Author : Qhubaib Syed 1
Date of Publication :19th April 2017
Abstract: Now days, cloud computing an ever green technology used by all segment of areas. To choose best cloud service providers trust is an important factor in growing cloud computing. The highly dynamic nature of cloud system services throws different challenges on privacy, security and availability. The communication between consumers and trust management system involves sensitive information that makes the privacy is an important factor. Protecting cloud services from malicious users is a difficult problem. During this paper we tend to planned a brand new approach Cloud Armor, a reputation-based trust management framework that has a collection of functionalities to deliver trust as a service (TaaS), which incorporates i) a completely unique protocol to prove the believability of trust feedbacks and preserve users’ privacy, ii) An adaptive and strong believability model for measure the believability of trust feedbacks to shield cloud services from malicious users and to check the trait of cloud services, and iii) an accessibility model to manage the provision of the redistributed implementation of the trust management service. The practicability and edges of our approach are valid by an example and experimental studies employing assortment of real-world trust feedbacks on cloud services
Reference :
-
- C. Dellarocas, “The Digitization of Word of Mouth: Promise and Challenges of Online Feedback Mechanisms,” Management Science, vol. 49, no. 10, pp. 1407–1424, 2003
- R. Ko et al., “TrustCloud: A Framework for Accountability and Trust in Cloud Computing,” in Proc. SERVICES’11, 2011.
- K. Hoffman, D. Zage, and C. Nita-Rotaru, “A Survey of Attack and Defense Techniques for Reputation Systems,” ACM Computing Surveys, vol. 42, no. 1, pp. 1–31, 2009.
- S. M. Kim and M.-C. Rosu, “A Survey of Public Web Services,” in Proc. of WWW04, 2004.
- S. M. Khan and K. W. Hamlen, “Hatman: IntraCloud Trust Management for Hadoop,” in Proc. CLOUD’12, 2012
- S. Pearson, “Privacy, Security and Trust in Cloud Computing,” in Privacy and Security for Cloud Computing, ser. Computer Communications and Networks, 2013, pp. 3–42.
- J. Huang and D. M. Nicol, “Trust Mechanisms for Cloud Computing,” Journal of Cloud Computing, vol. 2, no. 1, pp. 1–14, 2013.
- K. Hwang and D. Li, “Trusted Cloud Computing with Secure Resources and Data Coloring,” IEEE Internet Computing, vol. 14,no. 5, pp. 14–22, 2010
- M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, vol. 53,no. 4, pp. 50–58, 2010.
- S. Habib, S. Ries, and M. Muhlhauser, “Towards a Trust Management System for Cloud Computing,” in Proc. of TrustCom’11,2011.
- I. Brandic, S. Dustdar, T. Anstett, D. Schumm, F. Leymann, and R. Konrad, “Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds,” in Proc. of CLOUD’10, 2010
- W. Conner, A. Iyengar, T. Mikalsen, I. Rouvellou, and K. Nahrstedt, “A Trust Management Framework for Service-Oriented Environments,” in Proc. of WWW’09, 2009.