2021
DOI: 10.1007/s11277-021-08876-4
|View full text |Cite
|
Sign up to set email alerts
|

Trust Evaluation of Public Cloud Service Providers Using Genetic Algorithm with Intelligent Rules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…The trusted tasks are offloaded securely among the mobile clouds. The researchers in [35], proposed machine learning-based trust evaluation model for e-commerce platforms. Quantitative trust computing alters the qualitative trust computation model by adopting machine learning prediction of behavior methods.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The trusted tasks are offloaded securely among the mobile clouds. The researchers in [35], proposed machine learning-based trust evaluation model for e-commerce platforms. Quantitative trust computing alters the qualitative trust computation model by adopting machine learning prediction of behavior methods.…”
Section: Resultsmentioning
confidence: 99%
“…Table 3 represents the existing works in cloud computing security. [31] Biometric authentication Cloud data security  Encryption techniques were very simple and easy to break [32] Machine learning-based mutual authentication method Secure data transmission  High complexity and easy to impersonate [33] MCDM and BWM methods Trusted CSP selection  Increased SLA violation [34] Genetic algorithm based security Trusted CSP selection  Less Convergence and not enough parameters for trusted CSP selection [35] Fundamental trust management approach Secure task scheduling  Lack of communication security [36] Machine learning based trust evaluation Malicious behavior prediction  Poor QoS [37] Trust evaluation and reputation CSP selection  Poor credibility [38] Trust-based big data scheduling Secure task scheduling  Highly time intensive [39] Secure Secure cloud computing is performed to increase the data security and performance of the application with high quality of service (QoS). However, the QoS of the applications reduces due to various issues regarding complexity, latency, insufficient security, etc.…”
Section: Resultsmentioning
confidence: 99%
“…One of the main issues, which has significantly reduced the adoption of IoT devices, is mainly security issues [28]. The work [29] illustrated that a wide array of tools are capable of helping in the mitigation of cyber threats, which mainly target IoT systems.…”
Section: Related Workmentioning
confidence: 99%
“…Building these provider reputation systems and deciding the weights to be assigned to each evaluator's score is beyond the scope of this paper. However, it seems essential to include the possibility of taking into account this type of reputation system in the PAdv since in complex contexts involving a multitude of providers such as Cloud Computing [48] or IoT [49,50] (both similar to identity federations in terms of distribution and heterogeneity) it is a trend that is gaining more and more strength [51], even recurring to decentralised reputation systems based on blockchain [52].…”
Section: Reputationmentioning
confidence: 99%