International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 121

Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 1, January 2017


Effective Handling of Reputation-Based Trust Management in Cloud Environment

Sonali Jivan Nikam, Dr. S. N. Kini


Abstract: Trust management is a standout amongst the most difficult issue for the tackling and development of cloud computing. Many challenging issues such as privacy, security, and availability occur by highly dynamic, distributed, and non-transparent nature of cloud services. Saving consumers? privacy is not an easy task due to the confidential information involved in the interactions between customers and the trust management service. Protecting cloud services against their malicious clients (e. g. , such clients may give misleading feedback to inconvenience a specific cloud service) is a complicated issue. Due to the dynamic nature of cloud environments, assuring the availability of the trust management service is a challenging issue. In this article, we elaborate the design as well as implementation of Cloud Armor, a reputation-based trust management system which provides an arrangement of functionalities to deliver Trust as a Service (TaaS), including i) a novel convention to demonstrate the credibility of trust inputs as well as save clients' security, ii) Not only a versatile but also robust credibility model for measuring the credibility of trust feedbacks to keep cloud services from malicious clients and to analyze the dependability of cloud services, and iii) an availability model to deal with the accessibility of the decentralized usage of the trust management service. The achievability and advantages of our methodology have been tried by a model and test studies utilizing a collection of true trust feedbacks on cloud services.


Keywords: Cloud computing, trust management, reputation, credibility, credentials, security, privacy, availability


Edition: Volume 6 Issue 1, January 2017,


Pages: 1317 - 1320


How to Cite this Article?

Sonali Jivan Nikam, Dr. S. N. Kini, "Effective Handling of Reputation-Based Trust Management in Cloud Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20164294, Volume 6 Issue 1, January 2017, 1317 - 1320

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Cloud computing'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'trust management'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1727 - 1731

Design of Secure, Reliable and Lightweight Communication in Trusted Wireless Sensor Network

Pradnya S. Kulkarni, Dr. Aarti Dixit

Share this Article

Similar Articles with Keyword 'reputation'

Downloads: 100

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, https://www.ijsr.net/issue.php?edition=Volume%204%20Issue%202,%20February%20201

Pages: 1127 - 1129

Trust Checking in Social Networks Using Data Mining

Archa.S

Share this Article

Similar Articles with Keyword 'credibility'

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 1402 - 1405

TaaS: A Framework for Trust Management in Cloud Computing Environments

C. Priya, R. Latha

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1024 - 1026

Extraction of Product Information for Trustworthiness

Pooja Vanerkar, Prof. Chaita Jani

Share this Article

Similar Articles with Keyword 'credentials'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1235 - 1237

Single Sign-on Secure Password Mechanism for Distributed Computer Networks

Deepali M. Devkate, N. D. Kale

Share this Article

Similar Articles with Keyword 'security'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Similar Articles with Keyword 'privacy'

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Similar Articles with Keyword 'availability'

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 915 - 920

Calibration Software: Performance Analysis

Prasad Rajendra Kumbhar, Anil R. Surve, Shailender Shekhawat

Share this Article

Similar Articles with Keyword 'Cloud'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'computing'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'trust'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'management'

Downloads: 105 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 155

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article
Top