Novel Techniques In Detecting Reputation based Attacks And Effectively Identify Trustworthy Cloud Services

Sushma Talluri

Abstract


The very dynamic, distributed, and non-transparent nature of cloud administrations make the trust administration in cloud situations a noteworthy test. Customers' criticism is a decent source to evaluate the general dependability of cloud administrations. A few specialists have perceived the importance of trust administration and proposed answers for evaluate and oversee trust taking into account feedbacks gathered from member. Trust administration is is one of the most difficult issues for the appropriation and development of distributed computing. The profoundly alert, appropriated, and non-straightforward nature of cloud administrations presents a few testing issues, for example, protection, security, and accessibility. Saving purchasers' security is not a simple undertaking because of the delicate data required in the communications between buyers and the trust administration.


References


S. M. Khan and K. W. Hamlen, “Hatman: Intra-Cloud TrustManagement for Hadoop,” in Proc. CLOUD’12, 2012.

S. Pearson, “Privacy, Security and Trust in Cloud Computing,”in Privacy and Security for Cloud Computing, ser. Computer Communicationsand Networks, 2013, pp. 3–42.

J. Huang and D. M. Nicol, “Trust Mechanisms for Cloud Computing,”Journal of Cloud Computing, vol. 2, no. 1, pp. 1–14, 2013.

K. Hwang and D. Li, “Trusted Cloud Computing with SecureResources and Data Coloring,” IEEE Internet Computing, vol. 14,no. 5, pp. 14–22, 2010.

M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski,G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “AView of Cloud Computing,” Communications of the ACM, vol. 53,no. 4, pp. 50–58, 2010.

S. Habib, S. Ries, and M. Muhlhauser, “Towards a Trust ManagementSystem for Cloud Computing,” in Proc. of TrustCom’11,2011.

I. Brandic, S. Dustdar, T. Anstett, D. Schumm, F. Leymann, andR. Konrad, “Compliant Cloud Computing (C3): Architecture andLanguage Support for User-Driven Compliance Management inClouds,” in Proc. of CLOUD’10, 2010.

W. Conner, A. Iyengar, T. Mikalsen, I. Rouvellou, and K. Nahrstedt,“A Trust Management Framework for Service-OrientedEnvironments,” in Proc. of WWW’09, 2009.

T. H. Noor, Q. Z. Sheng, and A. Alfazi, “Reputation AttacksDetection for Effective Trust Assessment of Cloud Services,” inProc. of TrustCom’13, 2013.

T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu, “Trust Managementof Services in Cloud Environments: Obstacles andSolutions,” ACM Computing Surveys, vol. 46, no. 1, pp. 12:1–12:30, 2013.

S. Pearson and A. Benameur, “Privacy, Security and Trust IssuesArising From Cloud Computing,” in Proc. CloudCom’10, 2010.

E. Bertino, F. Paci, R. Ferrini, and N. Shang, “Privacy-preservingDigital Identity Management for Cloud Computing,” IEEE DataEng. Bull, vol. 32, no. 1, pp. 21–27, 2009.

E. Friedman, P. Resnick, and R. Sami, Algorithmic Game Theory.New York, USA: Cambridge University Press, 2007, ch.Manipulation-Resistant Reputation Systems, pp. 677–697.

K. Ren, C. Wang, and Q. Wang, “Security Challenges for thePublic Cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69–73, 2012.

F. Skopik, D. Schall, and S. Dustdar, “Start Trusting Strangers?Bootstrapping and Prediction of Trust,” in Proc. of WISE’09, 2009.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.