CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Interaction Modelling using Trust and Recommendation in Cloud Computing Environment

by Chaitali Uikey, D.S. Bhilare
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 17
Year of Publication: 2015
Authors: Chaitali Uikey, D.S. Bhilare
10.5120/ijca2015905824

Chaitali Uikey, D.S. Bhilare . Interaction Modelling using Trust and Recommendation in Cloud Computing Environment. International Journal of Computer Applications. 124, 17 ( August 2015), 37-44. DOI=10.5120/ijca2015905824

@article{ 10.5120/ijca2015905824,
author = { Chaitali Uikey, D.S. Bhilare },
title = { Interaction Modelling using Trust and Recommendation in Cloud Computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 17 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 37-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number17/22199-2015905824/ },
doi = { 10.5120/ijca2015905824 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:14:42.441939+05:30
%A Chaitali Uikey
%A D.S. Bhilare
%T Interaction Modelling using Trust and Recommendation in Cloud Computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 17
%P 37-44
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

To ensure a secure computing in a cloud environment, recommendation and trust-based access control model is proposed. The proposed model allows calculation of direct trust and indirect trust based on recommendations. It handles cases where the requesting entity may have a past interaction experience or fresh entity without any past experience with the service. It includes the capability to cause human reasoning performance and can change by behavioral pattern modifications. Positive and negative threshold limits are used to handle malicious recommendation. The results of security mechanism so integrated with the proposed model against attacks such as bad mouthing attack, Sybil attack, and on-off behavior attack are verified.

References
  1. Hang, Chung-Wei, Yonghong Wang, and Munindar P. Singh. "An adaptive probabilistic trust model and its evaluation." In Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems-Volume 3, pp. 1485-1488. International Foundation for Autonomous Agents and Multiagent Systems, 2008.
  2. Blaze, Matt, Joan Feigenbaum, and Jack Lacy. "Decentralized trust management." In Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on, pp. 164-173. IEEE, 1996.
  3. Sun, Yan Lindsay, Zhu Han, Wei Yu, and KJ Ray Liu. "A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks." In INFOCOM, vol. 2006, pp. 1-13. 2006.
  4. Khan, Khaled M., and Qutaibah Malluhi. "Establishing trust in cloud computing." IT professional 12, no. 5 (2010): 20-27.
  5. Takabi, Hassan, James BD Joshi, and Gail-Joon Ahn. "Security and privacy challenges in cloud computing environments." IEEE Security and Privacy 8, no. 6 (2010): 24-31.
  6. Beth, Thomas, Malte Borcherding, and Birgit Klein. Valuation of trust in open networks. Springer Berlin Heidelberg, 1994.
  7. Habib, Sheikh Mahbub, Sebastian Ries, and Max Muhlhauser. "Towards a trust management system for cloud computing." In Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on, pp. 933-939. IEEE, 2011.
  8. Sun, Yan, Zhu Han, and KJ Ray Liu. "Defense of trust management vulnerabilities in distributed networks." Communications Magazine, IEEE 46, no. 2 (2008): 112-119.
  9. Noor, Talal H., Quan Z. Sheng, Sherali Zeadally, and Jian Yu. "Trust management of services in cloud environments: Obstacles and solutions." ACM Computing Surveys (CSUR) 46, no. 1 (2013): 12.
  10. Zhongxue, Yang, Qin Xiaolin, Yang Yingjie, and Li Wenrui. "A New Dynamic Trust Approach for Cloud Computing." In 1st International Workshop on Cloud Computing and Information Security. Atlantis Press, 2013.
  11. Almenárez, Florina, Andrés Marín, Daniel Díaz, Alberto Cortés, Celeste Campo, and Carlos García-Rubio. "Trust management for multimedia P2P applications in autonomic networking." Ad Hoc Networks 9, no. 4 (2011): 687-697.
  12. Dimitrakos, Theo, David Golby, and Paul Kearney. "Towards a trust and contract management framework for dynamic virtual organisations." eAdoption and the Knowledge Economy: eChallenges 2004 (2004): 27-29.
  13. Uikey, Chaitali, and D. S. Bhilare. "A Broker Based Trust Model for Cloud Computing Environment." International Journal of Emerging Technology and Advanced Engineering Volume 3, Issue 11, November 2013, pp. 247-252.
Index Terms

Computer Science
Information Sciences

Keywords

Interacting Model Trust Management Cloud Computing Environment.