Identifying Fake Feedback for Effective Trust Management in Cloud Environments
نویسندگان
چکیده
Managing trust in cloud environments is emerging as an important issue in recent years. The highly dynamic, distributed, and non-transparent nature of cloud services makes the trust management of these services difficult. Malicious users may collude to give multiple misleading trust feedback to disadvantage a cloud service, or create several accounts and then leave misleading trust feedback to trick users into trusting cloud services that are not actually trustworthy. In this paper, we propose techniques enabling the identification of fake trust feedbacks and thus provide significant improvement on trust management in cloud environments. In particular, we introduce a credibility model that not only identifies credible trust feedbacks from fake ones, but also preserves the privacy of cloud service consumers. The techniques have been validated by a prototype system implementation and experimental studies.
منابع مشابه
A Platform for Credibility Model Based Trust Management on Cloud Service
Trust management is the main challenges in the cloud service environment. Trust management can be used to finding the securable service in the cloud environment. In this paper to focusing the trustable feedback analysis and also scalable analysis in both the consumer’s and provider privacy. Consumer privacy is not an easy goal for determining the information in both the trust management servers...
متن کاملRobust Reputation Based Trust Management Framework for Federated-Cloud Environments
Recently, cloud computing is emerging drastically due to its ability to provide computing and other services to customers seamlessly. However, in heterogeneous environment, when there are various consumers and multiple service providers interacting and sharing resources, concern on security issues is crucial. Hence, the trust elements can be a motivating factor that can help to materialize the ...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملA novel trust management framework for multi-cloud environments based on trust service providers
In this paper, we address the problem of trust management in multi-cloud environments using a trust management architecture based on a group of distributed Trust Service Providers (TSPs). These are independent third-party providers, trusted by Cloud Providers (CPs), Cloud Service Providers (CSPs) and Cloud Service Users (CSUs), that provide trust related services to cloud participants. TSPs are...
متن کاملBandwidth and Delay Optimization by Integrating of Software Trust Estimator with Multi-User Cloud Resource Competence
Trust Establishment is one of the significant resources to enhance the scalability and reliability of resources in the cloud environment. To establish a novel trust model on SaaS (Software as a Service) cloud resources and to optimize the resource utilization of multiple user requests, an integrated software trust estimator with multi-user resource competence (IST-MRC) optimization mechanism is...
متن کامل