Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systems

被引:0
|
作者
Urvashi Rahul Saxena
Taj Alam
机构
[1] Jaypee Institute of Information Technology,Department of Computer Science & Engineering and Information Technology
关键词
Rating prediction; Implied trust; Recommendation systems; Malicious attack; Collusion attack;
D O I
暂无
中图分类号
学科分类号
摘要
The cloud service providers need to deliver cloud services based on the service level agreement to their users. The services must be secure and privacy should be maintained for the data uploaded on the cloud domain. The cloud offers multi-tenancy; hence, the risk of unauthorized access, intrusion of malicious attackers, cloud attacks, and data redundancy increases and thus raises questions about the security of cloud storage systems. The identification of malicious users and cloud attacks like collusion attacks with the help of the computed trust based on recommendation rating has been in the present work. Rating prediction in the recommender systems helps both the service users (SU) as well as the service providers (SP) to take correct decisions for appropriate service selection and ensure secure access control for the service users. The currently existing recommendation models suffer from challenges like data sparsity and cold-start issues. Moreover, security analyses based on rating values haven’t been done in past. The soft security mechanism, trust has been computed here based on recommendation rating. In this work, a novel recommendation-based trust computation and rating prediction model (RBTCRP) is proposed to identify malicious users with the help of trust computation and eventually suggest schemes that help overcome various attacks. The model also suggests mitigation techniques to overcome the issue of cold start and data sparsity. RBTCRP model generates ratings for both SUs and SPs using an amalgamated scheme of collaborative filtering model and graph-based recommendation systems. The former is used to compute similarity index computation between service users, the latter is used to construct a trusted user network set for a service user. The comparison of this work has been done with its peers under various test conditions in handling malicious and collusion attacks.
引用
收藏
页码:239 / 257
页数:18
相关论文
共 50 条
  • [1] Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systems
    Saxena, Urvashi Rahul
    Alam, Taj
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2023, 17 (04) : 239 - 257
  • [2] Trust Computation Framework based on User Behavior and Recommendation in Cloud Computing
    Mujawar, Tabassum.
    Bhajantri, Lokesh B.
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 423 - 428
  • [3] A Novel Recommendation-Based Trust Inference Model for MANETs
    Xia, Hui
    Li, Benxia
    Zhang, Sanshun
    Wang, Shiwen
    Cheng, Xiangguo
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2018), 2018, 10874 : 893 - 906
  • [4] Recommendation-based peer-to-peer trust model
    Dou, Wen
    Wang, Huai-Min
    Jia, Yan
    Zou, Peng
    Ruan Jian Xue Bao/Journal of Software, 2004, 15 (04): : 571 - 583
  • [5] Trust Model for Computing Security of Cloud
    Rathi, Snehal R.
    Kolekar, Vikas K.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [6] Admonita: A Recommendation-based Trust Model for Dynamic Data Integrity
    Al-Mawee, Wassnaa
    Carr, Steve
    Mayo, Jean
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 273 - 282
  • [7] Recommendation-Based Trust Evaluation Model for the Internet of Underwater Things
    Almutairi, Abeer
    Carpent, Xavier
    Furnell, Steven
    FUTURE INTERNET, 2024, 16 (09)
  • [8] Trust Model to Enhance Security of Cloud Computing
    Mohsenzadeh, Ali
    JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2015, 14 (04): : 315 - 325
  • [9] A Trust-Based Model for Security Cooperating in Vehicular Cloud Computing
    Tang, Zhipeng
    Liu, Anfeng
    Li, Zhetao
    Choi, Young-june
    Sekiya, Hiroo
    Li, Jie
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [10] Security threats and mitigation techniques affecting trust computation in cloud computing
    Saraf, Vinod
    Pachghare, Vinod
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (04): : 1161 - 1172