International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122

India | Computer Science Engineering | Volume 6 Issue 1, January 2017 | Pages: 1317 - 1320


Effective Handling of Reputation-Based Trust Management in Cloud Environment

Sonali Jivan Nikam, Dr. S. N. Kini

Abstract: Trust management is a standout amongst the most difficult issue for the tackling and development of cloud computing. Many challenging issues such as privacy, security, and availability occur by highly dynamic, distributed, and non-transparent nature of cloud services. Saving consumers? privacy is not an easy task due to the confidential information involved in the interactions between customers and the trust management service. Protecting cloud services against their malicious clients (e. g. , such clients may give misleading feedback to inconvenience a specific cloud service) is a complicated issue. Due to the dynamic nature of cloud environments, assuring the availability of the trust management service is a challenging issue. In this article, we elaborate the design as well as implementation of Cloud Armor, a reputation-based trust management system which provides an arrangement of functionalities to deliver Trust as a Service (TaaS), including i) a novel convention to demonstrate the credibility of trust inputs as well as save clients' security, ii) Not only a versatile but also robust credibility model for measuring the credibility of trust feedbacks to keep cloud services from malicious clients and to analyze the dependability of cloud services, and iii) an availability model to deal with the accessibility of the decentralized usage of the trust management service. The achievability and advantages of our methodology have been tried by a model and test studies utilizing a collection of true trust feedbacks on cloud services.

Keywords: Cloud computing, trust management, reputation, credibility, credentials, security, privacy, availability



Citation copied to Clipboard!

Rate this Article

5

Characters: 0

Received Comments

No approved comments available.

Rating submitted successfully!


Top