2017
DOI: 10.1109/tcc.2015.2404816
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-Based Utility Service Framework for Trust Negotiations Using Federated Identity Management

Abstract: Utility based cloud services can efficiently provide various supportive services to different service providers. Trust negotiations with federated identity management are vital for preserving privacy in open systems such as distributed collaborative systems. However, due to the large amounts of server based communications involved in trust negotiations scalability issues prove to be less cumbersome when offloaded on to the cloud as a utility service. In this view, we propose trust based federated identity mana… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 40 publications
0
15
0
Order By: Relevance
“…9,10 (3) Various attacks, if malicious vehicles link ability to normal vehicle, cheat the message receiver by altering the trust management of the event message; a vehicle will be misled due to too many malicious vehicles forwarding the event message to maintain bogus messages and against the normal messages. [11][12][13] (4) Pseudonym expiry is also another problem of the current trust management systems. 15,16,18,19,21,43 If RS make a decision immediately, they might lose important messages that would have helped them to make a better decision; moreover, if RS delay decision making, they might receive some incorrect event messages.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…9,10 (3) Various attacks, if malicious vehicles link ability to normal vehicle, cheat the message receiver by altering the trust management of the event message; a vehicle will be misled due to too many malicious vehicles forwarding the event message to maintain bogus messages and against the normal messages. [11][12][13] (4) Pseudonym expiry is also another problem of the current trust management systems. 15,16,18,19,21,43 If RS make a decision immediately, they might lose important messages that would have helped them to make a better decision; moreover, if RS delay decision making, they might receive some incorrect event messages.…”
Section: Discussionmentioning
confidence: 99%
“…The same trick used to support bogus event message can still work . (3) Various attacks, if malicious vehicles link ability to normal vehicle, cheat the message receiver by altering the trust management of the event message; a vehicle will be misled due to too many malicious vehicles forwarding the event message to maintain bogus messages and against the normal messages . (4) Pseudonym expiry is also another problem of the current trust management systems .…”
Section: Introductionmentioning
confidence: 99%
“…In the literature, there is no specific assessment criterion that can be used in the comparison. Thus, the comparison is made based on the selected criteria from studies in [7], [53]- [56]. These studies have proposed certain criteria that a cloud trust management system should possess.…”
Section: Comparison With Other Methodsmentioning
confidence: 99%
“…tion metrics are proposed to estimate the reliability of security, and to be offered as a cloud utility service. 16 The significance of trust evaluation is vital to ensure secure collaborative data sharing, data analytics, and data outsourcing.…”
Section: Reliable Credential Managementmentioning
confidence: 99%