CSEIT1722290 | Received : 10 April 2017 | Accepted : 20 April 2017 | March-April-2017 [(2)2: 884-887]
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
© 2017 IJSRCSEIT | Volume 2 | Issue 2 | ISSN : 2456-3307
884
Reputation Attacks Detection for Effective Trust
Management in Cloud Environment
G. Kowselya, T. Aravind
Muthayammal Engineering College, Rasipuram, Rasipuram, Tamil Nadu, India
ABSTRACT
Cloud Services introduces several challenging issues such as privacy, security, and availability. Preserving
consumers’ privacy is not an easy task due to the sensitive information involved in the interactions between
consumers and the trust management service. Guaranteeing the availability of the trust management service is
another significant challenge because of the dynamic nature of cloud environments. In this article, we describe the
design and implementation of CloudArmor, a reputation-based trust management framework that provides a set of
functionalities to deliver Trust as a Service .model to manage the availability of the decentralized implementation of
the trust management service. The feasibility and benefits of our approach have been validated by a prototype and
experimental studies using a collection of real-world trust feedbacks on cloud services.
Keywords : CloudArmor, Trust Management, Attacks Detection, Cloud Services Introduces, Cloud Computing
I. INTRODUCTION
1.1 CLOUD COMPUTING
Cloud Computing ,as a new technology paradigm with
promising further, is becoming more and more popular
nowadays. It can provide users with unlimited
computing resource. Enterprises and people can
outsource time-consuming computation workloads to
cloud without spending the extra capital on deploying
and maintaining hardware and software. In recent years,
outsourcing computation has attracted much attention
and been researched widely.
It has been considered in many applications including
scientific computation, linear algebraic computations,
linear programming computations and modular
exponentiation computations. Besides, cloud
computing can also provide users with unlimited
storage resource. Cloud storage is universally viewed
as one of the most important services of cloud
computing.
Figure 1. Cloud Computing Architecture
Although cloud storage provides great benefit to users,
it brings new security challenging problems shown in
fig 1.1. In recent years, many auditing protocols for
cloud storage have been proposed to deal with this
problem. These protocols focus on different aspects of
cloud storage auditing such as the high efficiency, the
privacy protection of data, the privacy protection of
identities, dynamic data operations, the data sharing.