A STRONG CHARACTER MANAGEMENT METHOD IN THE FEDERATED CLOUD
Abstract
In highly dynamic and distributed cloud services, managing trust between cloud users and cloud services is a challenging challenge. Guaranteeing access to the trust management service is a major challenge due to the dynamic nature of the cloud environment. Comments from users in the cloud are a good source of quality to consider the overall reliability of cloud services. In our work, we highlight the improvisation of trust management in the cloud by proposing new ways to verify the reliability of trust comments and design a new trust management framework based on the cloud-based cloud. This framework will take advantage of techniques to identify persuasive proposals from malicious ones. In this context, trust is delivered as a service in which the Trust Management Service covers several distributed nodes to handle comments by decentralized means. The new cloud-based trust management framework provides many functions to distribute trust as a service, including a new procedure to demonstrate the credibility of trust comments and protect user privacy, represents a great credibility to measure trustworthiness of comments to handle cloud services of malicious users; Application of the decentralized credit management service.
Keywords
References
T. Noor and Q. Sheng, “Credibility-based trust management for services in cloud environments,” in Service-Oriented Computing, ser. Lecture Notes in Computer Science, G. Kappel, Z. Maamar, and H. Motahari-Nezhad, Eds. Springer Berlin Heidelberg, 2011, vol. 7084, pp. 328–343.
M. Macas and J. Guitart, “Trust-aware operation of providers in cloud markets,” in Distributed Applications and Interoperable Systems, ser. Lecture Notes in Computer Science, K. Magoutis and P. Pietzuch, Eds. Springer Berlin Heidelberg, 2014, vol. 8460, pp. 31–37.
W. T. L. Teacy, J. Patel, N. R. Jennings, and M. Luck, “Coping with inaccurate reputation sources: Experimental analysis of a probabilistic trust model,” in Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, ser. AAMAS ’05. New York, NY, USA: ACM, 2005, pp. 997–1004.
H. Zhao, X. Yang, and X. Li, “An incentive mechanism to reinforce truthful reports in reputation systems,” J. Netw. Comput. Appl., vol. 35, no. 3, pp. 951–961, May 2012.
E. Ayday and F. Fekri, “Robust reputation management using probabilistic message passing,” in Proceedings of the Global Communications Conference, GLOBECOM2011,5-9December2011, Houston, Texas, USA, 2011, pp. 1–5.
Y. Xin, I. Baldine, A. Mandal, C. Heermann, J. Chase, and A. Yumerefendi, “Embedding virtual topologies in networked clouds,” in Proceedings of the 6th International Conference on Future Internet Technologies, ser. CFI’11. NewYork,NY,USA:ACM,2011, pp. 26–29.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.