Effective Cloud-Based Strategies For Managing Online Reputations



Leasing computing resources are now feasible thanks to the Infrastructure as a Service (IaaS) concept made available by cloud computing. In spite of the fact that leased computing resources provide a more financially advantageous answer to the requirements of virtual networks, customers are reluctant to make use of them due to low levels of trust in these resources. Multi-tenancy is a method for reducing operating expenses by allocating a single set of computer resources to serve the needs of several users simultaneously. The fact that computer resources and communication methods are being shared gives rise to concerns over the security and integrity of the data. Since the users are anonymous, it may be difficult for a person to decide who among their neighbours can be trusted. This may make it difficult for an individual to choose a place to live. It is very necessary to have faith in the capacity of the cloud provider (CP) to match customers with dependable co-tenants. Yet, it is in the CP's best interest to make the most of the usage of the resources. So, it enables the maximum possible degree of co-tenancy, which is unaffected by the actions of the user. We provide a powerful reputation management system that pays CPs for discriminating between genuine and malicious users. This prevents resource sharing across CPs in a federated cloud environment, which is one of the goals of our system. Through a combination of theoretical and empirical research, we demonstrate that the proposed method for managing reputations is effective and legitimate.


A. Bates, B. Mood, J. Pletcher, H. Pruse, M. Valafar, and K. Butler, “On detecting co-resident cloud instances using network flow watermarking techniques,” Int. J. Inf. Secur., vol. 13, no. 2, pp. 171–189, Apr. 2014.

Y. Azar, S. Kamara, I. Menache, M. Raykova, and B. Shepard, “Colocation- resistant clouds,” in Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing Security, ser. CCSW ’14. New York, NY, USA: ACM, 2014, pp. 9–20.

F. Koeune and F.-X. Standaert, “Foundations of security analysis and design iii,” A. Aldini, R. Gorrieri, and F. Martinelli, Eds. Berlin, Heidelberg: Springer-Verlag, 2005, ch. A Tutorial on Physical Security and Side-channel Attacks, pp. 78–108.

S. Habib, S. Hauke, S. Ries, and M. Mhlhuser, “Trust as a facilitator in cloud computing: a survey,” Journal of Cloud Computing, vol. 1, no. 1, 2012.

J. Huang and D. Nicol, “Trust mechanisms for cloud computing,”Journal of Cloud Computing, vol. 2, no. 1, 2013.

R. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang, and B. S. Lee, “Trustcloud: A framework for accountability and trust in cloud computing,” in Services (SERVICES), 2011 IEEE World Congress on, July 2011, pp. 584–588.

T. Noor and Q. Sheng, “Credibility-based trust management for services in cloud environments,” in Service-Oriented Computing, ser. Lecture Notes in Computer Science, G. Kappel, Z. Maamar, and H. Motahari-Nezhad, Eds. Springer Berlin Heidelberg, 2011,vol. 7084, pp. 328–343.

M. Macas and J. Guitart, “Trust-aware operation of providers in cloud markets,” in Distributed Applications and Interoperable Systems, ser. Lecture Notes in Computer Science, K. Magoutis and P. Pietzuch, Eds. Springer Berlin Heidelberg, 2014, vol. 8460, pp.31–37.

T. A° gotnes,W. van der Hoek, andM.Wooldridge, “Robust normative systems,” in Normative Multi-Agent Systems, 15.03. - 20.03.2009,2009.

A. Whitby, A. Jsang, and J. Indulska, “Filtering out unfair ratings in bayesian reputation systems,” in AAMAS04, 2004.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.