Reputation Attacks Detection for Effective Trust Management in Cloud Environment

Authors

  • G. Kowselya. T. Aravind   Muthayammal Engineering College, Rasipuram, Rasipuram, Tamil Nadu, India

Keywords:

CloudArmor, Trust Management, Attacks Detection, Cloud Services Introduces, Cloud Computing

Abstract

Cloud Services introduces several challenging issues such as privacy, security, and availability. Preserving consumers’ privacy is not an easy task due to the sensitive information involved in the interactions between consumers and the trust management service. Guaranteeing the availability of the trust management service is another significant challenge because of the dynamic nature of cloud environments. In this article, we describe the design and implementation of CloudArmor, a reputation-based trust management framework that provides a set of functionalities to deliver Trust as a Service .model to manage the availability of the decentralized implementation of the trust management service. The feasibility and benefits of our approach have been validated by a prototype and experimental studies using a collection of real-world trust feedbacks on cloud services.

References

  1. S. M. Khan and K. W. Hamlen, “Hatman: Intra-Cloud Trust Management for Hadoop,” in Proc. CLOUD’12, 2012.
  2. S. Pearson, “Privacy, Security and Trust in Cloud Computing,” in Privacy and Security for Cloud Computing, ser. Computer Communications and Networks, 2013, pp. 3–42.
  3. J. Huang and D. M. Nicol, “Trust Mechanisms for Cloud Computing,” Journal of Cloud Computing, vol. 2, no. 1, pp. 1–14, 2013.
  4. K. Hwang and D. Li, “Trusted Cloud Computing with Secure Resources and Data Coloring,” IEEE Internet Computing, vol. 14,no. 5, pp. 14–22, 2010.
  5. M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwin- ski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, vol. 53,no. 4, pp. 50–58, 2010.
  6. S. Habib, S. Ries, and M. Muhlhauser, “Towards a Trust Man- agement System for Cloud Computing,” in Proc. of TrustCom’11, 2011.
  7. I. Brandic, S. Dustdar, T. Anstett, D. Schumm, F. Leymann, and R. Konrad, “Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds,” in Proc. of CLOUD’10, 2010.
  8. W. Conner, A. Iyengar, T. Mikalsen, I. Rouvellou, and K. Nahrst- edt, “A Trust Management Framework for Service-Oriented Environments,” in Proc. of WWW’09, 2009.
  9. T. H. Noor, Q. Z. Sheng, and A. Alfazi, “Reputation Attacks Detection for Effective Trust Assessment of Cloud Services,” in Proc. of TrustCom’13, 2013.
  10. T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu, “Trust Management of Services in Cloud Environments: Obstacles and Solutions,” ACM Computing Surveys, vol. 46, no. 1, pp. 12:1 -12:30, 2013.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
G. Kowselya. T. Aravind , " Reputation Attacks Detection for Effective Trust Management in Cloud Environment, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.884-887, March-April-2017.