigating such threats.
Identifying trustworthy services remains a key challenge for users in dynamic cloud environments. Over the years, diverse strategies for trust computation have been suggested, including data flow-based models, ACL interpretations, and cumulative trust models [12,47,48]. For example, ref. [47] demonstrates how stored service ratings can be effectively processed to derive trust values. Other studies have investigated the reliability of feedback-based ratings and their influence on trust accuracy [49,50,51,52]. Yet, trust remains a multi-dimensional construct, as service providers may exhibit inconsistent behavior across different contexts. Consequently, trusted recommendation systems are essential for accurately interpreting user needs, safeguarding interactions, and preserving the reputation of the TMS.
In recent years, various trust models have been developed to enhance secure access control in cloud environments [53,54,55,56,57,58]. However, the dynamic behavior of user roles in cloud computing necessitates adaptive mechanisms that allow for the revocation or reassignment of roles based on evolving trust metrics. Among the early contributions, Li and Du [59] introduced the “Cloud-Trust” model—an adaptive trust framework that enabled service users to select reliable service providers (SPs) based on dynamic trust assessments. Subsequently, Lin et al. [60] suggested an access control based on mutual trust, which considered both the behavior of service nodes and the trust placed in them by users. These approaches laid the groundwork for trust-aware access control, yet challenges persisted in scalability and resilience to attacks.
Building on the RBAC paradigm, researchers such as Hakim et al. [61], Uikey and Bhilare [62], and Zhou et al. [63] incorporated trust evaluations into role-based access decisions. Zhou et al. proposed two prominent trust models based on probabilistic theory—the Owner-Role mapped RBAC and the Role-User mapped RBAC—that enabled resource owners to evaluate the trustworthiness of roles and users. However, these models remained vulnerable to collusion and on/off attacks. In response, Uikey and Bhilare [62] introduced a trust-aware RBAC extension aimed at mitigating such threats, but it continued to be susceptible to Sybil attacks and coordinated manipulation.
To address performance concerns, Zhang et al. [64] focused on reducing the computational overhead of trust evaluation while improving the identification of malicious nodes. Additionally, Ghafoorian et al. [33] introduced the Comprehensive Trust and Reputation-Based Access Control model, which demonstrated improved resistance to security threats compared to traditional RBAC systems. However, the inclusion of a penalty mechanism for negative feedback increased computational complexity, and accurate detection of malicious behavior became more challenging as the network scaled.
Despite advancements, computational modeling of trust remains difficult due to its subjective and context-dependent nature. Trust evaluation mechanisms such as direct trust, indirect trust, and weighted trust—as explored in [12,33]—are often influenced by biased or fabricated feedback, leading to potentially inaccurate trust assessments. Although weighted trust integrates both direct interactions and external recommendations, there remains a need for an unbiased and integrated approach that generates reliable trust scores for service recommendation.
The increasing reliance on recommendation systems has also heightened the risk of malicious behavior in cloud environments. Common attacks include collusion—where a group of malicious nodes submits false feedback to manipulate reputation—and Sybil attacks, where fake identities are created to skew trust scores [65,66]. E-commerce platforms like Amazon and Flipkart have experienced such threats firsthand, underscoring the need for secure recommendation mechanisms.
Recent advancements in trust-based access control have explored social and contextual trust models to improve cloud security. Zarghami et al. [67] proposed a social trust-aware recommendation system (TAWRM) that used a t-index approach to quantify trust in social networks, highlighting the importance of contextual interactions in refining service recommendations. This approach introduced a novel perspective by incorporating social behavior into trust evaluation—an aspect often overlooked by traditional trust mechanisms.
In efforts to enhance collaborative filtering accuracy, Kim [68] introduced an improved similarity measure within the User-Based Collaborative Filtering (UBCF) framework. This addressed the sparsity issue by factoring in user contribution levels, thereby improving rating coverage and diversity. However, the model’s reliance on static similarity computations limited its adaptability to dynamic user behavior. Complementarily, Lebib et al. [69] presented a Social Trust Recommendation based on Probability Matrix Factorization (STRPMF) approach for cloud service recommendation. Their method incorporated social trust information to mitigate cold-start and sparsity issues but assumed static trust relationships and did not accommodate evolving trust dynamics or role-sensitive access control.
Further building on the RBAC framework, Zhou et al. [70] suggested a trust-aware RBAC model for secure cloud data storage by mapping trust values to roles. This dynamic approach enhanced the flexibility of RBAC in handling uncertain or changing user behavior. Alshammari et al. [71] extended this work by presenting a multicriteria trust evaluation model integrated with task-based RBAC. Their framework effectively balanced multiple trust dimensions—including feedback credibility, interaction history, and contextual awareness—to ensure reliable task–role mappings in cloud environments.
Collectively, these models reflect the state of the art in trust-enhanced access control and emphasize the need for multidimensional, adaptive trust evaluation mechanisms. Such mechanisms are essential to counter manipulation, improve access flexibility, and secure user interactions in decentralized cloud systems.
When integrated with the soft security mechanism of trust, recommendation systems can function as effective anomaly detection tools. They can identify deceptive user patterns, fake reviews, and malicious feedback loops. Trust-based recommendation systems not only guide service selection but also help prevent social engineering attacks (e.g., phishing) and cloud-specific threats, including DoS, collusion, and on/off attacks [72,73].
Table 1 presents a structured summary of key findings from the existing literature on trust and reputation mechanisms in cloud computing. It categorizes each work by its nature, contributions, methodology, and the gaps identified, offering a synthesized view of how trust-based models have evolved and the challenges that remain in this domain.

3. Identified Research Gaps and Motivation

With the exponential growth of cloud-based services and digital platforms, users increasingly rely on recommendation systems to discover relevant and trustworthy services. While traditional recommender models have achieved notable success in personalized content delivery, they often overlook critical security concerns, particularly in open and distributed environments like the cloud. This oversight makes such systems vulnerable to threats including Sybil attacks, collusion, and malicious feedback manipulation, which directly impact the reliability of service predictions.
The analysis of the recent literature highlights two key Research Gaps (RG):
  • RG1: Lack of robust security evaluation frameworks capable of validating TMS based on user feedback, leading to an increased vulnerability to illicit access and network-level concerns such as Sybil, collusion, and DoS attacks.
  • RG2: Absence of effective trust-aware recommendation models that can address core challenges such as data sparsity and cold-start problems, thereby compromising the accuracy of service predictions.
These gaps compromise both the predictive accuracy and the resilience of existing systems. Consequently, there is a pressing need for a unified model that not only enhances the relevance of recommendations but also integrates a trust management layer to defend against malicious behavior. To this end, there is a pressing need “To develop an enhanced recommendation system by integrating the soft security mechanism of trust, thereby enabling accurate and reliable service rating predictions, while simultaneously addressing security threats and improving the resilience of cloud service interactions.”
This research is driven by the findings of [67,68,69] to strengthen cloud service recommendation by integrating the soft security mechanism of trust with recommendation systems, thereby ensuring enhanced security, access control, and reliability in cloud service provisioning.

4. Proposed Work—TGBCF

This section presents a hybrid trust-based recommendation model that integrates Graph-Oriented Collaborative Filtering Recommender Systems to enhance the reliability of cloud service recommendations. The TGBCF model employs Pearson’s Correlation Coefficient parameter to evaluate similarity amongst the service nodes, utilizing a service-user interaction matrix to facilitate both rating prediction and similarity computation. A Trusted User Network Set is constructed by combining graph traversal techniques with user–service interaction data to identify reliable neighboring nodes. Security is reinforced through the integration of soft security mechanisms, which evaluate direct trust, indirect trust, and weighted trust derived from historical service interactions and user feedback. This multi-layered trust evaluation framework empowers the TGBCF model to effectively detect untrusted or manipulated ratings, enabling the isolation of potentially malicious nodes and enforcing restricted access control in a centralized cloud environment. Direct trust is computed based on the feedback from previous service transactions between service users and providers, ensuring a strong and transparent foundation for trust estimation. Each user–provider interaction is systematically recorded in the service-user matrix, enabling ongoing refinement of similarity scores and trust values for adaptive and secure service recommendations. The service interactions can be either positive or negative, represented by p f or n f respectively. The proposed work assumes that for each interaction, the number of positive and negative feedback increases by “1” as illustrated in Equations (1) and (2), respectively. Here, p f ( t ) and n f ( t ) are positive feedback and negative feedback at time (t), respectively.
p f t = p f t 1 + 1
n f t = n f t 1 + 1
The DIT is computed if a sufficient number of service interactions exist between the SU and the SP using the following equation:
D I T = p f t p f t + n f t
This is recorded as the initiating rating value in the service-user matrix to compute the recommender trust or indirect trust and predicted unknown service rating values for a service request using the Trusted User Network Set and similarity value.

4.1. Working of the TGBCF Model

The system architecture of the TGBCF model incorporates a structured communication framework to ensure secure access control and trust management in a cloud environment. An architectural diagram of the proposed hybrid recommendation model is presented in Figure 4. The model integrates graph-based trust computation with collaborative filtering techniques to construct a Trusted User Network Set, compute similarity using Pearson’s Correlation Coefficient, and generate reliable service ratings by isolating malicious feedback through comprehensive trust evaluation.
The cloud administrator defines the role hierarchy, and the associated system parameters are uploaded to the cloud via Communication Channel 1. Since roles facilitate service user registration, the corresponding role parameters are transmitted to the cloud using Channel 2. To preserve data confidentiality against potentially untrusted cloud service providers, data owners upload encrypted data through Channel 3. When an SU initiates a data access request, it is routed via Channel 4 to the User Monitor Module, which verifies the request by matching the user’s attributes against administrator-defined parameters received through Channel 5. Access is provided if a legitimate match is discovered; if not, the request is rejected. The outcome of the request is communicated back to the User Monitor Module via Channel 6 and subsequently logged in the database through Channel 7. Although the role attributes are stored in the cloud (via Channel 2), their integrity must be continuously monitored. To address this, the Trust-Oriented Role-Based Access Control (TRBAC) model incorporates a Role Monitor Module responsible for assessing the ongoing trustworthiness of roles. If a role exhibits malicious behavior or receives negative feedback, the central repository is updated accordingly. Role updates are sent to the Role Monitor Module through Channel 8, which evaluates their trust integrity and relays updates to the cloud via Channel 9. At this point, the Cloud Service Provider (CSP) possesses the following:
  • Role information via Channel 2;
  • System parameters via Channel 1;
  • Role updates via Channel 9.
The CSP then acknowledges the receipt to the Role Monitor Module via Channel 10, and the updated role details are stored in the database through Channel 11. For decision-making, the central repository forwards relevant user and role credentials to the Trust Engine using Channel 12. Based on the computed trust values, the engine determines suitable role assignments. If a role’s trust score falls below a predefined threshold, revocation instructions are communicated to the Role Repository and Data Owner via Channels 13 and 14, respectively. The Trust Decision Engine also disseminates updated trust values for service nodes (users or roles), which are used to update the service-user matrix for further recommendation computation. These trust scores—both direct and indirect—serve as inputs to the SUM and support accurate rating prediction via Channels 15, 16, and 17. Trusted network sets are constructed based on cosine similarity among service users, while indirect trust is computed using the shortest path distance between users within the cloud graph structure.

4.2. Algorithmic Simulation of TGBCF

The TGBCF model constructs a Trusted User Network Set for each service user based on the distance between the users within the computing environment. The underlying work assumes that the greater the distance between two users, the lower the degree of trust shared between them. Conversely, users positioned closer in the trust graph exhibit a higher level of trust. This relationship follows an inverse proportionality between trust and user distance, as formalized using a trusted six-degree segmentation scheme [74,75]. The trust value estimated through this distance-based evaluation is referred to as Inferred Trust (INT), as defined in Equation (4) below.
I N T ( u i , u j ) = 1 D u i , u j
where D is the distance between the service users u i ,   u j respectively. Further, the similarity between the two service users is computed using the cosine similarity function. Since cos 90 ° = 0 , in order to build a Trusted User Network Set, the proposed work assumes a considerably lower Angle of Inclination (AI) of 80 ° to attain the trusted level of similarity index for security analysis. Hence, the assumed threshold (TH) to measure the AI between two users u i , u j in this work is 80 ° . If user u j is inclined at an angle ≤ 80 ° , it belongs to the trusted network set of user u i , else the request for inclusion the trust network is declined. Algorithm 1 below illustrates the methodology for TUNS construction.
Algorithm 1 Trusted User Network Construction
Input: SUM and AI between service users.
Output: Trust user network set TUNS;
1. Initialize T U N S u i
2. for (any two users u i and u j in the SUM)
  If (AI of u j < TH) then
   u j ∈ TUNS of u i
3.  Add user ( u j , TUNS)
4.  end if
5. end for
6. Return TUNS
Equation (5) below illustrates the trusted network set creation:
T U N S u i = u j A I   u j < T H , u j S U M
The Angle of Inclination is computed using the cosine similarity function with the help of the following equation:
cos θ = s i m A I ( u i , u j ) = u i · u j u i u j
The TGBCF model utilizes Pearson’s Correlation Coefficient to evaluate the Similarity Index S I u i , u j the value between the two service users u i   and   u j as shown in Equation (7) below:
S I u i , u j = ( i T U N S ) s x ( r u i , s x r u i ¯ ) ( r u j , s x r u j ¯ ) ( i T U N S ) s x ( r u i , s x r u i ¯ ) 2 · ( i U T N S ) s x ( r u j , s x r u j ¯ ) 2
where ( i T U N S ) s x symbolizes the values of direct trust ratings for the cloud services provided by the SUs u i and u j . Further, r u i , s x and r u j , s x are the direct trust ratings given by users u i and u j for a cloud service s x in the service-user matrix. Further, r u i ¯ and r u j ¯ are the average direct trust ratings for the cloud services provided by users u i and u j in the service-user matrix. The similarity range for service-user rating values is [ 1 , 1 ] . However, this work assumes that if S I u i , u j = 0 , no similarities exist between the set of service users; if S I u i , u j < 0 , the relationship between users is not trustworthy; and if S I u i , u j > 0 , a trust relationship exists between the service users. This work at present considers only those values for whom a trusted similarity index value exists. Hence, the users having S I u i , u j 0 are discarded by the trust management system. Once the similarities between the two SUs are computed, the TGBCF model evaluates the Overall Aggregate Trust (OAT). A service request made at a specific time is taken into account while calculating the Overall Aggregate Trust (OAT). The TMS includes only those service users in its evaluation who have previously rated the requested service within the SUM. The OAT between two service users u i and u j is computed using the following equation:
O A T u i , u j =   w *   S I u i , u j + ( 1 w ) *   I N T u i , u j
where w 0 , 1 is the weight corresponding to the similarity index and the evaluated inferred trust. The TGBCF model assumes a constant weight value of w = 0.5 , to give equal weightage to trust similarity and Overall Aggregate Trust. The rating for a cloud service is predicted using the following equation.
P R u i , s = r u i ¯ + u j T U N S O A T u i , u j · ( r u j , s r u j ¯ ) u j T U N S | O A T u i , u j |
where P R u i , s depicts the predicted rating for a cloud service s by a service user u i   . For every new initiated service request, the service-user matrix is analyzed to check if the requested service is trusted by the majority of active service users in the SUM. The proposed work validates the DIT ratings using the assumed trust threshold using Equations (1)–(3) [33,63].
If a majority of service users have rated the requested service with a trust value in compliance with the assumed threshold, the service is considered trusted, else the service rating is predicted using Equations (1)–(9) [74,75,76,77,78]. The algorithmic procedure for rating prediction utilized in the TGBCF model is illustrated below in Algorithm 2.
Algorithm 2 TGBCF
Input: SUM, T U N S u i , SI, OAT
Output: Predicted Rating
1. for each unpredicted rating (new service request) in the SUM by user u j in the T U N S u i
a. If (majority ratings for service s trust threshold) go to step 2
b. else the request is denied.
2. Calculate SI and OAT between users u i , u j using Equations (7) and (8).
3. End if.
4. End for.
5. Predict Rating prediction P R u i , s for a service s using Equation (9)
6. Output Predicted Rating.

Computational Complexity Analysis of TGBCF

This section presents the computational complexity analysis of the TGBCF model. To assess the complexity of TGBCF with respect to time, three modules are considered: Similarity Index, Inferred Trust, and the Overall Aggregate Trust.
The primary input for this analysis is the SUM, structured as a vector of size N × R, where N denotes the total number of nodes and R is the total number of service ratings in the environment. In the TGBCF model, both the SUs as well as SPs are considered as nodes. To compute similarity index, the model requires two inputs: the TUNS for a node and the rating values in the SUM. Given R service rating entries across N nodes, the time complexity for identifying similar nodes for a single user is O (N.R). Consequently, determining similar users for all nodes results in a complexity of O (N2.R). The SI and the AI (calculated using cosine similarity) serve as the foundational elements for inferred trust computation. Since AI represents both the alignment and the proximity between users, the trust inference step operates with a linear complexity of O(N) for each node. TGBCF associates a weight attribute with the computed SI and INT values to generate the OAT as depicted in Equation (8). The OAT is evaluated as the weighted sum of SI and INT; thus, the overall computational time complexity will be evaluated as O(N)(INT + SI), i.e., O (N.R) + O (N2.R) = O (N2.R). Moreover, for each selected node, N, a predicted rating is computed that generates a complexity of O (N.R) and since the service_request function nests the predicted_rating function, the overall time complexity of the TGBCF model is O (N2.R).

4.3. Comprehensive Analysis for Data Quality and Reliability

The algorithmic simulation illustration in Algorithms 1 and 2 in Section 4.2 acts as a pre-processing phase for the un-rated service ratings in the service-user matrix. Hence, this strengthens a low-density Recommender System that consists of an insufficient number of identical ratings. Further, to authenticate the efficacy of the TGBCF model, an extensive inferred trust scheme is utilized that quantifies the dataset on the basis of the following metrics: (a) a trusted network set for a service user; (b) imilarity Index between service users; (c) trust threshold; and (d) an Overall Aggregate Trust. Further, a step-by-step illustration of the pre-processing phase to eliminate the outdated and unreliable data entities is explained below.

Step-by-Step Working of the TGBCF

This sub-section demonstrates the workings of the proposed work. We suppose there are seven users in the service-user matrix with the user set U S = { u 1 , u 2 , u 3 , u 4 , u 5 , u 6 , u 7 } and six cloud services in the service set S S = { s 1 , s 2 , s 3 , s 4 , s 5 , s 6 } as illustrated in Table 2.
In order to predict the ratings for a cloud service that meets our model’s threshold requirements, the following actions must be taken.
(i)
User u 1 initiates a request for service   s 4 . However, since only two ratings are available for this service in the user request-service database matrix from users u 2 and u 6 , only these two service ratings are considered for further computation.
(ii)
Evaluate the similarity index by identifying the angle at which user u 1 is inclined with other service users. The angle θ is computed using Equation (6) as follows:
a.
u 1 u 1 : 0 ° //since user u 1 is itself computing the distance.
b.
u 1 u 2 : cos θ = 0.52 0 + 0.75 0.76 + 0 0.63 / ( ( 0.52 ) 2 + ( 0.75 ) 2 ) ( ( 0.76 ) 2 + ( 0.63 ) 2 ) = 0.6327
H e n c e , θ = cos 1 ( 0.6327 ) = 51 °
c.
Likewise, all the other angles of inclination of u 1 with respect to u 3 ,   u 4 ,   u 5 ,   u 6   , and   u 7 are computed and the following values are obtained:
  • u 1 u 3 : 55.27 °
  • u 1 u 4 : 71.26 °
  • u 1 u 5 : 90 °
  • u 1 u 6 : 56.19 °
  • u 1 u 7 : 90 °
Service users u 5 and u 7 are discarded at once, since both are inclined at an angle of 90 ° with u 1 (since cos 90 ° = 0 ). The SUs are then arranged in an increasing order based on the computed inclination angles. Further, continuous values are assigned to the SUs representing their distance with user u 1 , as illustrated in Table 3.
Hence, the T U N S for u 1 = { u 1 , u 2 , u 3 , u 4 , and u 6 }
T U N S u i = u j A I   u j < α , u j S U M
SI is evaluated using Equation ( 7 ) as:
S I u i , u j = ( i T U N S ) u i u j ( r u i , s x r u i ¯ ) ( r u j , s x r u j ¯ ) ( i T U N S ) u i u j ( r u i , s x r u i ¯ ) 2 · ( i T U N S ) u i u j ( r u j , s x r u j ¯ ) 2
Hence,
S I u 1 , u 2 = ( 0.52 0.635 0 0.695 + 0.75 0.635 0.76 0.695 + 0 0.635 0.63 0.695 0.43 0.49 = 0.282
S I u 1 , u 6 = 0.52 0.635 0 0.72 + 0.75 0.635 0.69 0.72 + 0 0.635 0.75 0.72 0.429 0.52 = 0.134
So, the O A T between u 1 u 2 and u 1 u 6 is computed as:
O A T u 1 , u 2 =   w *   S I u 1 , u 2 + ( 1 w ) *   I N T u 1 , u 2 = 0.5 0.282 + 0.5 1 = 0.595 = 0.641
Also,
O A T u 1 , u 6 = w *   S I u 1 , u 6 + ( 1 w ) *   I N T u 1 , u 6 = 0.5 0.134 + 0.5 ( 0.33 ) = 0.232
TGBCF takes a user–service matrix as input as depicted in Table 2. For all those services who have received recommendations from majority service users, the rating can be predicted as depicted above. If user u 1   issues a request to access cloud service s 4 , then all the users who have rated s 4 will be analyzed. Since only two ratings are available for service s 4 from users u 2 and u 6 (based on the dataset of the SUM), u 1 s 4 initiates the rating prediction algorithm considering users u 2   and   u 6 as the candidate participants for conducting rating prediction. It is significant to mention that in order to compute the predicted rating, the S I u i , u j and O A T u i , u j values are computed as per Equations (7) and (8), respectively, between users ( u 1 u 2 ) and ( u 1 u 6 ) , since only users u 2 and u 6 have rated service s 4 already; finally, the prediction is calculated using Equation (9):
P R u i , s = r u i ¯ + u j T U N S O A T u i , u j · ( r u j , s r u j ¯ ) u j T U N S | O A T u i , u j |
Hence, P R u 1 , s 4 = 0.635 + 0.641 ( 0.63 0.695 ) + 0.232 ( 0.75 0.72 ) 0.641 + 0.232 = 0.60
Hence, the updated SUM is depicted in Table 4 as below:
The TGBCF model adopts a structured methodology comprising model design, trust prediction, and decision evaluation. A modular trust management and access control framework is developed, integrating components such as the User Monitor, Roles Monitor, Central Repository, and Trust Decision Engine. These modules collaboratively analyze service usage and user roles to compute trust scores. A custom dataset was constructed to reflect realistic service usage scenarios, incorporating user roles, service ratings, and historical access behaviors. The Graph-Based Collaborative Filtering approach is applied in alignment with the construction of the TUNS to predict trust values by identifying similar users based on roles and rating patterns. These predicted values are then used to recommend or restrict services based on a dynamic threshold. The model’s performance is evaluated in terms of trust prediction accuracy, decision consistency, and role-aware access precision. This methodology ensures that trust-aware service recommendations remain both adaptive and context-sensitive. A step-by-step working process of the TGBCF model is depicted in Figure 5.

5. Simulation Setup

The hybrid simulation of the proposed TGBCF model was carried out using both Python and Laravel, leveraging their respective strengths for simulation and web-based orchestration. The entire experimental framework was deployed on a system with a quad-core Intel i5-1135G7 processor (4.20 GHz), 8 GB RAM, and Windows 11 (64-bit) operating system.

5.1. Setup for Trust Value Computation

In order to compute the trust, the simulation module was developed using Python 3.9 in a Jupyter Notebook version 6.3 environment. A network of 500 nodes was generated, representing cloud-based SUs, SPs, and roles, with interactions created at regular intervals to simulate dynamic service exchanges. For each node pair, the Direct Trust value was computed based on direct interactions, while the Indirect Trust was inferred from the feedback of neighboring nodes. A Weighted Trust value was subsequently calculated as a composite of DT and IDT. In this study, a trust threshold of 0.6 was adopted—nodes exhibiting trust values equal to or greater than this threshold were classified as trustworthy, while those falling below were designated as malicious. The selection of 0.6 as the optimal threshold emerged from extensive simulation cycles and empirical observations. Notably, higher threshold values such as 0.8 or 0.9, although intuitively stricter, led to an increased rate of false negatives, where legitimate and trusted service nodes were incorrectly classified as untrustworthy. Such misclassification adversely impacted the prediction accuracy of the recommendation system. Conversely, a threshold of 0.6 provided a more balanced trade-off between trust sensitivity and classification accuracy, preserving reliable nodes while still filtering out malicious ones effectively. This selection is also consistent with findings in the prior trust-aware recommendation literature, where moderate thresholding is shown to enhance both robustness and usability in dynamic environments.

5.2. Setup for Rating Prediction Using Trust

To predict trust-based rating for a real-world inspired interface, Laravel was used as the backend framework, leveraging its robust Model-View-Controller (MVC) architecture. The Laravel stack was hosted locally using XAMPP, and implemented with the Breeze starter kit, which integrates Tailwind CSS and a default authentication layer. The backend services were connected to a MySQL relational database, where user–service interaction data (ratings) was stored and dynamically queried using SQL. Eloquent relationships were defined to manage the rating data model—each cloud user could generate multiple ratings for different services, thus forming a service-user matrix. Laravel handled critical functions such as access control, authentication, user-role mapping, and integration of predicted trust values into the user interface.
The combination of Python-based simulation and Laravel-based application enabled end-to-end validation of the TGBCF model—from trust score computation to real-time rating analysis and malicious node identification. This dual-stack architecture allowed for both theoretical trust modeling and practical applicability in cloud-based recommendation and access control scenarios. The simulation was repeated multiple times to ensure consistency and generalizability of results.

5.3. Comparative Analysis

To evaluate the performance of the TGBCF model, a thorough comparative analysis of the TGBCF model is conducted using the evaluation metrics Mean Absolute Error (MAE) and Root Mean Square Error (RMSE). This work is compared with the trust-aware recommendation model (TAWRM), the User-Based Collaborative Filtering approach (UBCF), and the Social Trust Recommendation based on Probability Matrix Factorization (STRPMF). These models are selected to represent distinct categories of trust computation and recommendation logic, thereby providing a comprehensive basis for comparison.
This work is compared with the following peer research schemes:
TAWRM: The trust-aware recommendation model [67] constructs a trust network among users to enhance the recommendation process in environments where explicit trust data is available. It operates by computing direct and indirect trust paths using user-to-user recommendation chains and employs a matrix decomposition strategy to rank items for a given user. The trust value is propagated through the network to infer unknown relationships, which helps in selecting top-trusted service providers. However, TAWRM has a key limitation: it is confined to trust trajectories within a narrow scope and does not effectively evaluate similarity between distant or disjoint user groups. This often leads to sparse coverage in large-scale, role-diverse service environments.
UBCF: The UBCF approach [68] is a traditional collaborative filtering technique that identifies similar users based on historical ratings and shared preferences. It calculates similarity using distance-based or correlation-based measures (e.g., Pearson, Cosine), and selects the top-N neighbors whose similarity exceeds a predefined threshold. Ratings from these neighbors are then aggregated to generate predictions for unrated items. Although widely used for its simplicity and interpretability, UBCF lacks trust-awareness and is sensitive to data sparsity. It treats all users equally, ignoring user roles or contextual weight, which may result in lower prediction accuracy in multi-role, trust-critical applications such as cloud service recommendations.
STRPMF: The STRPMF method [69] integrates probabilistic matrix factorization (PMF) with social trust information to improve recommendation accuracy. It assumes that user decisions are influenced not only by rating data but also by the social relationships and trust levels within a user community. STRPMF learns latent feature vectors for users and items, and adjusts them using social trust regularization, allowing for more nuanced rating predictions. While this approach improves performance in trust-enriched social domains, it is limited by the subjective and dynamic nature of social trust, which may not reflect institutional trust or role-based authority as required in cloud service frameworks. Additionally, the trust modeling is implicit and lacks mechanisms for fine-grained role differentiation or access control policies.
Table 5 summarizes and emphasizes the core technical limitations of the state-of-the-art approaches TAWRM, UBCF, and STRPMF, along with the design and strengths of TGBCF.

5.4. Evaluation Metrics

The trust of a service user in a recommendation-based system largely depends on the accuracy and reliability of predicted ratings, particularly when these predictions are generated from sparse and uncertain datasets within dynamic environments. In such scenarios, even small inaccuracies can significantly impact user confidence and system credibility. Therefore, evaluation metrics such as MAE and RMSE are commonly employed to assess the performance of recommendation algorithms. These metrics provide quantitative measures of prediction error, enabling the system to fine-tune its recommendations and ensure greater alignment with user preferences, ultimately fostering trust and user satisfaction. In both the two metrics, the deviation from the actual value is measured by utilizing the trust threshold for recommendation. The MAE is evaluated using Equation (10).
M A E = u s p u , s r u , s N P R
where p u , s is the predicted rating, and r u , s is the initial rating recorded in the service-user matrix, and NPR is the total number of predicted ratings.
Further, since MAE does not always reflect accuracy in the rating predictions, RMSE is further utilized by the TGBCF model to validate the results for service recommendations. The RMSE analysis between the evaluated and the actual rating value is carried out using Equation (11).
R M S E = u s ( p u , s r u , s ) 2 N P R
The proposed work recommends a cloud service on the basis of the degree of trust associated with a cloud service. The number of trusted service nodes demonstrates the accuracy of the TGBCF model using Equation (12).
A c c u r a c y = T o t a l   N u m b e r   o f   N o d e s N u m b e r   o f   M a l i c i o u s   N o d e s   E n c o u n t e r e d T o t a l   N u m b e r   o f   N o d e s

5.5. Simulation Results

This section demonstrates the simulation results based on the evaluation metrics illustrated above in Section 5.4. The graphical interpretation of the comparative analysis of MAE with respect to the benchmark approaches is illustrated below in Figure 6. The TGBCF model exhibits superior predictive accuracy, as evidenced by its significantly lower MAE compared to other benchmark models. Specifically, in terms of relative performance improvement, TGBCF achieves approximately 42.3% over TAWRM [67], 50.0% over UBCF [68], and 31.8% improvement over STRPMF [69]. These results underscore the effectiveness of the trust-guided approach employed in TGBCF, which enhances the reliability and precision of recommendation generation compared to existing state-of-the-art methods.
Figure 7 illustrates the comparative recommendation performance of the TGBCF model against baseline methods based on RMSE. The results clearly indicate that TGBCF consistently outperforms all peer models, demonstrating a substantial reduction in prediction variance—a critical metric reflecting the stability and reliability of the recommendations. Specifically, TGBCF achieves an approximate RMSE improvement of 38.7% over TAWRM [67], 45.7% over UBCF [68], and 32.1% over STRPMF [69]. These reductions translate into a 30–45% overall improvement in predictive consistency, underscoring the robustness and effectiveness of the trust-guided mechanism employed in TGBCF.
Further, the prediction accuracy in TGBCF is computed to identify the malicious nodes and trusted nodes in the cloud domain. To demonstrate the accuracy of prediction for the evaluated service ratings using the soft security mechanism “Trust”, 500 service nodes have been analyzed at present. However, the proposed model can be scaled in future. The accuracy of the TGBCF model examines the computed trusted rating value against the trust threshold of 0.60 (Assumed Trust Threshold). If a service node has a trusted rating value   0.60, the node is considered trustworthy; else, it is malicious. The graphical interpretation demonstrates that with an increase in the number of service nodes, the number of malicious service nodes encountered by the TGBCF model is less than the comparative state-of-the-art approaches. This signifies that the TGBCF model can be trusted for cloud service recommendation in comparison to the peer approaches. Figure 8 below showcases the number of malicious service nodes with an increase in the number of services users. TGBCF demonstrates higher robustness and attack resistance, with approximately 40–60% fewer malicious nodes detected at peak load compared to other models.
The graphical interpretation of the prediction accuracy of the TGBCF model with the state-of-the-art approaches is depicted below in Figure 9. The simulation results depict that TGBCF outperforms the state-of-the-art approaches [67,68,69] by 8–16% in rating accuracy at high user volume, showing better scalability and generalization.

5.6. Real-World Applicability and Computational Efficiency

The TGBCF model is designed with practical deployment considerations in mind, addressing key aspects such as scalability, computational feasibility, and robustness to malicious nodes, which are critical in real-world cloud-based service recommendation systems. The key factors justifying compliance with the real-world applicability are:
  • Scalability and Efficiency: The model has been tested on a simulated network of 500 nodes representing service users, providers, and roles. Results show that the trust computation is performed in a time-efficient manner due to the lightweight graph-based structure. This validates that TGBCF can scale to medium-to large-scale cloud environments.
  • Trustworthiness Assessment: TGBCF incorporates both direct and indirect trust metrics derived from user interactions and neighborhood feedback, and then computes a weighted trust score. This mirrors real-world scenarios where users interact with multiple services and rely on both personal experience and community insights. The model dynamically adapts to new trust relationships as the system evolves.
  • Malicious Node Detection: By setting an unbiased trust threshold (0.6), the system effectively filters out malicious or unreliable nodes, a frequent concern in decentralized cloud ecosystems. This feature makes TGBCF particularly suited for open, multi-tenant cloud platforms where user trust is critical.
  • Platform-Agnostic Implementation: The model has been implemented using Python 3.9 with Jupyter Notebook for simulation and Laravel with MySQL for backend deployment. This dual implementation supports its adaptability to both AI-based simulation environments and real-time cloud-based applications, thereby ensuring its cross-platform viability.
  • Low Computational Overhead: Trust calculations use simple yet effective operations like feedback weighting, avoiding complex optimization or deep learning routines. This ensures the model can run even on moderate hardware (Intel i5, 8 GB RAM), which is typical in edge or client-side cloud nodes.
  • Accuracy and Reliability: The model achieves competitive prediction accuracy using MAE and RMSE when compared with benchmark schemes (e.g., TAWRM, STRPMF, UBCF), reinforcing its practical utility in service rating prediction and user satisfaction enhancement.

6. Formal Analysis

To validate the simulation results of the TGBCF Model, the Canetti and Krawczyk Adversary Model (C&K) [79] has been utilized. The foundation for the formal analysis is to authenticate if the computed service rating is trustworthy or malicious. A service rating value is considered malicious if the trust value is less than the assumed threshold.
  • PROTOCOL Trustworthy Recommendation and malicious_node_identification
    Initial condition
    Similarity Index: SI, Trusted User Network Set: TUNS
    Inferred Trust: INT, Overall Aggregate Trust: OAT,
    SIG SI (user: ui, uj, TUNS, INT)
    Step 1: If ui, uj  TUNS
    Compute SI, else discard the service request from the user_id//a user not belonging to TUNS is considered malicious.
    Step 2: Ensure non-negative values for similarity index and Inferred trust
    TrustNonNegative {
    all SI: SimilarityIndex | SI.value ≥ 0
    all INT: InferredTrust | INT.value ≥ 0
    }
    Step 3: Compute OAT (ui, uj, weight: w, SI, INT, cloud_service_request, threshold)
    If (OAT ≤ threshold), the service node isMalicious
    assign (isMalicious) = 1, and revoke the cloud service request
    else Predict Rating value for the requested service
     }
    Step 4: Predict Service Rating (rating value: r u i , r u j , OAT, threshold)
    If (predicted rating for service && OAT threshold), give access to user for the cloud service else deny the service request.
The TGBCF models help in the identification of malicious cloud service requests through trust computation. These malicious service requests, initiated by nefarious users, can hamper the integrity of the computing domain. Hence, the proposed model aligns with the Network Authentication Protocol of the C&K Adversary Model, and strengthens the existing recommendation systems by incorporating “Trust” based on rating values, maintaining the reputation of trust between service users and service providers.

7. Conclusions

This work suggested a reliable service recommendation scheme that can prevent the reputation of the cloud computing by recommending trusted cloud services. An integrated approach utilizing the graph-based Recommender System and Collaborative Filtering Recommender System was employed with the soft security mechanism “Trust” to ensure security in cloud computing systems. The former helped in the construction of the trusted user network set, and the latter computed similarity between the service users through Pearson’s Correlation Coefficient. The inferred trust or the indirect trust was evaluated by utilizing the direct trust values stored in service-user matrix. The simulation results clearly affirm the effectiveness and superiority of the TGBCF model over state-of-the-art approaches across multiple evaluation metrics. With a consistent improvement of approximately 8% to 16% in prediction accuracy and a ~32% reduction in MAE and RMSE, TGBCF ensures highly reliable rating predictions. Under adversarial scenarios, TGBCF reduced the impact of malicious nodes by 40% to 60%, demonstrating strong resilience and generalization under growing user loads. These outcomes confirm the model’s practical viability for secure, accurate, and scalable service recommendation in complex cloud computing ecosystems.

8. Future Work

The TGBCF model demonstrates strong performance across accuracy, robustness, and scalability metrics, validating its effectiveness in trust-aware recommendation scenarios. However, several areas remain open for future exploration. The current trust computation relies on static weights and predefined rules; integrating adaptive or reinforcement learning could enable dynamic trust evaluation based on evolving user behavior. While TGBCF addresses cold-start issues effectively, incorporating contextual or semantic information—such as temporal patterns or domain-specific knowledge—could further enhance personalization. Additionally, real-world deployment on large-scale cloud platforms is needed to assess operational scalability, latency, and integration. Future work will also focus on incorporating privacy-preserving techniques and extending TGBCF to support dynamic trust modeling and cross-domain recommendations.

Author Contributions

Conceptualization, U.R.S.; Methodology, U.R.S.; Software, U.R.S., Y.K., R.K., and S.S.; Validation, U.R.S. and Y.K.; Formal analysis, U.R.S.; Investigation, U.R.S.; Resources, U.R.S., Y.K., R.K., and S.S.; Data curation, U.R.S.; Writing—Original draft preparation, U.R.S.; Writing—Review and editing, U.R.S., Y.K., R.K., and S.S.; Visualization, U.R.S.; supervision, R.K. and S.S.; Project administration, R.K. and S.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The abbreviations used in this manuscript are listed as:
ACLAccess Control List
AIAngle of Inclination
DITDirect Trust
DoSDenial-of-Service
IDTIndirect Trust
INTInferred Trust
MAEMean Absolute Error
NPRTotal Number of Predicted Ratings
OATOverall Aggregate Trust
PRPredicted Rating
RSRecommender Systems
RBACRole-based Access Control
RMSERoot Mean Square Error
SISimilarity Index
SPService Provider
SSService Set
SUService User
SUMService-User Matrix
THThreshold
TMSTrust Management System
TRBACTrust-Oriented Role-based Access Control
TUNSTrusted User Network Set
USUser Set
WTWeighted Trust

References

  1. Park, D.H.; Kim, H.K.; Choi, I.Y.; Kim, J.K. A Literature Review and Classification of Recommender Systems Research. Expert Syst. Appl. 2012, 39, 10059–10072. [Google Scholar] [CrossRef]
  2. Liu, J.; Dolan, P.; Pedersen, E.R. Personalized News Recommendation Based on Click Behavior. In Proceedings of the 15th International Conference on Intelligent User Interfaces, Hong Kong, China, 7–10 February 2010; pp. 31–40. [Google Scholar]
  3. Adomavicius, G.; Tuzhilin, A. Toward the Next Generation of Recommender Systems: A Survey of the State-of-the-Art and Possible Extensions. IEEE Trans. Knowl. Data Eng. 2005, 17, 734–749. [Google Scholar] [CrossRef]
  4. Anthal, J.; Sharma, B.; Manhas, J. Optimization-Enabled Deep Learning for Sentiment Rating Prediction Using Review Data. Serv. Oriented Comput. Appl. 2023, 17, 39–58. [Google Scholar] [CrossRef]
  5. Li, B.; Ye, C.; Yu, X.; Zhou, H.; Huang, C. QoS Prediction Based on Temporal Information and Request Context. Serv. Oriented Comput. Appl. 2021, 15, 231–244. [Google Scholar] [CrossRef]
  6. Junejo, A.K.; Jokhio, I.A.; Jan, T. A Multi-Dimensional and Multi-Factor Trust Computation Framework for Cloud Services. Electronics 2022, 11, 1932. [Google Scholar] [CrossRef]
  7. Lei, C.; Dai, H.; Yu, Z.; Li, R. A Service Recommendation Algorithm with the Transfer Learning-Based Matrix Factorization to Improve Cloud Security. Inf. Sci. 2020, 513, 98–111. [Google Scholar] [CrossRef]
  8. Mohammadi, V.; Rahmani, A.M.; Darwesh, A.M.; Sahafi, A. Trust-Based Recommendation Systems in Internet of Things: A Systematic Literature Review. Hum.-Cent. Comput. Inf. Sci. 2019, 9, 21. [Google Scholar] [CrossRef]
  9. Asiri, S.; Miri, A. An IoT Trust and Reputation Model Based on Recommender Systems. In Proceedings of the 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12–14 December 2016; pp. 561–568. [Google Scholar]
  10. Saxena, U.R.; Alam, T. Role-Based Access Using Partial Homomorphic Encryption for Securing Cloud Data. Int. J. Syst. Assur. Eng. Manag. 2023, 14, 950–966. [Google Scholar] [CrossRef]
  11. Saxena, U.R.; Alam, T. Role Based Access Control Using Identity and Broadcast-Based Encryption for Securing Cloud Data. J. Comput. Virol. Hack. Tech. 2022, 18, 171–182. [Google Scholar] [CrossRef]
  12. Saxena, U.R.; Alam, T. Provisioning Trust-Oriented Role-Based Access Control for Maintaining Data Integrity in Cloud. Int. J. Syst. Assur. Eng. Manag. 2023, 14, 2559–2578. [Google Scholar] [CrossRef]
  13. Saxena, U.R.; Kadel, R. RACHEIM: Reinforced Reliable Computing in Cloud by Ensuring Restricted Access Control. Network 2025, 5, 19. [Google Scholar] [CrossRef]
  14. Everett, C. Cloud Computing–A Question of Trust. Comput. Fraud Secur. 2009, 2009, 5–7. [Google Scholar] [CrossRef]
  15. Garrison, G.; Kim, S.; Wakefield, R.L. Success Factors for Deploying Cloud Computing. Commun. ACM 2012, 55, 62–68. [Google Scholar] [CrossRef]
  16. Ghosh, A.; Arce, I. Guest Editors’ Introduction: In Cloud Computing We Trust—But Should We? IEEE Secur. Priv. 2010, 8, 14–16. [Google Scholar] [CrossRef]
  17. Habib, S.M.; Hauke, S.; Ries, S.; Mühlhäuser, M. Trust as a Facilitator in Cloud Computing: A Survey. J. Cloud Comput. 2012, 1, 19. [Google Scholar] [CrossRef]
  18. Khan, K.M.; Malluhi, Q. Establishing Trust in Cloud Computing. IT Prof. 2010, 12, 20–27. [Google Scholar] [CrossRef]
  19. Al-Na’amneh, Q.; Aljawarneh, M.; Hazaymih, R.; Alzboon, L.; Laila, D.A.; Albawaneh, S. Trust Evaluation Enhancing Security in the Cloud Market Based on Trust Framework Using Metric Parameter Selection. In Utilizing AI in Network and Mobile Security for Threat Detection and Prevention; IGI Global Scientific Publishing: Hershey, PA, USA, 2025; pp. 233–254. [Google Scholar]
  20. Park, J.S.; Spetka, E.; Rasheed, H.; Ratazzi, P.; Han, K.J. Near-Real-Time Cloud Auditing for Rapid Response. In Proceedings of the 2012 26th International Conference on Advanced Information Networking and Applications Workshops, Fukuoka, Japan, 26–29 March 2012; pp. 1252–1257. [Google Scholar]
  21. Pearson, S. Toward Accountability in the Cloud. IEEE Internet Comput. 2011, 15, 64–69. [Google Scholar] [CrossRef]
  22. Takabi, H.; Joshi, J.B.; Ahn, G.J. Security and Privacy Challenges in Cloud Computing Environments. IEEE Secur. Priv. 2010, 8, 24–31. [Google Scholar] [CrossRef]
  23. Sharma, N.A.; Ali, A.S.; Kabir, M.A. A Review of Sentiment Analysis: Tasks, Applications, and Deep Learning Techniques. Int. J. Data Sci. Anal. 2025, 19, 351–388. [Google Scholar] [CrossRef]
  24. Jawabreh, E.; Taweel, A. QoS-Based Web Service Selection Using Time-Aware Collaborative Filtering: A Literature Review. Computing 2024, 106, 2033–2058. [Google Scholar] [CrossRef]
  25. Mostafa, A.M.; Ezz, M.; Elbashir, M.K.; Alruily, M.; Hamouda, E.; Alsarhani, M.; Said, W. Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication. Appl. Sci. 2023, 13, 10871. [Google Scholar] [CrossRef]
  26. Jin, Y.; Yang, Z.; Liu, J.; Xu, X. Anomaly Detection and Early Warning Mechanism for Intelligent Monitoring Systems in Multi-Cloud Environments Based on LLM. arXiv 2025, arXiv:2506.07407. [Google Scholar]
  27. Sebestyen, H.; Popescu, D.E.; Zmaranda, R.D. A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories. Computers 2025, 14, 61. [Google Scholar] [CrossRef]
  28. Kim, Z.; Bauman, K. When Recommendations Know You Too Well: Explanation Types, Privacy Concerns, and Eye-tracking Evidence in Personalized Systems. In Proceedings of the Thirty-First Americas Conference on Information Systems, Montréal, QC, Canada, 14–16 August 2025. [Google Scholar]
  29. Abawajy, J. Establishing Trust in Hybrid Cloud Computing Environments. In Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, 16–18 November 2011; pp. 118–125. [Google Scholar]
  30. Dimitrakos, T.; Moona, R.; Patel, D.; McKnight, D. Trust Model for Optimized Cloud Services. In Proceedings of the 6th International Conference on Trust Management (TM), Surat, India, 21–25 May 2012; pp. 97–112. [Google Scholar]
  31. Hwang, K.; Kulkareni, S.; Hu, Y. Cloud Security with Virtualized Defense and Reputation-Based Trust Management. In Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, Chengdu, China, 12–14 December 2009; pp. 717–722. [Google Scholar]
  32. Zhou, L.; Varadharajan, V.; Hitchens, M. Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage. IEEE Trans. Inf. Forensics Secur. 2013, 8, 1947–1960. [Google Scholar] [CrossRef]
  33. Ghafoorian, M.; Abbasinezhad-Mood, D.; Shakeri, H. A Thorough Trust and Reputation Based RBAC Model for Secure Data Storage in the Cloud. IEEE Trans. Parallel Distrib. Syst. 2018, 30, 778–788. [Google Scholar] [CrossRef]
  34. Blaze, M.; Feigenbaum, J.; Lacy, J. Decentralized Trust Management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 6–8 May 1996; pp. 164–173. [Google Scholar]
  35. Li, N.; Mitchell, J.C.; Winsborough, W.H. Design of a Role-Based Trust-Management Framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 12–15 May 2002; pp. 114–130. [Google Scholar]
  36. Yao, W.T.M. Fidelis: A Policy-Driven Trust Management Framework. In Proceedings of the International Conference on Trust Management, Heraklion, Greece, 28–30 May 2003; Springer: Berlin/Heidelberg, Germany, 2003; pp. 301–317. [Google Scholar]
  37. Sandhu, R.; Zhang, X. Peer-to-Peer Access Control Architecture Using Trusted Computing Technology. In Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, 1–3 June 2005; pp. 147–158. [Google Scholar]
  38. Juels, A.; Kaliski, B.S. PORs: Proofs of Retrievability for Large Files. In Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 29 October–2 November 2007; pp. 584–597. [Google Scholar]
  39. Ateniese, G.; Burns, R.; Curtmola, R.; Herring, J.; Kissner, L.; Peterson, Z.; Song, D. Provable Data Possession at Untrusted Stores. In Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 29 October–2 November 2007; pp. 598–609. [Google Scholar]
  40. Sandhu, R.; Bhamidipati, V.; Munawer, Q. The ARBAC97 Model for Role-Based Administration of Roles. ACM Trans. Inf. Syst. Secur. 1999, 2, 105–135. [Google Scholar] [CrossRef]
  41. Sandhu, R.; Munawer, Q. The ARBAC99 Model for Administration of Roles. In Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC’99), Phoenix, AZ, USA, 6–10 December 1999; pp. 229–238. [Google Scholar]
  42. Oh, S.; Sandhu, R. A Model for Role Administration Using Organization Structure. In Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, Monterey, CA, USA, 3–4 June 2002; pp. 155–162. [Google Scholar]
  43. Oh, S.; Sandhu, R.; Zhang, X. An Effective Role Administration Model Using Organization Structure. ACM Trans. Inf. Syst. Secur. 2006, 9, 113–137. [Google Scholar] [CrossRef]
  44. Crampton, J. Administrative Scope and Role Hierarchy Operations. In Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, Monterey, CA, USA, 3–4 June 2002; pp. 145–154. [Google Scholar]
  45. Akl, S.G.; Taylor, P.D. Cryptographic Solution to a Problem of Access Control in a Hierarchy. ACM Trans. Comput. Syst. 1983, 1, 239–248. [Google Scholar] [CrossRef]
  46. Miklau, G.; Suciu, D. Controlling Access to Published Data Using Cryptography. In Proceedings of the 2003 VLDB Conference, Berlin, Germany, 9–12 September 2003; pp. 898–909. [Google Scholar]
  47. Tavakolifard, M.; Almeroth, K.C. Social Computing: An Intersection of Recommender Systems, Trust/Reputation Systems, and Social Networks. IEEE Netw. 2012, 26, 53–58. [Google Scholar] [CrossRef]
  48. Jøsang, A.; Ismail, R.; Boyd, C. A Survey of Trust and Reputation Systems for Online Service Provision. Decis. Support Syst. 2007, 43, 618–644. [Google Scholar] [CrossRef]
  49. Hassen, H.R.; Bouabdallah, A.; Bettahar, H.; Challal, Y. Key Management for Content Access Control in a Hierarchy. Comput. Netw. 2007, 51, 3197–3219. [Google Scholar] [CrossRef]
  50. Atallah, M.J.; Blanton, M.; Fazio, N.; Frikken, K.B. Dynamic and Efficient Key Management for Access Hierarchies. ACM Trans. Inf. Syst. Secur. 2009, 12, 18. [Google Scholar] [CrossRef]
  51. Gentry, C.; Silverberg, A. Hierarchical ID-Based Cryptography. In Advances in Cryptology—ASIACRYPT 2002, Queenstown, New Zealand, 1–5 December 2002; Springer: Berlin/Heidelberg, Germany, 2002; pp. 548–566. [Google Scholar]
  52. Boneh, D.; Boyen, X.; Goh, E.J. Hierarchical Identity Based Encryption with Constant Size Ciphertext. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 22–26 May 2005; pp. 440–456. [Google Scholar]
  53. Sotomayor, B.; Montero, R.S.; Llorente, I.M.; Foster, I. Virtual Infrastructure Management in Private and Hybrid Clouds. IEEE Internet Comput. 2009, 13, 14–22. [Google Scholar] [CrossRef]
  54. Nurmi, D.; Wolski, R.; Grzegorczyk, C.; Obertelli, G.; Soman, S.; Youseff, L.; Zagorodnov, D. The Eucalyptus Open-Source Cloud-Computing System. In Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, Shanghai, China, 18–21 May 2009; pp. 124–131. [Google Scholar]
  55. Hussein, M.K.; Mousa, M.H.; Alqarni, M.A. A Placement Architecture for a Container as a Service (CaaS) in a Cloud Environment. J. Cloud Comput. 2019, 8, 7. [Google Scholar] [CrossRef]
  56. Rady, M.; Abdelkader, T.; Ismail, R. Integrity and Confidentiality in Cloud Outsourced Data. Ain Shams Eng. J. 2019, 10, 275–285. [Google Scholar] [CrossRef]
  57. Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.H.; Konwinski, A.; Zaharia, M. Above the Clouds: A Berkeley View of Cloud Computing; University of California: Berkeley, CA, USA, 2009; unpublished technical report. [Google Scholar]
  58. Doshi, R.; Kute, V. A Review Paper on Security Concerns in Cloud Computing and Proposed Security Models. In Proceedings of the 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), Vellore, India, 24–25 February 2020; pp. 1–4. [Google Scholar]
  59. Li, X.; Du, J. Adaptive and Attribute-Based Trust Model for Service-Level Agreement Guarantee in Cloud Computing. IET Inf. Secur. 2013, 7, 39–50. [Google Scholar] [CrossRef]
  60. Lin, G.; Wang, D.; Bie, Y.; Lei, M. MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing. China Commun. 2014, 11, 154–162. [Google Scholar] [CrossRef]
  61. Hakim, A.R.; Ramli, K.; Gunawan, T.S.; Windarta, S. A Novel Digital Forensic Framework for Data Breach Investigation. IEEE Access 2023, 11, 42644–42659. [Google Scholar] [CrossRef]
  62. Uikey, C.; Bhilare, D.S. TrustRBAC: Trust Role Based Access Control Model in Multi-Domain Cloud Environments. In Proceedings of the 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC), Indore, India, 17–19 August 2017; pp. 1–7. [Google Scholar]
  63. Zhou, L.; Varadharajan, V.; Hitchens, M. Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2381–2395. [Google Scholar] [CrossRef]
  64. Zhang, P.; Kong, Y.; Zhou, M. A Domain Partition-Based Trust Model for Unreliable Clouds. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2167–2178. [Google Scholar] [CrossRef]
  65. Noor, T.H.; Sheng, Q.Z.; Yao, L.; Dustdar, S.; Ngu, A.H. CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services. IEEE Trans. Parallel Distrib. Syst. 2015, 27, 367–380. [Google Scholar] [CrossRef]
  66. Mahajan, S.; Mahajan, S.; Jadhav, S.; Kolate, S. Trust Management in E-Commerce Websites. Int. Res. J. Eng. Technol. (IRJET) 2017, 4, 2934–2936. [Google Scholar]
  67. Zarghami, A.; Fazeli, S.; Dokoohaki, N.; Matskin, M. Social Trust-Aware Recommendation System: A t-Index Approach. In Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, Milan, Italy, 15–18 September 2009; Volume 3, pp. 85–90. [Google Scholar]
  68. Kim, K. A New Similarity Measure to Increase Coverage of Rating Predictions for Collaborative Filtering. Appl. Intell. 2023, 53, 28804–28818. [Google Scholar] [CrossRef]
  69. Lebib, F.Z.; Djebrit, I.; Mahmoudi, K. Matrix Factorization for Cloud Service Recommendation Based on Social Trust. In Proceedings of the International Conference on Computing Systems and Applications, Algiers, Algeria, 16–18 April 2024; Springer: Cham, Switzerland, 2024; pp. 406–415. [Google Scholar]
  70. Zhou, L.; Varadharajan, V.; Hitchens, M. Enforcing Role-Based Access Control for Secure Data Storage in the Cloud. Comput. J. 2011, 54, 1675–1687. [Google Scholar] [CrossRef]
  71. Alshammari, S.T.; Albeshri, A.; Alsubhi, K. Integrating a High-Reliability Multicriteria Trust Evaluation Model with Task Role-Based Access Control for Cloud Services. Symmetry 2021, 13, 492. [Google Scholar] [CrossRef]
  72. Jøsang, A.; Ismail, R. The Beta Reputation System. In Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia, 17–19 June 2002; Volume 5, pp. 2502–2511. [Google Scholar]
  73. Chang, W.; Xu, F.; Dou, J. A Trust and Unauthorized Operation Based RBAC (TUORBAC) Model. In Proceedings of the 2012 International Conference on Control Engineering and Communication Technology, Shenyang, China, 7–9 December 2012; pp. 811–814. [Google Scholar]
  74. Li, Y.; Liu, J.; Ren, J.; Chang, Y. A Novel Implicit Trust Recommendation Approach for Rating Prediction. IEEE Access 2020, 8, 98305–98315. [Google Scholar] [CrossRef]
  75. Elmacioglu, E.; Lee, D. On Six Degrees of Separation in DBLP-DB and More. ACM SIGMOD Rec. 2005, 34, 33–40. [Google Scholar] [CrossRef]
  76. Moradi, P.; Ahmadian, S. A Reliability-Based Recommendation Method to Improve Trust-Aware Recommender Systems. Expert Syst. Appl. 2015, 42, 7386–7398. [Google Scholar] [CrossRef]
  77. Zhang, P.; Zhou, M.; Kong, Y. A Double-Blind Anonymous Evaluation-Based Trust Model in Cloud Computing Environments. IEEE Trans. Syst. Man Cybern. Syst. 2019, 51, 1805–1816. [Google Scholar] [CrossRef]
  78. Zhang, F.G. Preventing Recommendation Attack in Trust-Based Recommender Systems. J. Comput. Sci. Technol. 2011, 26, 823–828. [Google Scholar] [CrossRef]
  79. Canetti, R.; Krawczyk, H. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Innsbruck, Austria, 6–10 May 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 453–474. [Google Scholar]
Figure 1. Categorization of recommendation systems.
Figure 1. Categorization of recommendation systems.
Network 05 00030 g001
Figure 2. Categorization of cloud security mechanisms.
Figure 2. Categorization of cloud security mechanisms.
Network 05 00030 g002
Figure 3. Trust analysis and classification.
Figure 3. Trust analysis and classification.
Network 05 00030 g003
Figure 4. Trusted Graph-Based Collaborative Filtering (TGBCF) model.
Figure 4. Trusted Graph-Based Collaborative Filtering (TGBCF) model.
Network 05 00030 g004
Figure 5. Step-by-step illustration of TGBCF model.
Figure 5. Step-by-step illustration of TGBCF model.
Network 05 00030 g005
Figure 6. Comparative analysis of recommendation performance of TGBCF with peer models.
Figure 6. Comparative analysis of recommendation performance of TGBCF with peer models.
Network 05 00030 g006
Figure 7. Comparative analysis of trust-based service recommendation with RMSE.
Figure 7. Comparative analysis of trust-based service recommendation with RMSE.
Network 05 00030 g007
Figure 8. Analysis of malicious nodes with increase in the number of service users.
Figure 8. Analysis of malicious nodes with increase in the number of service users.
Network 05 00030 g008
Figure 9. Accuracy prediction analysis for cloud service recommendation.
Figure 9. Accuracy prediction analysis for cloud service recommendation.
Network 05 00030 g009
Table 1. Summarized literature synthesis for trust and recommendation systems in cloud.
Table 1. Summarized literature synthesis for trust and recommendation systems in cloud.
WorkContributionMethodologyIdentified Gaps
[29,30,31]Introduced reputation as aggregated feedback for evaluating SPs in cloud environments.Reputation scores derived from SU feedback and historical interactions.Lacks dynamic trust updates and handling of feedback manipulation.
[32]Integrated trust thresholds in access control to revoke low-trust entities.Trust-based revocation list integrated with ACL.May result in false positives; limited adaptability to dynamic trust.
[33]Suggested TRRBAC model enhancing security compared to RBAC.Combined trust and reputation feedback; penalty mechanism for negative behavior.High computational cost; accuracy issues with scaling.
[34,35,36,37,38,39]Explored trust-policy integration for secure cloud environments.Defined policies integrated with trust values.Limited by static trust assumptions; challenges with real-time adaptability.
[40,41,42,43]Reviewed RS types used in trust construction (CBF, CF, Hybrid, etc.).Survey of recommendation techniques across domains.Cold-start and data sparsity remain unresolved.
[44,45,46]Analyzed sparsity and cold-start in recommendation systems.Identified key performance challenges.No robust solution for dynamic user behavior or attack resistance.
[47]Used stored ratings to compute trust values.Cumulative trust modeling.Subjective trust evaluation; lacks context sensitivity.
[49,50,51,52]Addressed reliability issues in feedback-based ratings.Analyzed effects of biased/inaccurate ratings.Vulnerable to fabricated feedback and manipulation.
[53,54,55,56,57,58]Surveyed trust models for secure cloud access.Comparative study of multiple trust frameworks.Lacks adaptive revocation/reassignment mechanisms.
[59]Developed “Cloud-Trust” for adaptive SP selection.Dynamic trust assessment based on service behavior.Scalability and malicious behavior detection limited.
[60]Introduced MTBAC considering mutual trust of users and nodes.Mutual behavioral trust model.Struggles with scalability and sophisticated attack types.
[61,62,63]Incorporated trust into RBAC for refined access control.Probabilistic trust scoring in RBAC structures.Vulnerable to collusion, Sybil, and on/off attacks.
[64]Improved malicious node detection and reduced trust computation cost.Optimized trust algorithm for performance.May trade off security accuracy for performance.
[65,66]Discussed Sybil and collusion attacks in cloud platforms.Attack modeling based on real-world platforms.Absence of dynamic countermeasures.
[67]Proposed Social Trust-Aware RS using t-index.Contextual and social behavior modeling.Ignores evolving trust and access control sensitivity.
[68]Improved UBCF similarity with user contribution levels.Contribution-based similarity in CF.Static computation; lacks adaptability to behavior changes.
[69]Trust-aware matrix factorization using social signals.Matrix factorization incorporating social trust.Assumes static trust; does not address access control.
[70]Mapped trust to roles in RBAC for cloud data access.Dynamic trust mapping in RBAC.Limited flexibility in evolving behavior contexts.
[71]High-reliability multicriteria trust with task-based RBAC.Balanced trust evaluation (feedback, context, history).Complexity in multidimensional trust balancing.
[72,73]Identified role of trust-based RS in anomaly and attack detection.Integration of RS with security analytics.Need for unified, real-time trust model for detection and prevention.
Table 2. Service-user matrix.
Table 2. Service-user matrix.
Service User Matrix s 1 s 2 s 3 s 4 s 5 s 6
u 1 0.520.75 ??
u 2 0.76 0.63
u 3 0.69
u 4   0.73 0.72 0.79
u 5 0.61 0.77
u 6 0.69 0.75
u 7 0.53
Table 3. Inferred trust evaluation.
Table 3. Inferred trust evaluation.
UsersAngle of Inclination of Other Users with
u 1
Distance (D)Inferred Trust
I N T ( u i , u j ) = 1 D ( u i , u j )
u 1 0 ° 01
u 2 51 ° 11
u 3 55.27 ° 20.5
u 6 56.19 ° 30.33
u 4 71.26 ° 40.25
Table 4. Updated service-user matrix.
Table 4. Updated service-user matrix.
Service User Matrix s 1 s 2 s 3 s 4 s 5 s 6
u 1 0.520.75 0.60
u 2 0.76 0.63
u 3 0.69
u 4 0.73 0.72 0.79
u 5 0.61 0.77
u 6 0.69 0.75
u 7 0.53
Table 5. Comparative analysis of TGBCF with the state-of-the-art approaches.
Table 5. Comparative analysis of TGBCF with the state-of-the-art approaches.
FeatureTGBCF
(Proposed)
TAWRMUBCFSTRPMF
Trust
Modeling
Explicit trust computation using role-based user grouping and rating patternsDirect and indirect trust via trust paths and networksNo trust modeling; purely rating-basedImplicit trust integrated through social regularization
User SimilarityGroup-based collaborative filtering with role contextBased on trust network structureSimilarity based on co-rated itemsLatent user similarity via PMF with social links
Role AwarenessYes,
roles are weighted and influence predictions
No explicit role differentiationNo consideration of user rolesRoles not modeled; only social links considered
Rating
Prediction Technique
Graph-based Collaborative Filtering + Trust Deviation WeightingMatrix decomposition on trust-ranked itemsWeighted average of Top-N similar usersPMF with trust regularization
Handling of SparsityReduces sparsity via grouping and inferred trustMay fail on sparse trust pathsHigh sensitivity to sparsityMitigated through latent factor modeling
Access Control IntegrationIntegrated trust threshold for access decisionsNot supportedNot supportedNot supported
Main
Limitations
Requires accurate role definition and dynamic threshold tuningConfined to narrow trust trajectoriesIgnores trust and role contextSubjective nature of social trust; lacks fine-grained control
StrengthContext-aware, trust-sensitive, and role-integrated predictionExploits networked trust structuresSimple and easy to implementLearns user/item factors with trust influence
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Saxena, U.R.; Khatri, Y.; Kadel, R.; Shailendra, S. A Service Recommendation Model in Cloud Environment Based on Trusted Graph-Based Collaborative Filtering Recommender System. Network 2025, 5, 30. https://doi.org/10.3390/network5030030

AMA Style

Saxena UR, Khatri Y, Kadel R, Shailendra S. A Service Recommendation Model in Cloud Environment Based on Trusted Graph-Based Collaborative Filtering Recommender System. Network. 2025; 5(3):30. https://doi.org/10.3390/network5030030

Chicago/Turabian Style

Saxena, Urvashi Rahul, Yogita Khatri, Rajan Kadel, and Samar Shailendra. 2025. "A Service Recommendation Model in Cloud Environment Based on Trusted Graph-Based Collaborative Filtering Recommender System" Network 5, no. 3: 30. https://doi.org/10.3390/network5030030

APA Style

Saxena, U. R., Khatri, Y., Kadel, R., & Shailendra, S. (2025). A Service Recommendation Model in Cloud Environment Based on Trusted Graph-Based Collaborative Filtering Recommender System. Network, 5(3), 30. https://doi.org/10.3390/network5030030

Article Metrics

Back to TopTop