Abstract

Recently, more and more network fraud incidents have damaged the interests of cloud service traders. To enhance mutual trust and win–win cooperation between the users and the cloud service provider, in the article, we construct a trust access control model for cloud services. First, we propose a trust evaluation method based on direct trust, trust risk, feedback trust, reward penalty, and obligation trust to express the complexity and uncertainty of trust relationship. Second, we propose trust evaluation and weight algorithm of trust factor by information entropy and maximum dispersion; therefore, our model has a better scientific and higher practical application value. Finally, we design related comparative experiments of three models to verify the efficiency, success rate, accuracy of trust evaluation, and privacy disclosure date, and these results show that our research performance is quite superior.

Highlights

  • With the rapid development of Internet and information technology, more and more users upload data in cloud computing.1 Cloud computing provides flexible and scalable services for individuals and organizations, which brings great convenience to users

  • Traditional access control model relies on certificate authority and complex cryptography algorithm, but its application is severely limited in the distributed network environment of cloud computing

  • Dynamics is a big challenge of trust evaluation, because the trust is a variable with time, many literature lack the description attenuation of trust, which affect the accuracy of prediction models

Read more

Summary

Introduction

With the rapid development of Internet and information technology, more and more users upload data in cloud computing. Cloud computing provides flexible and scalable services for individuals and organizations, which brings great convenience to users. With the rapid development of Internet and information technology, more and more users upload data in cloud computing.. Cloud computing provides flexible and scalable services for individuals and organizations, which brings great convenience to users. Complex architecture and data ownership bring great challenges and impacts on privacy and security in cloud computing.

Motivation
Related work
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call