• Corpus ID: 1116352

A Fuzzy Reputation-based Trust Management Scheme for Cloud Computing

@inproceedings{Wu2012AFR,
  title={A Fuzzy Reputation-based Trust Management Scheme for Cloud Computing},
  author={Xu Wu},
  year={2012}
}
  • Xu Wu
  • Published 2012
  • Computer Science
Cloud computing requires that customers trust that a service provider’s platforms are secured and provide a sufficient level of integrity for the client’s data. However, a lack of trust between cloud customers and providers has hindered the universal acceptance of clouds as an increasingly popular approach for the processing of large data sets and computationally expensive programs. Existing techniques do not satisfactorily solve the problem, a good solution is to leverage trust management… 

Figures and Tables from this paper

Trust Modeling in Cloud Computing

TLDR
Some security mechanisms that enable cloud service end users to evaluate the trust level of various cloud services and resources are presented and evaluated based on fuzzy theory on a Eucalyptus cloud platform.

T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services

TLDR
The experimental results show that the proposed T-broker yields very good results in many typical cases, and the proposed system is robust to deal with various numbers of dynamic service behavior from multiple cloud sites.

Reputation Revision Method for Selecting Cloud Services Based on Prior Knowledge and a Market Mechanism

TLDR
This method uses prior knowledge as the basis of similarity when calculating the average rating, which facilitates the recognition and filtering of unfair ratings and greatly improved the precision of the reputation revision system.

A reputation based trust center model for cyber security

  • H. H. KilinçUgur Cagal
  • Computer Science
    2016 4th International Symposium on Digital Forensic and Security (ISDFS)
  • 2016
TLDR
This study proposes a reputation based trust center model as a threat intelligence platform for legitimate participants and also it offers cloud-based cyber security services to report malicious or deficient data resources.

A Dynamic Access Control Model for Cloud Computing Environments

TLDR
This paper proposes a novel access control model for Cloud Computing systems inspired by OrBAC model, based on trust evaluation, and introduced a Trusted Third Party controlling interactions between access requestor and the system that hosts requested resources.

Security and Trust in Mobile Cloud Computing

TLDR
This thesis investigating the way to secure mobile devices from the primitive security level (Trusted Platforms) to the sophisticated one (bio-inspired intelligence) has studied the real-case of mobile cloud computing, in terms of energy efficiency and performance, and proposed a demonstration of particular MCC model, called Droplock system.

An Evolutionary Approach for Cloud Learning Agents in Multi-cloud Distributed Contexts

TLDR
This work presents an evolutionary approach based on agent cloning, i.e. a mechanism of agent reproduction allowing providers to substitute an "unsatisfactory" agent acting in a "cloud context" with a clone of an existing agent having a suitable knowledge and a good reputation in the multi-cloud context.

sCARE: Reputation Estimation for Uncertain Web Services

TLDR
A Statistical Cloud-Assisted Reputation Estimation approach for service-oriented environments in uncertain situations that uses the ratings from cooperating service consumers to uniformly describe the randomness and fuzziness of the different submitted ratings and their associated relationships in quantitative terms.

References

SHOWING 1-10 OF 14 REFERENCES

Establishing trust in cloud computing security with the help of inter-clouds

  • Mukesh Kant TripathiV. Sehgal
  • Computer Science
    2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies
  • 2014
TLDR
This paper mainly focuses on inter-clouds for establishing trust in cloud computing environment and the aim is to promote the use of inter- Cloud computing environment.

Linguistic Fuzzy Logic Enhancement of a Trust Mechanism for Distributed Networks

TLDR
This paper proposes the adaptation of a bio-inspired trust model to deal with linguistic fuzzy labels, which are closer to the human way of thinking, and this Linguistic Fuzzy Trust Model also uses fuzzy reasoning.

Establishing Trust in Cloud Computing

The paper discussed the emerging technologies that can help address the challenges of trust in cloud computing. Cloud computing provides many opportunities for enterprises by offering a range of

A trusted computing environment model in cloud architecture

TLDR
A multi-tenancy trusted computing environment model (MTCEM) is designed for IaaS delivery model, and its purpose is to assure a trusted cloud infrastructure to customers.

Trust Model for File Sharing in Cloud Computing

TLDR
This paper addresses open issues related to trust in cloud environments proposing a new trust model for cloud computing which considers a higher level view cloud resources and proves that a node is reliable when it reaches the minimum index of trust.

Cloud Computing Security Issues and Challenges

TLDR
A detailed analysis of the cloud Computing security issues and challenges focusing on the cloud computing types and the service delivery types is introduced.

An Efficient Feedback-based Trust Model for Pervasive Computing

TLDR
An efficient trust model based on the incremental Proportional-IntegralDerivative (PID) controller is proposed and the efficiency of the model is O(1) that uses only four data and needs four multiplications, four additions and two subtractions.

A Collaborative Filtering Recommendation Algorithm Based on User Interest Change and Trust Evaluation

TLDR
Experimental results show that the algorithm can make the neighbor recognition more accurately and enhance the quality of recommendation system effectively.

An improved trusted cloud computing platform model based on DAA and privacy CA scheme

  • Wang Han-zhangH. Liu-sheng
  • Computer Science
    2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
  • 2010
TLDR
By moving the responsibility of managing trusted platforms from the trusted third party to the trusted platforms of Infrastructure-as-a-Service model, the improved TCCP model achieves higher availability, reliability and safety.

Challenges for Provenance in Cloud Computing

TLDR
The structure of cloud computing is analyzed to identify the unique challenges facing provenance collection and the scenarios in which additional provenance data could be useful.