Downloads: 122 | Views: 271 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 1, January 2017 | Popularity: 7.2 / 10
Effective Handling of Reputation-Based Trust Management in Cloud Environment
Sonali Jivan Nikam, Dr. S. N. Kini
Abstract: Trust management is a standout amongst the most difficult issue for the tackling and development of cloud computing. Many challenging issues such as privacy, security, and availability occur by highly dynamic, distributed, and non-transparent nature of cloud services. Saving consumers? privacy is not an easy task due to the confidential information involved in the interactions between customers and the trust management service. Protecting cloud services against their malicious clients (e. g. , such clients may give misleading feedback to inconvenience a specific cloud service) is a complicated issue. Due to the dynamic nature of cloud environments, assuring the availability of the trust management service is a challenging issue. In this article, we elaborate the design as well as implementation of Cloud Armor, a reputation-based trust management system which provides an arrangement of functionalities to deliver Trust as a Service (TaaS), including i) a novel convention to demonstrate the credibility of trust inputs as well as save clients' security, ii) Not only a versatile but also robust credibility model for measuring the credibility of trust feedbacks to keep cloud services from malicious clients and to analyze the dependability of cloud services, and iii) an availability model to deal with the accessibility of the decentralized usage of the trust management service. The achievability and advantages of our methodology have been tried by a model and test studies utilizing a collection of true trust feedbacks on cloud services.
Keywords: Cloud computing, trust management, reputation, credibility, credentials, security, privacy, availability
Edition: Volume 6 Issue 1, January 2017
Pages: 1317 - 1320
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 159 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 338 - 384Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm
Dr. Niju P. Joseph, Dr. Priyanka Surendran
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 455 - 459Real World IoT Applications in Daily Domain
Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad