Building a Reputation Attack Detector for Effective Trust Evaluation in a Cloud Services Environment

被引:1
|
作者
Alshammari, Salah T. [1 ]
Alsubhi, Khalid [1 ]
机构
[1] King Abdulaziz Univ, Coll Comp & Informat Technol, Dept Comp Sci, Jeddah 21589, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 18期
关键词
trust model; reputation attacks; cloud computing; on; off attack; collusion attack; cloud services; ACCESS-CONTROL; RBAC MODEL; MANAGEMENT;
D O I
10.3390/app11188496
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is versatile, and extensive amounts of data can be stored in the cloud. Businesses can access various services over the cloud without having to install applications. However, cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Although there are a number of advantages to cloud computing services, especially for business owners, various challenges are posed in terms of the privacy and security of information and online services. A threat that is widely faced in the cloud environment is the on/off attack, in which entities exhibit proper behavior for a given time period to develop a positive reputation and gather trust, after which they exhibit deception. Another threat often faced by trust management services is a collusion attack, which is also known as collusive malicious feedback behavior. This is carried out when a group of people work together to make false recommendations with the intention of damaging the reputation of another party, which is referred to as a slandering attack, or to enhance their own reputation, which is referred to as a self-promoting attack. In this paper, a viable solution is provided with the given trust model for preventing these attacks. This method works by providing effective security to cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on/off attacks and collusion attacks by applying different security criteria. Finally, the results show that the proposed trust model system can provide high security by decreasing security risk and improving the quality of decisions of data owners and cloud operators.
引用
收藏
页数:18
相关论文
共 47 条
  • [1] Building a Comprehensive Trust Evaluation Model to Secure Cloud Services From Reputation Attacks
    Alshammari, Salah T.
    Al-Razgan, Muna
    Alfakih, Taha
    Alghamdi, Khalid A.
    IEEE Access, 2024, 12 : 150754 - 150775
  • [2] Building a trust model system to avoid cloud services reputation attacks
    Alshammari, Salah T.
    Albeshri, Aiiad
    Alsubhi, Khalid
    EGYPTIAN INFORMATICS JOURNAL, 2021, 22 (04) : 493 - 503
  • [3] Reputation Attacks Detection for Effective Trust Assessment Among Cloud Services
    Noor, Talal H.
    Sheng, Quan Z.
    Alfazi, Abdullah
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 469 - 476
  • [4] r Research on Reputation and Risk Evaluation-Trust for Cloud Environment
    Yin, Pei
    Xie, Xiaolan
    Zhou, Dejian
    MATERIALS SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY, PTS 1 AND 2, 2014, 488-489 : 1331 - +
  • [5] A Trust Reputation Architecture for Cloud Computing Environment
    Bilecki, Luis Felipe
    Fiorese, Adriano
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 614 - 621
  • [6] Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms
    Alshammari, Salah T.
    Alsubhi, Khalid
    Aljahdali, Hani Moaiteq Abdullah
    Alghamdi, Ahmed Mohammed
    IEEE ACCESS, 2021, 9 : 161488 - 161506
  • [7] Fuzzy Approach for the Evaluation of Trust and Reputation of Services
    Ludwig, Simone A.
    Pulimi, Venkat
    Hnativ, Andriy
    2009 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3, 2009, : 115 - 120
  • [8] Trust Models for Services in Cloud Environment: A Survey
    Rawashdeh, Enas F.
    Abuqaddom, Inas I.
    Hudaib, Amjad A.
    2018 9TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2018, : 175 - 180
  • [9] CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services
    Noor, Talal H.
    Sheng, Quan Z.
    Yao, Lina
    Dustdar, Schahram
    Ngu, Anne H. H.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (02) : 367 - 380
  • [10] A Trust Reputation Architecture for Virtual Organization Integration in Cloud Computing Environment
    Bilecki, Luis Felipe
    Fiorese, Adriano
    Matos, Fernando
    ICEIS: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2, 2017, : 695 - 702