Generic placeholder image

Recent Advances in Electrical & Electronic Engineering

Editor-in-Chief

ISSN (Print): 2352-0965
ISSN (Online): 2352-0973

Review Article

One Implementation Method of Trust Evaluation Tool Used on Cloud Computing Service

Author(s): Shengju Yang*

Volume 12, Issue 3, 2019

Page: [223 - 231] Pages: 9

DOI: 10.2174/2352096511666180528075030

Price: $65

Abstract

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.

Keywords: Trust evaluation, computer service, cloud computing, implementation, method, cloud computing platform.

Graphical Abstract

[1]
The IDC, greeted the IT industry for 20 years, http://www.idc.com.cn/about/detail.jsp Id = NDIx, 2009.
[2]
D. Qianni, and C. Quan, Cloud computing and its key technology. Development and applications of high performance computing, Vol. 26, no. 1, pp. 2-6, 2009.
[3]
C. Cachin, and M. Schunter, "A cloud you can trust", The INSPEC, vol. 48, no. 12, pp. 28-51, 2011.
[4]
Cloud computing use cases for discussion groups, cloud computing use cases white paper, fourth edition, 2010.07.02, p. 47-54.
[5]
M. Alhamad, T. Dilon, and E. Chang, "The conceptual SLA framework for cloud computing", In: Proceeding of the 4th International Conference on Digital Ecosystems and Technologies The Park Hyatt, Dubai, 2010.
[6]
J.J. Song, and Y. Wenjing, "Trust management related technology research", J. Commun. Comput., vol. 3, no. 1, pp. 37-43, 2006.
[7]
D. Gambetta, Can we trust? 2000, p. 213-2000. Dasgupta, 9. A. a. Prat. Reputation and asset prices: A going of information Cascades and systematic mispricing yoshinori miura, London School of Economics, 2005.
[8]
M. Deutsch, Distributive justice, a social, psychological perspective., The Yale University Press: New Haven, CT, 1985.
[9]
C.D. Zheng Xiaolin, Red China, etc. Service trust and credibility. Hangzhou, zhejiang university press, 2008.4, pp 28-38.
[10]
B. Miztal, Trust in Modern Societies., Polity Press: Cambridge, MA, 1996.
[11]
J. Sabater, and C. Sierra, “REGRET: A reputation model for gregarious Societies.http://citeseer.nj.nec.com/cache/papers/cs/22333/ 2003.
[12]
A. Rahman, and S. Hailes, “Supporting trust in virtual communities. Available at: http://citeseer.nj.nec.com/cache/papers/cs/10496 2003.
[13]
Mui, Mohtashemi M. and A. Halberstadt a. A computational Model of Trust and Reputation.
[15]
E. Chang, T. Dillon, and K.F. Hussain, Trust and reputation for service-oriented environments: Technologies for building business intelligence and consumer confidence. John Wiley & Sons, Ltd., Vu, 2006.36 m. Hauswirth, and k. Aberer. Forward P2P - based semantic web Service discovery with QoS support//BPM 2005 Workshops, p. 18 to 31 in Reading, UK, 2006.
[16]
X. Liu, and L. Xiao, "HiREP: Hierarchical Reputation Management for Peer - to - Peer Systems", In: Proceeding of the 2006 International Conference on Parallel Processing Columbus, Ohio, USA, 2006.
[17]
N.H. Li, W.H. Winsborough, and J.C. Mitchell, "Distributed the credential chain discovery in trust management", J. Comput. Secur., vol. 11, no. 1, pp. 35-86, 2003.
[18]
T. Beth, M. Borcherding, and B. Klein, "The valuation of trust in the open networks", In: Proceedings of the Third European Symposium on Research in Computer Security London, UK: Springer - Verlag, 1994. pp. 3-18.
[19]
K. Huafeng L. Wei, "Zhang hui. “Trust negotiation based on similar trust in electronic commerce research", Inform. Netw. Secur., vol. 10, pp. 40-42, 2010.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy