Building a Reputation Attack Detector for Effective Trust Evaluation in a Cloud Services Environment

被引:1
|
作者
Alshammari, Salah T. [1 ]
Alsubhi, Khalid [1 ]
机构
[1] King Abdulaziz Univ, Coll Comp & Informat Technol, Dept Comp Sci, Jeddah 21589, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 18期
关键词
trust model; reputation attacks; cloud computing; on; off attack; collusion attack; cloud services; ACCESS-CONTROL; RBAC MODEL; MANAGEMENT;
D O I
10.3390/app11188496
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is versatile, and extensive amounts of data can be stored in the cloud. Businesses can access various services over the cloud without having to install applications. However, cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Although there are a number of advantages to cloud computing services, especially for business owners, various challenges are posed in terms of the privacy and security of information and online services. A threat that is widely faced in the cloud environment is the on/off attack, in which entities exhibit proper behavior for a given time period to develop a positive reputation and gather trust, after which they exhibit deception. Another threat often faced by trust management services is a collusion attack, which is also known as collusive malicious feedback behavior. This is carried out when a group of people work together to make false recommendations with the intention of damaging the reputation of another party, which is referred to as a slandering attack, or to enhance their own reputation, which is referred to as a self-promoting attack. In this paper, a viable solution is provided with the given trust model for preventing these attacks. This method works by providing effective security to cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on/off attacks and collusion attacks by applying different security criteria. Finally, the results show that the proposed trust model system can provide high security by decreasing security risk and improving the quality of decisions of data owners and cloud operators.
引用
收藏
页数:18
相关论文
共 47 条
  • [41] RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services Providers
    Zhong, Hong
    Zou, JianZhong
    Cui, Jie
    Xu, Yan
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I, 2020, 11944 : 330 - 344
  • [42] Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack
    Anbu Malar, M. B. Benjula
    Prabhu, J.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2021, 17 (01) : 78 - 88
  • [43] A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll entities
    Chiregi, Matin
    Navimipour, Nima Jafari
    COMPUTERS IN HUMAN BEHAVIOR, 2016, 60 : 280 - 292
  • [44] An effective service trust evaluation and preprocessing approach considering multi-user interests in cloud manufacturing
    Xiong, Weiqing
    Lim, Ming K.
    Tseng, Ming-Lang
    Wang, Chao
    COMPUTERS & INDUSTRIAL ENGINEERING, 2022, 173
  • [45] A Dynamic and Fine-Grained User Trust Evaluation Model for Micro- Segmentation Cloud Computing Environment
    Kang, Chaoqun
    Li, Erxia
    Liu, Dongxiao
    You, Xinhong
    Li, Xiaoyong
    Journal of Computers (Taiwan), 2023, 34 (04) : 215 - 232
  • [46] A privacy protection model for health care big data based on trust evaluation access control in cloud service environment
    Hu, Xiaohan
    Jiang, Rong
    Shi, Mingyue
    Shang, Jingwei
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (03) : 3167 - 3178
  • [47] Integrating a High-Reliability Multicriteria Trust Evaluation Model with Task Role-Based Access Control for Cloud Services
    Alshammari, Salah T.
    Albeshri, Aiiad
    Alsubhi, Khalid
    SYMMETRY-BASEL, 2021, 13 (03):