Đang chuẩn bị liên kết để tải về tài liệu:
An efficient feedback based trust management framework for cloud computing

Không đóng trình duyệt đến khi xuất hiện nút TẢI XUỐNG

Cloud user feedbacks are the important source for assessing the reputation of the cloud service. But unknown attacks by malicious users may bring down the reputation of the service. This may be done by giving false feedbacks (i.e., Sybil attack). We identify the Sybil attack using this system. | ISSN:2249-5789 R N Mrudula et al, International Journal of Computer Science & Communication Networks,Vol 7(5),147-151 An Efficient Feedback Based Trust Management Framework for Cloud Computing Prof. V. Purushothama Raju Professor & HOD, Department of CSE, Shri Vishnu Engineering College for Women (A), Vishnupur, Bhimavaram, West Godavari District, Andhra Pradesh. R. N. Mrudula M. Tech, Department of CSE, Shri Vishnu Engineering College for Women (A), Vishnupur, Bhimavaram, West Godavari District, Andhra Pradesh. ABSTRACT Trust management is one of the big challenging problems for the growth and expansion of cloud computing in different areas. Other challenging issues are security, privacy, and availability of cloud service. A cloud service can be trusted if it handle these privacy, security and availability issues. In this paper, we implemented a secure feedback based trust framework that provides Trust as a Service (TAAS). Cloud user feedbacks are the important source for assessing the reputation of the cloud service. But unknown attacks by malicious users may bring down the reputation of the service. This may be done by giving false feedbacks (i.e., Sybil attack). We identify the Sybil attack using this system. The feedback based trust management system provides Trust As A Service (TAAS) and identifies the malicious users. The system includes a protocol (Zero- Knowledge Credibility Proof Protocol) to prove the credibility of feedbacks and keep the users’ privacy, a credibility model for estimating the credibility of trusted feedbacks that protect cloud services from malicious users, an availability model to manage the availability of IJCSCN | October-November 2017 Available online@www.ijcscn.com the decentralized implementation of the trust management service, and a dynamic cost estimation model to estimate the amount of bandwidth that is utilized for user activities. I. INTRODUCTION In the cloud computing, providing trust is the most challenging problem .

Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.