2021
DOI: 10.3390/app11188496
|View full text |Cite
|
Sign up to set email alerts
|

Building a Reputation Attack Detector for Effective Trust Evaluation in a Cloud Services Environment

Abstract: Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is versatile, and extensive amounts of data can be stored in the cloud. Businesses can access various services over the cloud without having to install applications. However, cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Although there are a number of advantages to cloud computing se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…The performance comparison of GFPO-TS, fuzzy rule-based trust management (FRTM) [12] and reputation attack detector (RAD) [14] techniques have been conducted and the results are presented in this section.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The performance comparison of GFPO-TS, fuzzy rule-based trust management (FRTM) [12] and reputation attack detector (RAD) [14] techniques have been conducted and the results are presented in this section.…”
Section: Resultsmentioning
confidence: 99%
“…Alshammari et al [14] have presented trust architecture for avoiding various attacks. By detecting malicious and doubtful actions using trust algorithms, it can recognize on/off and collusion attacks.…”
Section: Trust Based Attack Detectionmentioning
confidence: 99%
“…This model helps to keep the trust as long as possible as compared to the existing trust models. Alshammaria and Alsubhi [13], they have proposed a trust model to identify biased attack using malicious nodes. In this model they have provided security to the services using trust algorithms that can identify the nodes.…”
Section: Literature Surveymentioning
confidence: 99%
“…In addition, the parameters, such as the time window in continuous trust evaluation, are set manually and lack adaptivity [2][3][4][5][6][7]. At present, research on trust evaluation models mainly can be mainly divided into two categories based on multi-attribute evaluation models [8][9][10] and machine learning models [11], both of which attach importance to the mining of multidimensional historical behavioral evidence information of network entities and the continuity and adaptiveness of the trust evaluation process. However, these methods lack the study of historical behavioral data time windows.…”
Section: Introductionmentioning
confidence: 99%