5 research outputs found

    Novel Techniques In Detecting Reputation based Attacks And Effectively Identify Trustworthy Cloud Services

    Get PDF
    The very dynamic, distributed, and non-transparent nature of cloud administrations make the trust administration in cloud situations a noteworthy test. Customers' criticism is a decent source to evaluate the general dependability of cloud administrations. A few specialists have perceived the importance of trust administration and proposed answers for evaluate and oversee trust taking into account feedbacks gathered from member. Trust administration is is one of the most difficult issues for the appropriation and development of distributed computing. The profoundly alert, appropriated, and non-straightforward nature of cloud administrations presents a few testing issues, for example, protection, security, and accessibility. Saving purchasers' security is not a simple undertaking because of the delicate data required in the communications between buyers and the trust administration

    Start Trusting Strangers? Bootstrapping and Prediction of Trust ⋆

    No full text
    Abstract. Web-based environments typically span interactions between humans and software services. The management and automatic calculation of trust are among the key challenges of the future service-oriented Web. Trust management systems in large-scale systems, for example, social networks or service-oriented environments determine trust between actors by either collecting manual feedback ratings or by mining their interactions. However, most systems do not support bootstrapping of trust. In this paper we propose techniques and algorithms enabling the prediction of trust even when only few or no ratings have been collected or interactions captured. We introduce the concepts of mirroring and teleportation of trust facilitating the evolution of cooperation between various actors. We assume a user-centric environment, where actors express their opinions, interests and expertises by selecting and tagging resources. We take this information to construct tagging profiles, whose similarities are utilized to predict potential trust relations. Most existing similarity approaches split the three-dimensional relations between users, resources, and tags, to create and compare general tagging profiles directly. Instead, our algorithms consider (i) the understandings and interests of actors in tailored subsets of resources and (ii) the similarity of resources from a certain actor-group’s point of view.
    corecore