143,661 research outputs found

    Cloudarmor: Supporting Reputation-Based Trust Management for Cloud Services

    Get PDF
    Cloud services have become predominant in the current technological era. For the rich set of features provided by cloud services, consumers want to access the services while protecting their privacy. In this kind of environment, protection of cloud services will become a significant problem. So, research has started for a system, which lets the users access cloud services without losing the privacy of their data. Trust management and identity model makes sense in this case. The identity model maintains the authentication and authorization of the components involved in the system and trust-based model provides us with a dynamic way of identifying issues and attacks with the system and take appropriate actions. Further, a trust management-based system provides us with a new set of challenges such as reputation-based attacks, availability of components, and misleading trust feedbacks. Collusion attacks and Sybil attacks form a significant part of these challenges. This paper aims to solve the above problems in a trust management-based model by introducing a credibility model on top of a new trust management model, which addresses these use-cases, and also provides reliability and availability

    Cloud Armor: a platform for credibility-based trust management of cloud services

    Get PDF
    Trust management of cloud services is emerging as an impor- tant research issue in recent years, which poses signicant challenges because of the highly dynamic, distributed, and non-transparent nature of cloud services. This paper de- scribes Cloud Armor, a platform for credibility-based trust management of cloud services. The platform provides a crawler for automatic cloud services discovery, an adaptive and robust credibility model for measuring the credibility of feedbacks, and a trust-based recommender to recommend the most trustworthy cloud services to users. This paper presents the motivation, system design, implementation, and a demonstration of the Cloud Armor platform.Talal H. Noor, Quan Z. Sheng, Anne H.H. Ngu, Abdullah Alfazi and Jeriel Lawhttp://www.cikm2013.org/cfp.ph

    A Framework, Secure and Trustworthy Assessment for Credibility Based Trust Management for Cloud Services.

    Get PDF
    Cloud Framework Supporting Automate Rank supported Trust Organization benefit of cloud describes the design and implementation of Cloud Framework, The framework provides a automate rank about executive trust system which hand over service with events to produce TaaS, whichever incorporates i) to preserving user seclusion and trust feedbacks for providing credibility’s using trending innovative protocol, ii) to protect cloud services from awful consumers for finding the details of users trust feedbacks also map the dependability of cloud administrations, and iii) a trust management service is managed by the availability context system. model describe the additional functionalities provided to Cloud Framework by increasing security, trustworthy assessment for Data Owner and Cloud Consumer. Extending the SLA period of each owner and consumer based on their request, the studies held from a collection of a real world users trust feedbacks are been verified, established on cloud services. This increases the transparency between user, consumer and cloud on TaaS

    FUZZY BASED TRUST MANAGEMENT SYSTEM FOR CLOUD ENVIRONMENT

    Full text link
    Cloud computing is a business model with high degree of flexibility, scalability in providing infrastructure, platform and software as a service over the internet. Cloud promises for easiness and reduced expense to service providers and consumers. However, a lack of trust between these two stakeholders has hindered the universal acceptance of cloud for outsourced services. In this paper, a fuzzy based trust management system is proposed to facilitate cloud consumers in identifying trustworthy providers. The performance of proposed system is validated through a simulation using CloudAnalyst and Simulink

    A Novel Design to Minimise the Energy Consumption and Node Traversing in Blockchain Over Cloud Using Ensemble Cuckoo Model

    Get PDF
    The article outlines the Blockchain’s behavioral model for services. Their reliability is proven through the use of experimental evidence. The authors highlight the major technical aspects and characteristics that are associated with the transmission of data through the network. The authors define the scheme for the network, which works with blockchain transactions, and the relationship between network characteristics on parameters used by the application. They examine the use of this model to identification of the blockchain service and also the likelihood of existing security mechanisms that are based on the technology being bypassed. Additionally, the article provides guidelines to conceal the Blockchain's traffic profile to make it more difficult for its detection in the information network. This study offers a thorough analysis of blockchain-based trust models applied to cloud computing. The paper highlights the challenges that remain unsolved and offers suggestions for future studies in the area based on new cloud-edge trust management system and double-blockchain structure, which is a cloud-based transaction model. The paper also identifies the existing challenges and offers suggestions for future studies in the area based on new cloud-edge trust management system and double-blockchain structure, which is a cloud-based transaction model. The flow of the network will be supported by models that are enhanced by cuckoo to frame the perfect network transform of data from one point to cluster, or alternatively

    A Vehicular Trust Blockchain Framework with Scalable Byzantine Consensus

    Get PDF
    The maturing blockchain technology has gradually promoted decentralized data storage from cryptocurrencies to other applications, such as trust management, resulting in new challenges based on specific scenarios. Taking the mobile trust blockchain within a vehicular network as an example, many users require the system to process massive traffic information for accurate trust assessment, preserve data reliably, and respond quickly. While existing vehicular blockchain systems ensure immutability, transparency, and traceability, they are limited in terms of scalability, performance, and security. To address these issues, this paper proposes a novel decentralized vehicle trust management solution and a well-matched blockchain framework that provides both security and performance. The paper primarily addresses two issues: i) To provide accurate trust evaluation, the trust model adopts a decentralized and peer-review-based trust computation method secured by trusted execution environments (TEEs). ii) To ensure reliable trust management, a multi-shard blockchain framework is developed with a novel hierarchical Byzantine consensus protocol, improving efficiency and security while providing high scalability and performance. The proposed scheme combines the decentralized trust model with a multi-shard blockchain, preserving trust information through a hierarchical consensus protocol. Finally, real-world experiments are conducted by developing a testbed deployed on both local and cloud servers for performance measurements

    Kerberos: Secure Single Sign-On Authentication Protocol Framework for Cloud Access Control

    Get PDF
    Cloud is a relatively new concept, so it is unsurprising that the security of information and data Protection concerns, network security and privacy still need to be addressed fully. The cloud allows clients to avoid hardware and software in Investments, gain flexibility, and cooperation with others, and to take advantage of sophisticated Services. However, security is a big problem for cloud clients especially access control; client profiles management and access services provided by public cloud environment. This article we are proposing an authentication model for cloud based on the Kerberos V5 protocol to provide single sign-on and to prevent against DDOS attacks in the access control system. This model could benefit by filtering against unauthorized access and to reduce the burden, computation and memory usage of cloud against authentication checks for each client. It acts as a trust third party between cloud servers and clients to allow secure access to cloud services. In this paper we will see some of the related work for cloud access control security issues and attacks. Then in next section we will discuss the proposed architecture

    AN EFFICIENT APPROACH TO IMPLEMENT FEDERATED CLOUDS

    Get PDF
    Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet, while providing the privacy and security. By using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, ‘virtualization' is one of the techniques dividing memory into different blocks. In most of the existing systems there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: 1) allotting the VSM(VM Security Monitor) model for each virtual machine; 2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model
    corecore