r Research on Reputation and Risk Evaluation-Trust for Cloud Environment

被引:0
作者
Yin, Pei [1 ]
Xie, Xiaolan [1 ]
Zhou, Dejian [2 ]
机构
[1] Guilin Univ Technol, Inst Informat Sci & Engn, Guilin 541004, Peoples R China
[2] Guangxi Univ Sci & Technol, Liuzhou 545006, Peoples R China
来源
MATERIALS SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY, PTS 1 AND 2 | 2014年 / 488-489卷
关键词
Cloud computing; Trust model; Reputation mechanism; Risk assessment;
D O I
10.4028/www.scientific.net/AMM.488-489.1331
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper which starts from the characteristics of human social trust relationship, researches the trust in cloud computing environment. At present, the commercial cloud environment exist two main safe problems: one is the cloud platform trust security problems in their own special environment, the second is the security issues on the network of cheating, false, malicious ads and spam trust security. Aiming at solving this problem, on the basis of the existing trust models, this paper studies the cloud environment trust models according to the characteristics of the cloud environment, constructs a model of trust in the cloud environment Reputation and Risk Evaluation-Trust Model (RRE-Trust), and improves the trust evaluation algorithm. Finally, the experiment results show that, compared with the existing trust models, the proposed evaluate method of this model is closer to the real service behavior of service providers, resist effectively all kinds of malicious behaviors, shows a good robustness and ability in recognize.
引用
收藏
页码:1331 / +
页数:2
相关论文
共 10 条
  • [1] [Anonymous], 2009, ACM CCSW
  • [2] [Anonymous], P IEEE WIC INT C WEB
  • [3] Barnett M. L., 2006, CORPORATE REPUTATION
  • [4] Brammer Stephen J, 2006, J MANAGEMENT
  • [5] KINATEDER MP, 2003, P 4 INT C EL COMM WE
  • [6] LI N, 2003, 3 DARPA INF SURV C E
  • [7] Design of a role-based trust-management framework
    Li, NH
    Mitchell, JC
    Winsborough, WH
    [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 114 - 130
  • [8] Marios D, 2009, IEEE INTERNET COMPUT
  • [9] Ngai E.W.T., 2005, DECISION SUPPORT
  • [10] Wang Y., 2003, 3 INT C PEER TO PEER