A Hybrid Trust Computation Model for Cloud Services

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2017 by IJETT Journal
Volume-52 Number-1
Year of Publication : 2017
Authors : Gure Sravani, CH.Kodanda Ramu

Citation 

Gure Sravani, CH.Kodanda Ramu "A Hybrid Trust Computation Model for Cloud Services", International Journal of Engineering Trends and Technology (IJETT), V52(1),48-51 October 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Trust measurement is one of the interesting research issue in the field of trust management in cloud computing. The highly dynamic, distributed, and non-transparent nature of cloud services introduces several challenging issues such as privacy, security, and availability. Preserving consumers’ privacy is not an easy task due to the sensitive information involved in the interactions between consumers and the trust management service. In this paper we propose an empirical model of trust management with various trust computation parameters and authentication and security can be maintained by elliptic curve digital signature algorithm. Our proposed model gives efficient results than traditional models.

Reference
[1] S. Pearson and A. Benameur, “Privacy, Security and Trust Issues Arising From Cloud Computing,” in Proc. CloudCom’10, 2010.
[2] E. Bertino, F. Paci, R. Ferrini, and N. Shang, “Privacypreserving Digital Identity Management for Cloud Computing,” IEEE DataEng. Bull, vol. 32, no. 1, pp. 21– 27, 2009.
[3] E. Friedman, P. Resnick, and R. Sami, Algorithmic Game Theory. New York, USA: Cambridge University Press, 2007, ch. Manipulation-Resistant Reputation Systems, pp. 677–697.
[4] K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69–73, 2012.
[5] F. Skopik, D. Schall, and S. Dustdar, “Start Trusting Strangers? Bootstrapping and Prediction of Trust,” in Proc. of WISE’09, 2009.
[6] H. Guo, J. Huai, Y. Li, and T. Deng, “KAF: Kalman Filter Based Adaptive Maintenance for Dependability of Composite Services,” in Proc. of CAiSE’08, 2008.
[7] T. Dillon, C. Wu, and E. Chang, “Cloud Computing: Issues and Challenges,” in Proc. of AINA’10, 2010.
[8] Y. Wei and M. B. Blake, “Service-oriented Computing and Cloud Computing: Challenges and Opportunities,” Internet Computing,IEEE, vol. 14, no. 6, pp. 72–75, 2010.
[9] P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” Sep 2011, accessed: 05/06/2012, Available at: http://csrc.nist.gov/publications/drafts/800-145/Draft- SP-800-145 cloud-definition. pdf.
[10] O. David and C. Jaquet, “Trust and Identification in the Light of Virtual Persons,” pp. 1–103, Jun 2009, accessed 10/3/2011.

Keywords
Our proposed model gives efficient results than traditional models.