Establishing a secure and safe trust system for a dispersed cloud-based IoT
environment is very tough. Nowadays, the differences between cloud and IoT are
blurring, and they are increasingly being applied together in several applications. A
robust trust establishment model is the need of the hour. In this paper, we are
advocating a trust-dependent authorization model to be implemented in a clouddependant IoT environment that also functions as a two-way or dual-mode trust model,
taking into account the requirements of service giver and taker. In the suggested
paradigm, trustworthiness is assessed on both the user and supplier sides. A transaction
is only permitted if both trust values exceed a predefined or set threshold. We cannot
entirely rely on the recommender's comments to determine how trustworthy a node or
entity is. Therefore, the primary presumption in this situation is that a small number of
hostile entities may provide false information about other entities. In the actual world,
we can anticipate several malevolent actors attempting to sabotage the efficient
operation of the cloud system by providing misleading reports and feedback, and the
IoT ecosystem is ultimately dependent on the cloud for data processing and allied
services, which generally consists of an application layer, network layer, and sensor
layer. A new phrase for gauging this inaccurate or biased reporting is included in the
model. In addition, the ongoing transactions are made more trustworthy by removing
skewed feedback from both the user and supplier end. We also put forward a rule that
allows trust values to be dynamically modified and active nodes to be given more
weightage when determining trust.
Keywords: Cloud-based IoT environment, Feedback, Trust, Virtual organization.