Cloud Armor Supporting Reputation – Based Trust Management for Cloud Services

0
784
Cloud Armor Supporting Reputation-based Trust Management for Cloud Services

Cloud Armor Supporting Reputation – Based Trust Management for Cloud Services

Abstract

Cloud Armor Supporting Reputation-based Trust Management for Cloud Services Trust management is one of the most challenging issues for cloud computing’s adoption and growth. The highly dynamic, distributed, and non-transparent nature of cloud services presents several challenging issues such as privacy, security, and availability. Preserving the privacy of consumers is not an easy task because of the sensitive information involved in interactions between consumers and the trust management service. Cloud Armor Supporting Reputation-based Trust Management for Cloud Services Protecting cloud services against their malicious users (e.g., such users may give misleading feedback to disadvantage a particular cloud service) is a difficult issue. Because of the dynamic nature of cloud environments, ensuring the availability of the trust management service is another significant challenge.

System Configuration

H/W System Configuration
Speed                   : 1.1 GHz
RAM                      : 256 MB(min)
Hard Disk              : 20 GB
Floppy Drive          : 1.44 MB
Key Board             : Standard Windows Keyboard
Mouse                  : Two or Three Button Mouse
Monitor                : SVGA
S/W System Configuration

Platform                     :  cloud computing

Operating system       : Windows Xp,7,
Server                       : WAMP/Apache
Working on                : Browser Like Firefox, IE

Conclusion

In this paper, we have displayed novel methods that assist in distinguishing notoriety-based assaults and enabling clients to recognize reliable cloud administrations in a viable way. Specifically, we present a credibility demonstrate that not only does it distinguish misdirecting trust criticism from conspiracy assaults, but it also recognizes that Sybil assaults, regardless of these assaults, occur in a long or short timeframe (i.e., separate vital or periodic assaults).