Abstract
Recently, more and more network fraud incidents have damaged the interests of cloud service traders. To enhance mutual trust and win–win cooperation between the users and the cloud service provider, in the article, we construct a trust access control model for cloud services. First, we propose a trust evaluation method based on direct trust, trust risk, feedback trust, reward penalty, and obligation trust to express the complexity and uncertainty of trust relationship. Second, we propose trust evaluation and weight algorithm of trust factor by information entropy and maximum dispersion; therefore, our model has a better scientific and higher practical application value. Finally, we design related comparative experiments of three models to verify the efficiency, success rate, accuracy of trust evaluation, and privacy disclosure date, and these results show that our research performance is quite superior.
Highlights
With the rapid development of Internet and information technology, more and more users upload data in cloud computing.1 Cloud computing provides flexible and scalable services for individuals and organizations, which brings great convenience to users
Traditional access control model relies on certificate authority and complex cryptography algorithm, but its application is severely limited in the distributed network environment of cloud computing
Dynamics is a big challenge of trust evaluation, because the trust is a variable with time, many literature lack the description attenuation of trust, which affect the accuracy of prediction models
Summary
With the rapid development of Internet and information technology, more and more users upload data in cloud computing. Cloud computing provides flexible and scalable services for individuals and organizations, which brings great convenience to users. With the rapid development of Internet and information technology, more and more users upload data in cloud computing.. Cloud computing provides flexible and scalable services for individuals and organizations, which brings great convenience to users. Complex architecture and data ownership bring great challenges and impacts on privacy and security in cloud computing.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Engineering Business Management
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.