Academia.eduAcademia.edu

Outline

Cloud Armor: A Conclusion Work on Trust Management System

https://doi.org/10.24001/IJAEMS.3.5.21

Abstract

— Distributed computing gives Software as service (Saas) ,Platform as service(Paas) and Infrasrtucture as a service(Iaas).Cloud figuring condition having a few issues like protection and security. Trust administration is a standout amongst the most difficult issue. Shielding a specific cloud benefit from a few assaults like agreement attack(Such as client may give misdirecting criticism about specific cloud services)and Sybil attack(such as a solitary client can make numerous accounts..i.,e noxious user).In this paper we talk about cloudarmor that gives notoriety based trust administration to cloud administrations. A notoriety based trust administration system gives set of functionalities to convey Trust as a service(Taas). Taas incorporates i)Zeroknowledge believability evidence convention to demonstrate validity of the consumers criticism and jam client security, ii)a validity show it will measures te validity of input to shield cloud administrations from malevolent client. what's more, iii)an accessibility model to deal with the accessibility of the trust administration.

References (19)

  1. Vol-3, Issue-5, May-2017] https://dx.doi.org/10.24001/ijaems.3.5.21 ISSN: 2454-1311 www.ijaems.com REFERENCES
  2. S. M. Khan and K. W. Hamlen, "Hatman: Intra-cloud trust management for Hadoop," in Proc. 5th Int. Conf. Cloud Comput., 2012, pp. 494-501.
  3. S. Pearson, "Privacy, security and trust in cloud computing," in Privacy and Security for Cloud Computing, ser. Computer Communications and Networks. New York, NY, USA: Springer, 2013, pp. 3-42.
  4. J. Huang and D. M. Nicol, "Trust mechanisms for cloud computing," J. Cloud Comput., vol. 2, no. 1, pp. 1-14, 2013.
  5. K. Hwang and D. Li, "Trusted cloud computing with secure resources and data coloring," IEEE Internet Comput., vol. 14, no. 5, pp. 14-22, Sep./Oct. 2010.
  6. M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50- 58, 2010.
  7. S. Habib, S. Ries, and M. Muhlhauser, "Towards a trust management system for cloud computing," in Proc. 10th Int. Conf. Trust, Security Privacy Comput. Commun., 2011, pp. 933-939.
  8. I. Brandic, S. Dustdar, T. Anstett, D. Schumm, F. Leymann, and R. Konrad, "Compliant cloud computing (C3): Architecture and language support for user-driven compliance management in clouds," in Proc. 3rd Int. Conf. Cloud Comput., 2010, pp. 244-251.
  9. T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu, "Trust management of services in cloud environments: Obstacles and solutions," ACM Comput. Surv., vol. 46, no. 1, pp. 12:1-12:30, 2013.
  10. T. H. Noor, Q. Z. Sheng, and A. Alfazi, "Reputation attacks detection for effective trust assessment of cloud services," in Proc. 12th Int. Conf. Trust, Security Privacy Comput. Commun., 2013, pp. 469- 476.
  11. S. Pearson and A. Benameur, "Privacy, security and trust issues arising from cloud computing," in Proc. 2nd Int. Conf. Cloud Comput., 2010, pp. 693-702.
  12. S. Pearson and A. Benameur, "Privacy, security and trust issues arising from cloud computing," in Proc. 2nd Int. Conf. Cloud Comput., 2010, pp. 693-702.
  13. E. Friedman, P. Resnick, and R. Sami, "Manipulation-resistant reputation systems," in Algorithmic Game Theory. New York, USA: Cambridge Univ. Press, 2007, pp. 677-697.
  14. K. Ren, C. Wang, and Q. Wang, "Security challenges for the public cloud," IEEE Internet Comput., vol. 16, no. 1, pp. 69-73, Jan./Feb. 2012.
  15. T. Dillon, C. Wu, and E. Chang, "Cloud computing: Issues and challenges," in Proc. IEEE 24th Int. Conf. Adv. Inf. Netw. Appl., 2010, pp. 27-33.
  16. Y. Wei and M. B. Blake, "Service-oriented computing and cloud computing: Challenges and opportunities," IEEE Internet Comput., vol. 14, no. 6, pp. 72-75, Nov./Dec. 2010.
  17. K. Hoffman, D. Zage, and C. Nita-Rotaru, "A survey of attack and defense techniques for reputation systems," ACM Comput. Surv.,vol. 42, no. 1, pp. 1- 31, 2009.
  18. R. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, L. Qianhui, and L. B. Sung, "TrustCloud: A framework for accountability and trust in cloud computing," in Proc. IEEE World Congr. Services, 2011, pp. 584-588.
  19. C. Dellarocas, "The digitization of word of mouth: Promise and challenges of online feedback mechanisms," Manage. Sci., vol. 49 no. 10, pp. 1407-1424, 2003.