A MECHANISM OF CLOUDS FAITH CONTROLLING SERVICE FOR REAL-TIME READINESS

B. Ramakrishna Teja, B.V. Srinivasulu

Abstract


Protecting consumers’ privacy isn't an easy task because of the sensitive information active in the interactions between consumers and also the trust management service. Safeguarding cloud services against their malicious customers really are a difficult problem. Trust management is among the most difficult issues for that adoption and development of cloud computing. The highly dynamic, distributed, and non-transparent nature of cloud services introduces several challenging issues for example privacy, security, and availability guaranteeing the supply of the trust management services are another critical challenge due to the dynamic nature of cloud conditions. In the following paragraphs, we describe the look and implementation of Cloud Armor, a status-based trust management framework that gives a collection of functionalities to provide Trust like a Service (Takas), including i) a manuscript protocol to demonstrate the credibility of trust feedbacks and preserve users’ privacy, ii) an adaptive and powerful credibility model for calculating the credibility of trust feedbacks to safeguard cloud services from malicious customers and also to compare the reliability of cloud services, and iii) an availability model to handle the availability from the decentralized implementation from the trust management service. The practicality and advantages of our approach have been validated with a prototype and experimental studies using an accumulation of real-world trust feedbacks on cloud services.


Keywords


Cloud Computing; Trust Management; Reputation; Credibility; Credentials; Security; Privacy; Availability

References


K. Hwang and D. Li, “Trusted Cloud Computing with Secure Resources and Data Coloring,” IEEE Internet Computing, vol. 14,no. 5, pp. 14–22, 2010.

E. Friedman, P. Resnick, and R. Sami, Algorithmic Game Theory.New York, USA: Cambridge University Press, 2007, ch. Manipulation-Resistant Reputation Systems, pp. 677–697

O. David and C. Jaquet, “Trust and Identification in the Light ofVirtual Persons,” pp. 1–103, Jun 2009, accessed 10/3/2011, Available at:

http://www.fidis.net/resources/deliverables/identityof-identity/.

T. H. Noor, Q. Z. Sheng, A. H. Ngu, A. Alfazi, and J. Law,“CloudArmor: A Platform for Credibility-based Trust Managementof Cloud Services,” in Proc. of CIKM’13, 2013.

C. Dellarocas, “The Digitization of Word of Mouth: Promiseand Challenges of Online Feedback Mechanisms,” ManagementScience, vol. 49, no. 10, pp. 1407–1424, 2003.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.