Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systems

被引:0
|
作者
Urvashi Rahul Saxena
Taj Alam
机构
[1] Jaypee Institute of Information Technology,Department of Computer Science & Engineering and Information Technology
关键词
Rating prediction; Implied trust; Recommendation systems; Malicious attack; Collusion attack;
D O I
暂无
中图分类号
学科分类号
摘要
The cloud service providers need to deliver cloud services based on the service level agreement to their users. The services must be secure and privacy should be maintained for the data uploaded on the cloud domain. The cloud offers multi-tenancy; hence, the risk of unauthorized access, intrusion of malicious attackers, cloud attacks, and data redundancy increases and thus raises questions about the security of cloud storage systems. The identification of malicious users and cloud attacks like collusion attacks with the help of the computed trust based on recommendation rating has been in the present work. Rating prediction in the recommender systems helps both the service users (SU) as well as the service providers (SP) to take correct decisions for appropriate service selection and ensure secure access control for the service users. The currently existing recommendation models suffer from challenges like data sparsity and cold-start issues. Moreover, security analyses based on rating values haven’t been done in past. The soft security mechanism, trust has been computed here based on recommendation rating. In this work, a novel recommendation-based trust computation and rating prediction model (RBTCRP) is proposed to identify malicious users with the help of trust computation and eventually suggest schemes that help overcome various attacks. The model also suggests mitigation techniques to overcome the issue of cold start and data sparsity. RBTCRP model generates ratings for both SUs and SPs using an amalgamated scheme of collaborative filtering model and graph-based recommendation systems. The former is used to compute similarity index computation between service users, the latter is used to construct a trusted user network set for a service user. The comparison of this work has been done with its peers under various test conditions in handling malicious and collusion attacks.
引用
收藏
页码:239 / 257
页数:18
相关论文
共 50 条
  • [41] User-centered Privacy and Trust Model in Cloud Computing Systems
    Dehghantanha, Ali
    Mahmod, Ramlan
    Udzir, Nur Izura
    Zulkarnain, Zoriati Ahmad
    ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 326 - +
  • [42] Rating Prediction Model Based on Causal Inference Debiasing Method in Recommendation
    Nan Jiangang
    Wang Yajun
    Wang Chengcheng
    CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (04) : 932 - 940
  • [43] A Cloud Security Framework Based on Trust Model and Mobile Agent
    Benabied, Saddek
    Zitouni, Abdelhafid
    Djoudi, Mahieddine
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 1 - 8
  • [44] Trust model for wireless network security based on the edge computing
    Jiang, Fenglian
    Tseng, Hsien-Wei
    MICROSYSTEM TECHNOLOGIES-MICRO-AND NANOSYSTEMS-INFORMATION STORAGE AND PROCESSING SYSTEMS, 2021, 27 (04): : 1627 - 1632
  • [45] Rating Prediction Model Based on Causal Inference Debiasing Method in Recommendation
    NAN Jiangang
    WANG Yajun
    WANG Chengcheng
    Chinese Journal of Electronics, 2023, 32 (04) : 932 - 940
  • [46] Trust model for wireless network security based on the edge computing
    Fenglian Jiang
    Hsien-Wei Tseng
    Microsystem Technologies, 2021, 27 : 1627 - 1632
  • [47] Knowledge-based systems for blockchain-based cognitive cloud computing model for security purposes
    Zhang, Honglei
    Zang, Zhenbo
    Muthu, BalaAnand
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2022, 13 (04)
  • [48] VANET security enhancement in cloud navigation with Internet of Things-based trust model in deep learning architecture
    Gnanajeyaraman, R.
    Arul, U.
    Michael, G.
    Selvakumar, A.
    Ramesh, S.
    Manikandan, T.
    SOFT COMPUTING, 2023,
  • [49] Security Application Model Based on Identification Management for Cloud Computing
    Wang, Yazhe
    Ma, Shunan
    Wang, Yu
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION ENGINEERING, 2014, 111 : 197 - 202
  • [50] Model for Cloud Computing Security Assessment Based on AHP and FCE
    Zhu Ruo-Xin
    Cui Xiao-jie
    Gong Shi-jun
    Ren Hong-kang
    Chen Ke
    2014 PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2014), 2014, : 197 - 202