Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systems

被引:2
|
作者
Saxena, Urvashi Rahul [1 ]
Alam, Taj [1 ]
机构
[1] Jaypee Inst Informat Technol, Dept Comp Sci & Engn & Informat Technol, A10,Sect 62, Noida, Uttar Pradesh, India
关键词
Rating prediction; Implied trust; Recommendation systems; Malicious attack; Collusion attack; ACCESS-CONTROL; MANAGEMENT;
D O I
10.1007/s11761-023-00377-5
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The cloud service providers need to deliver cloud services based on the service level agreement to their users. The services must be secure and privacy should be maintained for the data uploaded on the cloud domain. The cloud offers multi-tenancy; hence, the risk of unauthorized access, intrusion of malicious attackers, cloud attacks, and data redundancy increases and thus raises questions about the security of cloud storage systems. The identification of malicious users and cloud attacks like collusion attacks with the help of the computed trust based on recommendation rating has been in the present work. Rating prediction in the recommender systems helps both the service users (SU) as well as the service providers (SP) to take correct decisions for appropriate service selection and ensure secure access control for the service users. The currently existing recommendation models suffer from challenges like data sparsity and cold-start issues. Moreover, security analyses based on rating values haven't been done in past. The soft security mechanism, trust has been computed here based on recommendation rating. In this work, a novel recommendation-based trust computation and rating prediction model (RBTCRP) is proposed to identify malicious users with the help of trust computation and eventually suggest schemes that help overcome various attacks. The model also suggests mitigation techniques to overcome the issue of cold start and data sparsity. RBTCRP model generates ratings for both SUs and SPs using an amalgamated scheme of collaborative filtering model and graph-based recommendation systems. The former is used to compute similarity index computation between service users, the latter is used to construct a trusted user network set for a service user. The comparison of this work has been done with its peers under various test conditions in handling malicious and collusion attacks.
引用
收藏
页码:239 / 257
页数:19
相关论文
共 50 条
  • [21] Trust Based Interoperability Security Protocol for Grid and Cloud Computing
    Rajagopal, R.
    Chitra, M.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [22] A Trust Based Approach for Increasing Security in Cloud Computing Infrastructure
    Banirostam, Hamid
    Hedayati, Alireza
    Zadeh, Ahmad Khadem
    Shamsinezhad, Elham
    UKSIM-AMSS 15TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM 2013), 2013, : 717 - 721
  • [23] A Cloud Computing Security Model Based on Noninterference
    Lü Congdong
    QIAN Gang
    CHEN Tao
    WuhanUniversityJournalofNaturalSciences, 2019, 24 (03) : 194 - 200
  • [24] A Trust Model in Cloud Computing Based on Fuzzy Logic
    Ritu
    Jain, Sushma
    2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 47 - 52
  • [25] A trust model of cloud computing based on Quality of Service
    Paul Manuel
    Annals of Operations Research, 2015, 233 : 281 - 292
  • [26] A trust model of cloud computing based on Quality of Service
    Manuel, Paul
    ANNALS OF OPERATIONS RESEARCH, 2015, 233 (01) : 281 - 292
  • [27] An enhanced data security and trust management enabled framework for cloud computing systems
    Cindhamani, J.
    Punya, Naguboynia
    Ealaruvi, Rasha
    Babu, L. D. Dhinesh
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [28] Blockchain-based service recommendation and trust enhancement model
    Wang, Chao
    Chen, Shizhan
    Xing, Meng
    Wu, Hongyue
    Feng, Zhiyong
    KNOWLEDGE-BASED SYSTEMS, 2024, 294
  • [29] The Research Based on Security Model and Cloud Computing Strategy
    Pei, Aoqiu
    Yang, Min
    Tang, Yanbin
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1600 - 1603
  • [30] Scheme recommendation based on grey correlation prediction and trust cloud hybrid algorithm
    Geng X.
    Yang Z.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2020, 26 (04): : 980 - 988