Building a Reputation Attack Detector for Effective Trust Evaluation in a Cloud Services Environment

被引:3
作者
Alshammari, Salah T. [1 ]
Alsubhi, Khalid [1 ]
机构
[1] King Abdulaziz Univ, Coll Comp & Informat Technol, Dept Comp Sci, Jeddah 21589, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 18期
关键词
trust model; reputation attacks; cloud computing; on; off attack; collusion attack; cloud services; ACCESS-CONTROL; RBAC MODEL; MANAGEMENT;
D O I
10.3390/app11188496
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is versatile, and extensive amounts of data can be stored in the cloud. Businesses can access various services over the cloud without having to install applications. However, cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Although there are a number of advantages to cloud computing services, especially for business owners, various challenges are posed in terms of the privacy and security of information and online services. A threat that is widely faced in the cloud environment is the on/off attack, in which entities exhibit proper behavior for a given time period to develop a positive reputation and gather trust, after which they exhibit deception. Another threat often faced by trust management services is a collusion attack, which is also known as collusive malicious feedback behavior. This is carried out when a group of people work together to make false recommendations with the intention of damaging the reputation of another party, which is referred to as a slandering attack, or to enhance their own reputation, which is referred to as a self-promoting attack. In this paper, a viable solution is provided with the given trust model for preventing these attacks. This method works by providing effective security to cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on/off attacks and collusion attacks by applying different security criteria. Finally, the results show that the proposed trust model system can provide high security by decreasing security risk and improving the quality of decisions of data owners and cloud operators.
引用
收藏
页数:18
相关论文
共 36 条
[21]  
Mahajan S., 2017, Int. Res. J. Eng. Technol, V4, P2934
[22]   A Trust Evaluation Model for Cloud Computing Using Service Level Agreement [J].
Marudhadevi, D. ;
Dhatchayani, V. Neelaya ;
Sriram, V. S. Shankar .
COMPUTER JOURNAL, 2015, 58 (10) :2225-2232
[23]  
Noor Talal H., 2013, Web Engineering. 13th International Conference, ICWE 2013. Proceedings: LNCS 7977, P416, DOI 10.1007/978-3-642-39200-9_35
[24]  
Noor T. H., 2014, TRUST MANAGEMENT CLO
[25]   CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services [J].
Noor, Talal H. ;
Sheng, Quan Z. ;
Yao, Lina ;
Dustdar, Schahram ;
Ngu, Anne H. H. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (02) :367-380
[26]   Reputation Attacks Detection for Effective Trust Assessment Among Cloud Services [J].
Noor, Talal H. ;
Sheng, Quan Z. ;
Alfazi, Abdullah .
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, :469-476
[27]   Reputation based approach for improved fairness and robustness in P2P protocols [J].
Nwebonyi, Francis N. ;
Martins, Rolando ;
Correia, Manuel E. .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (04) :951-968
[28]  
Tan Z., 2014, P 11 WEB INF SYST AP
[29]   Intrusion detection scheme based node trust value in WSNs [J].
Tong, Wei-Ming ;
Liang, Jian-Quan ;
Lu, Lei ;
Jin, Xian-Ji .
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2015, 37 (07) :1644-1649
[30]  
Tsai W.T., 2009, P 2009 IEEE INT C SE