Effective Handling of Reputation-Based Trust Management in Cloud Environment
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 1, January 2017

Effective Handling of Reputation-Based Trust Management in Cloud Environment

Sonali Jivan Nikam, Dr. S. N. Kini

Trust management is a standout amongst the most difficult issue for the tackling and development of cloud computing. Many challenging issues such as privacy, security, and availability occur by highly dynamic, distributed, and non-transparent nature of cloud services. Saving consumers? privacy is not an easy task due to the confidential information involved in the interactions between customers and the trust management service. Protecting cloud services against their malicious clients (e.g., such clients may give misleading feedback to inconvenience a specific cloud service) is a complicated issue. Due to the dynamic nature of cloud environments, assuring the availability of the trust management service is a challenging issue. In this article, we elaborate the design as well as implementation of Cloud Armor, a reputation-based trust management system which provides an arrangement of functionalities to deliver Trust as a Service (TaaS), including i) a novel convention to demonstrate the credibility of trust inputs as well as save clients' security, ii) Not only a versatile but also robust credibility model for measuring the credibility of trust feedbacks to keep cloud services from malicious clients and to analyze the dependability of cloud services, and iii) an availability model to deal with the accessibility of the decentralized usage of the trust management service. The achievability and advantages of our methodology have been tried by a model and test studies utilizing a collection of true trust feedbacks on cloud services.

Keywords: Cloud computing, trust management, reputation, credibility, credentials, security, privacy, availability

Edition: Volume 6 Issue 1, January 2017

Pages: 1317 - 1320

Share this Article

How to Cite this Article?

Sonali Jivan Nikam, Dr. S. N. Kini, "Effective Handling of Reputation-Based Trust Management in Cloud Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20164294, Volume 6 Issue 1, January 2017, 1317 - 1320

93 PDF Views | 68 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Bird's Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and It's Types in Mobile Network

Palak Jain

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1949 - 1953

A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service

Pooja Saini, Kanchan Narula

Share this Article

Similar Articles with Keyword 'trust management'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 1402 - 1405

TaaS: A Framework for Trust Management in Cloud Computing Environments

C. Priya, R. Latha

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1727 - 1731

Design of Secure, Reliable and Lightweight Communication in Trusted Wireless Sensor Network

Pradnya S. Kulkarni, Dr. Aarti Dixit

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2701 - 2704

Review on Self Organized Trust Model for Distributed Systems

Suyog Ashokrao Nagare

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1317 - 1320

Effective Handling of Reputation-Based Trust Management in Cloud Environment

Sonali Jivan Nikam, Dr. S. N. Kini

Share this Article

Similar Articles with Keyword 'reputation'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1127 - 1129

Trust Checking in Social Networks Using Data Mining

Archa.S

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 803 - 804

Assessment of Security Vulnerabilities in MANET

Muskan Sharma, Chander Prabha

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 709 - 711

Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information

Pranali D. Desai, Vinod S. Wadne

Share this Article

Similar Articles with Keyword 'credibility'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1024 - 1026

Extraction of Product Information for Trustworthiness

Pooja Vanerkar, Prof. Chaita Jani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 1402 - 1405

TaaS: A Framework for Trust Management in Cloud Computing Environments

C. Priya, R. Latha

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1317 - 1320

Effective Handling of Reputation-Based Trust Management in Cloud Environment

Sonali Jivan Nikam, Dr. S. N. Kini

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 617 - 621

Real Time Based Recommendation System for Taxi Ride Sharing

Amruta N. Deshmukh, K. K. Chhajed

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 298 - 301

Survey on Security Systems for Mobile Network

Lokesh Giripunje, Sonali Nimbhorkar

Share this Article

Similar Articles with Keyword 'credentials'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1087 - 1090

A Secure Single Sign ? On Scheme for Distributed Systems and Network

Smitaprava Gachhayat, K. Ramana Reddy

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2579 - 2581

Decentralized Access Control of Data Stored In Cloud Using Attribute Based Encryption and Hidden Attributes

Sumedha Tathavadekar, Vikas Maral

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1235 - 1238

Security Enhancement of Single Sign-On Mechanism for Multiple Service Authentications

Anil. P. Jawalkar, R. Radha

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 510 - 514

A Survey on Continuous User Identity Verification Using Biometric Traits for Secure Internet Services

Harshal A. Kute, D. N. Rewadkar

Share this Article

Similar Articles with Keyword 'security'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the User's Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article

Similar Articles with Keyword 'privacy'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on User's Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Similar Articles with Keyword 'availability'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANET's

Umar I. Masumdar, N. S. Killarikar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3092 - 3094

Performance Monitoring and Improvement by VMM in Cloud System

Shafali Gupta, Payal Kulkarni

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2727 - 2733

Wireless Sensor Network and its Security ? A Survey

M. Ravi, P. Subramaniam

Share this Article
Top