CSEIT1722290 | Received : 10 April 2017 | Accepted : 20 April 2017 | March-April-2017 [(2)2: 884-887] International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2017 IJSRCSEIT | Volume 2 | Issue 2 | ISSN : 2456-3307 884 Reputation Attacks Detection for Effective Trust Management in Cloud Environment G. Kowselya, T. Aravind Muthayammal Engineering College, Rasipuram, Rasipuram, Tamil Nadu, India ABSTRACT Cloud Services introduces several challenging issues such as privacy, security, and availability. Preserving consumers’ privacy is not an easy task due to the sensitive information involved in the interactions between consumers and the trust management service. Guaranteeing the availability of the trust management service is another significant challenge because of the dynamic nature of cloud environments. In this article, we describe the design and implementation of CloudArmor, a reputation-based trust management framework that provides a set of functionalities to deliver Trust as a Service .model to manage the availability of the decentralized implementation of the trust management service. The feasibility and benefits of our approach have been validated by a prototype and experimental studies using a collection of real-world trust feedbacks on cloud services. Keywords : CloudArmor, Trust Management, Attacks Detection, Cloud Services Introduces, Cloud Computing I. INTRODUCTION 1.1 CLOUD COMPUTING Cloud Computing ,as a new technology paradigm with promising further, is becoming more and more popular nowadays. It can provide users with unlimited computing resource. Enterprises and people can outsource time-consuming computation workloads to cloud without spending the extra capital on deploying and maintaining hardware and software. In recent years, outsourcing computation has attracted much attention and been researched widely. It has been considered in many applications including scientific computation, linear algebraic computations, linear programming computations and modular exponentiation computations. Besides, cloud computing can also provide users with unlimited storage resource. Cloud storage is universally viewed as one of the most important services of cloud computing. Figure 1. Cloud Computing Architecture Although cloud storage provides great benefit to users, it brings new security challenging problems shown in fig 1.1. In recent years, many auditing protocols for cloud storage have been proposed to deal with this problem. These protocols focus on different aspects of cloud storage auditing such as the high efficiency, the privacy protection of data, the privacy protection of identities, dynamic data operations, the data sharing.