A Robust Reputation-Based Trust Aware Cloud Model In Cloud Environment

Authors(2) :-Om Prakash Singh, P. Srinivas

Trust management is one of the most challenging issues for the adoption and growth of cloud computing. The highly dynamic, distributed, and non-transparent nature of cloud services introduces several challenging issues such as privacy, security, and availability. Preserving consumers’ privacy is not an easy task due to the sensitive information involved in the interactions between consumers and the trust management service. Protecting cloud services against their malicious users (e.g., such users might give misleading feedback to disadvantage a particular cloud service) is a difficult problem. Guaranteeing the availability of the trust management service is another significant challenge because of the dynamic nature of cloud environments. In this article, we describe the design and implementation of A Robust Enhancement Is Trust Aware Cloud System For Cloud Usage, a reputation-based trust management framework that provides a set of functionalities to deliver Trust as a Service (TaaS).

Authors and Affiliations

Om Prakash Singh
M. Tech Student, Department of CSE, Malla Reddy Engineering College (A), Telangana, India
P. Srinivas
Associate Professor, Project Guide, Department of CSE, Malla Reddy Engineering College (A) Telangana, India

TaaS, Trust Aware Cloud System, Cloud Services, Sybil Attacks Detection

  1. A. Bates, B. Mood, J. Pletcher, H. Pruse, M. Valafar, and K. Butler, "On detecting co-resident cloud instances using network flow watermarking techniques," Int. J. Inf. Secur., vol. 13, no. 2, pp. 171– 189, Apr. 2014.
  2. Y. Azar, S. Kamara, I. Menache, M. Raykova, and B. Shepard, "Colocation-resistant clouds," in Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing Security, ser. CCSW ’14. New York, NY, USA: ACM, 2014, pp. 9–20.
  3. F. Koeune and F.-X. Standaert, "Foundations of security analysis and design iii," A. Aldini, R. Gorrieri, and F. Martinelli, Eds. Berlin, Heidelberg: Springer-Verlag, 2005, Ch. A Tutorial on Physical Security and Side-channel Attacks, pp. 78–108.
  4. S. Habib, S. Hauke, S. Ries, and M. Mhlhuser, "Trust as a facilitator in cloud computing: a survey," Journal of Cloud Computing, vol. 1, no. 1, 2012.
  5. J.Huang and D. Nicol, "Trust mechanisms for cloud computing," Journal of Cloud Computing, vol. 2, no. 1, 2013.
  6. R.Ko,P.Jagadpramana, M.Mowbray, S. Pearson, M. Kirchberg,
  7. Q. Liang, and B. S. Lee, "Trust cloud: A framework for accountability and trust in cloud computing," in Services (SERVICES), 2011 World Congress on, July 2011, pp. 584–588.
  8. Wood and J. Stankovic, "Denial of service in sensor networks,"Computer, vol. 35, no. 10, pp. 54–62, Oct 2002.
  9. M. Jain and H. Kandwal, "A survey on complex wormhole attackin wireless ad hoc networks," in Proceedings of International Con-ference on Advances in Computing, Control, and Telecommunication Technologies (ACT ’09), 28-29 2009, pp. 555 –558.
  10. Krontiris, T. Giannetsos, and T. Dimitriou, "Launching a sink-hole attack in wireless sensor networks; the intruder side," in Proceedings of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications(WIMOB ’08), 12-14 2008, pp. 526 –531.
  11. L. Bai, F. Ferrese, K. Ploskina, and S. Biswas, "Performance analy-sis of mobile agent-based wireless sensor network," in Proceedings of the 8th International Conference on Reliability, Maintainability and Safety (ICRMS 2009), 20-24 2009, pp. 16 –19.

Publication Details

Published in : Volume 3 | Issue 3 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 2040-2045
Manuscript Number : CSEIT1833774
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Om Prakash Singh, P. Srinivas, "A Robust Reputation-Based Trust Aware Cloud Model In Cloud Environment", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.2040-2045, March-April-2018. |          | BibTeX | RIS | CSV

Article Preview