ABSTRACT:
Trust management is one
of the most challenging issues for the adoption and growth of cloud computing.
The highly dynamic, distributed, and non-transparent nature of cloud services
introduces several challenging issues such as privacy, security, and
availability. Preserving consumers’ privacy is not an easy task due to the
sensitive information involved in the interactions between consumers and the
trust management service. Protecting cloud services against their malicious
users (e.g., such users might give misleading feedback to disadvantage a
particular cloud service) is a difficult problem. Guaranteeing the availability
of the trust management service is another significant challenge because of the
dynamic nature of cloud environments. In this article, we describe the design
and implementation of CloudArmor, a reputation-based trust management framework
that provides a set of functionalities to deliver Trust as a Service (TaaS),
which includes i) a novel protocol to prove the credibility of trust feedbacks
and preserve users’ privacy, ii) an adaptive and robust credibility model for
measuring the credibility of trust feedbacks to protect cloud services from
malicious users and to compare the trustworthiness of cloud services, and iii)
an availability model to manage the availability of the decentralized
implementation of the trust management service. The feasibility and benefits of
our approach have been validated by a prototype and experimental studies using
a collection of real-world trust feedbacks on cloud services.
AIM:
The main aim is to
preserve the user’s privacy, security, and availability in cloud services. We
tend design and implementation of CloudArmor, a reputation-based trust
management framework that provides a set of functionalities to deliver Trust as
a Service (TaaS).
SCOPE:
The Scope of this
project is to create a reputation-based trust management framework that
provides a set of functionalities to deliver Trust as a Service (TaaS). This
TaaS Includes
1.
A novel protocol to prove the
credibility of trust feedbacks and preserve users’ privacy
2.
An adaptive and robust credibility model
for measuring the credibility of trust feedbacks to protect cloud services from
malicious users and to compare the trustworthiness of cloud services
3.
An availability model to manage the
availability of the decentralized implementation of the trust management
service.
EXISTING
SYSTEM:
This paper focuses on
improving trust management in cloud environments by proposing novel ways to
ensure the credibility of trust feedbacks. Consumers’ feedback is a good source
to assess the overall trustworthiness of cloud services. Several researchers have
recognized the significance of trust management and proposed solutions to
assess and manage trust based on feedbacks collected from participants. In
reality, it is not unusual that a cloud service experiences malicious behaviors
(e.g., collusion or Sybil attacks) from its users.
DISADVANTAGES:
The following key
issues of the trust management in cloud environments:
1.
Consumers’ Privacy
2.
Cloud Services Protection
3.
Trust Management Service’s Availability
PROPOSED
SYSTEM:
This proposes design
and the implementation of CloudArmor (CLOud consUmers credibility Assessment
& tRust manageMent of clOud seRvices): A framework for reputation-based
trust management in cloud environments. In CloudArmor, trust is delivered as a
service (TaaS) where TMS spans several distributed nodes to manage feedbacks in
a decentralized way. CloudArmor exploits techniques to identify credible
feedbacks from malicious ones.
ADVANTAGES:
The platform provides an environment where users can give feedback and request trust assessment for a particular cloud service. Specifically, the trust management service (TMS) consists of two main components:
The platform provides an environment where users can give feedback and request trust assessment for a particular cloud service. Specifically, the trust management service (TMS) consists of two main components:
1.
The Trust Data Provisioning
2.
The Trust Assessment Function
SYSTEM
ARCHITECTURE:
SYSTEM
CONFIGURATION:-
HARDWARE REQUIREMENTS:-
· Processor - Pentium –III
·
Speed - 1.1 Ghz
·
RAM - 256 MB(min)
·
Hard
Disk - 20 GB
·
Floppy
Drive - 1.44 MB
·
Key
Board - Standard Windows Keyboard
·
Mouse - Two or Three Button Mouse
·
Monitor -
SVGA
SOFTWARE REQUIREMENTS:-
·
Operating
System : Windows 7
·
Front
End : JSP AND SERVLET
·
Database
: MYSQL
·
Tool :NETBEANS
REFERENCES:
Talal H. Noor, Quan Z. Sheng, Lina Yao, Schahram Dustdar and Anne H.H. Ngu “CLOUDARMOR: SUPPORTING REPUTATION-BASED TRUST MANAGEMENT FOR CLOUD SERVICES” IEEE Transactions On Parallel And Distributed Systems, Volume: PP, Issue: 99, January 2015
Talal H. Noor, Quan Z. Sheng, Lina Yao, Schahram Dustdar and Anne H.H. Ngu “CLOUDARMOR: SUPPORTING REPUTATION-BASED TRUST MANAGEMENT FOR CLOUD SERVICES” IEEE Transactions On Parallel And Distributed Systems, Volume: PP, Issue: 99, January 2015
No comments:
Post a Comment