Abstract
Cloud computing and Internet of Things (IoT) are emerging technologies that have experienced rapid development in recent years. While cloud computing presents a new platform over which services are offered to the user more conveniently, IoT facilitates the collection of a large amount of data via interconnected wireless sensors for event monitoring and control. In such environments, ownership and control over the data may lead to potential conflict between the protection of data and the provision of services. Thus, cloud security has received a great deal of attention in recent years. In this paper, we propose a method for trust quantification based on fuzzy comprehensive evaluation theory for cloud computing to protect user data through trust quantification of cloud services after we introduce trust ontology for cloud services and define user preference trust values. By enhancing the existing trust concept based on dynamic requirements, we introduce some cloud service attributes to study layered service representation for trust preference and then apply the fuzzy comprehensive evaluation theory to perform trust quantification. We also perform some experiment to show that the proposed method is effective and can dynamically perform trust quantification to deal with malicious acts of nonfaithful services.
Highlights
Trust management in a cloud computing environment to ensure the security of information is a major challenge in the era of cloud computing and Internet of Things (IoT)
There is the requirement to perform two-way trust assessment in cloud computing environments, that is, to perform trust evaluation on behalf of the user in addition to the trust evaluation traditionally performed by the service provider on the user
We focus on the issue of cloud user data protection in cloud computing and propose a trust quantification method for the evaluation of cloud services
Summary
Trust management in a cloud computing environment to ensure the security of information is a major challenge in the era of cloud computing and Internet of Things (IoT). Since different technologies can be used in a cloud computing environment, trust assessment has its own characteristics and requirements. When the cloud service provider is a resource provider, trust can be used to determine whether it can accept requests from cloud users for access to cloud services such as computation or storage, among many other functions. When the cloud user becomes a resource provider, trust can be used to determine whether it can grant control over the data of the user to the cloud service provider to use the data. There is the requirement to perform two-way trust assessment in cloud computing environments, that is, to perform trust evaluation on behalf of the user in addition to the trust evaluation traditionally performed by the service provider on the user. One is the trust evaluation on the cloud user to protect cloud services
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Distributed Sensor Networks
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.