Secure Clouds Through Reputation-Based Cloud Service Trust Management

NEELAM SAISRI, Dr. V. SANGEETHA, Dr. M. SAMBASIVUDU

Abstract


Inadequate mechanisms for managing user trust in cloud services are a major roadblock to the broad adoption of this technology. Difficulties with privacy, security, and availability are inevitable in the cloud because of the service's intrinsic malleability, dispersion, and lack of transparency. Due to the sensitive nature of the information shared between customers and the trust management service, confidentiality must be maintained at all times. It's difficult to prevent malicious individuals from disrupting cloud services (for example, by providing false or misleading feedback to make a cloud service seem bad). Due to the dynamic nature of cloud infrastructure, it may be challenging to guarantee the constant availability of the trust management service in a cloud environment. We discuss the design and implementation of Cloud Armor, a reputation-based trust management framework that offers a collection of functions to provide Trust as a Service, with the goals of protecting cloud services from malicious users and comparing the trustworthiness of various cloud services. A unique protocol to verify the credibility of trust feedbacks while protecting users' anonymity; and (ii) an adaptive and resilient credibility model for gauging the veracity of trust feedbacks. Our approach's benefits and viability have been demonstrated through prototype development and experimentation with real-world trust feedback on cloud services.


References


S. M. Khan and K. W. Hamlen, “Hatman: Intra-Cloud Trust Management for Hadoop,” in Proc. CLOUD’12, 2012.

S. Pearson, “Privacy, Security and Trust in Cloud Computing,” in Privacy and Security for Cloud Computing, ser. Computer Communications and Networks, 2013, pp. 3–42.

J. Huang and D. M. Nicol, “Trust Mechanisms for Cloud Computing,” Journal of Cloud Computing, vol. 2, no. 1, pp. 1–14, 2013.

K. Hwang and D. Li, “Trusted Cloud Computing with Secure Resources and Data Coloring,” IEEE Internet Computing, vol. 14, no. 5, pp. 14–22, 2010.

M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010.

S. Habib, S. Ries, and M. Muhlhauser, “Towards a Trust Management System for Cloud Computing,” in Proc. of TrustCom’11, 2011.

I. Brandic, S. Dustdar, T. Anstett, D. Schumm, F. Leymann, and R. Konrad, “Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds,” in Proc. of CLOUD’10, 2010.

W. Conner, A. Iyengar, T. Mikalsen, I. Rouvellou, and K. Nahrstedt, “A Trust Management Framework for Service-Oriented Environments,” in Proc. of WWW’09, 2009.

T. H. Noor, Q. Z. Sheng, and A. Alfazi, “Reputation Attacks Detection for Effective Trust Assessment of Cloud Services,” in Proc. of TrustCom’13, 2013.

T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu, “Trust Management of Services in Cloud Environments: Obstacles and Solutions,” ACM Computing Surveys, vol. 46, no. 1, pp. 12:1–12:30, 2013.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.