Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systems

被引:0
|
作者
Urvashi Rahul Saxena
Taj Alam
机构
[1] Jaypee Institute of Information Technology,Department of Computer Science & Engineering and Information Technology
关键词
Rating prediction; Implied trust; Recommendation systems; Malicious attack; Collusion attack;
D O I
暂无
中图分类号
学科分类号
摘要
The cloud service providers need to deliver cloud services based on the service level agreement to their users. The services must be secure and privacy should be maintained for the data uploaded on the cloud domain. The cloud offers multi-tenancy; hence, the risk of unauthorized access, intrusion of malicious attackers, cloud attacks, and data redundancy increases and thus raises questions about the security of cloud storage systems. The identification of malicious users and cloud attacks like collusion attacks with the help of the computed trust based on recommendation rating has been in the present work. Rating prediction in the recommender systems helps both the service users (SU) as well as the service providers (SP) to take correct decisions for appropriate service selection and ensure secure access control for the service users. The currently existing recommendation models suffer from challenges like data sparsity and cold-start issues. Moreover, security analyses based on rating values haven’t been done in past. The soft security mechanism, trust has been computed here based on recommendation rating. In this work, a novel recommendation-based trust computation and rating prediction model (RBTCRP) is proposed to identify malicious users with the help of trust computation and eventually suggest schemes that help overcome various attacks. The model also suggests mitigation techniques to overcome the issue of cold start and data sparsity. RBTCRP model generates ratings for both SUs and SPs using an amalgamated scheme of collaborative filtering model and graph-based recommendation systems. The former is used to compute similarity index computation between service users, the latter is used to construct a trusted user network set for a service user. The comparison of this work has been done with its peers under various test conditions in handling malicious and collusion attacks.
引用
收藏
页码:239 / 257
页数:18
相关论文
共 50 条
  • [31] Network Security Evaluation Model Based on Cloud Computing
    Yang, Jin
    Wang, Cilin
    Yu, Le
    Liu, Caiming
    Peng, Lingxi
    INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 488 - 495
  • [32] Trust-based security architecture for Ubiquitous Computing systems
    Hung, Le Xuan
    Giang, Pho Duc
    Zhung, Yonil
    Van Phuong, Tran
    Lee, Sungyoung
    Lee, Young-Koo
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 753 - 754
  • [33] Personalized Product Service Scheme Recommendation Based on Trust and Cloud Model
    Du, Xiaoming
    Ge, Shilun
    Wang, Nianxin
    Yang, Zhen
    IEEE ACCESS, 2020, 8 (08) : 82581 - 82591
  • [34] A dynamic cloud service selection model based on trust and SLA in cloud computing
    Wang, Yubiao
    Wen, Junhao
    Wu, Quanwang
    Guo, Lei
    Tao, Bamei
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2019, 10 (04) : 334 - 343
  • [35] A dynamic cloud service selection model based on trust and SLA in cloud computing
    Wang Y.
    Wen J.
    Wu Q.
    Guo L.
    Tao B.
    International Journal of Grid and Utility Computing, 2019, 10 (04): : 334 - 343
  • [36] A Trust-Based Defensive System Model for Cloud Computing
    Zhou, Qian
    Yu, Jiong
    Yu, Feiran
    NETWORK AND PARALLEL COMPUTING, 2011, 6985 : 146 - +
  • [37] A novel cloud-based trust model for pervasive computing
    He, R
    Niu, JW
    Yuan, M
    Hu, JP
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, : 693 - 700
  • [38] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [39] Trust Model in Cloud Computing Environment Based on Fuzzy Theory
    Gu, L.
    Zhong, J.
    Wang, C.
    Ni, Z.
    Zhang, Y.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2014, 9 (05) : 570 - 583
  • [40] A User-Based Trust Model for Cloud Computing Environment
    Saeed, Othman
    Shaikh, Riaz Ahmed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (03) : 337 - 346