A Trust Evaluation Model for Cloud Computing Using Bayesian Network

Journal Title: Electronic and Cyber Defense - Year 2023, Vol 10, Issue 4

Abstract

In recent years, cloud computing has attracted much attention as a new computing model for providing infrastructure, platform, and software as a service. There is an important challenge in trust management between cloud providers, service providers, and service applicants due to the industry's rapid adaptation of cloud computing. Trust management has become very challenging in cloud computing since cloud service applicants need to choose effective, reliable, and low-risk services. One of the most important factors, which can be considered in the applicant's trust or distrust of service, is the various parameters of service. Therefore, it is necessary to use approaches to evaluate the trust of the cloud services considering their service quality parameters and their identified performance requirements. In this paper, a model is introduced to evaluate the trust for the cloud services using Bayesian network. Since the trust actually deals with probabilities, and the Bayesian network also uses probabilities to solve the problems, the Bayesian network can be used to assess the trust. The proposed method is compared with various data mining techniques to assess trust in cloud services. The results show that the accuracy, absolute error, root mean square error, and square error in the Bayesian network are 94/53, 0/037, 0/137, and 0/038, respectively. The proposed method is more efficient than different data mining techniques for trust assessment in cloud services.

Authors and Affiliations

Mihan Hosseinnezhad,Mohammad Abdollahi Azgomi,Mohammad Reza Ebrahimi Dishabi,

Keywords

Related Articles

The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator

Recently, the radio frequency fingerprint (RFF) has received attention in applications such as specific emiiter identification, detection of deception in navigation signals and detection of intrusion in wireless networks...

A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners

In this paper, we consider the problem of constructing the region-fault tolerant geometric spanners when the problem is restricted to a subclass of convex regions. Let S be a set of n points in the plane. In particular,...

Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment

Threat-tolerability as an innovative bilateral concept that focuses on the analysis of insider/adversary behavior is proposed. A zero sum differential game is designed to model the interaction between the two introduced...

A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks

During the very last decade, people have been spending lots of time working with social networks to interact with friends and to share information, thoughts, news, and etc. These social networks comprise a very important...

Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications

Nowadays, Android-based devices such as smart phones, tablets, and recently virtual reality headsets have found increasing usage in our daily lives. Along with the development of software for these devices, new malicious...

Download PDF file
  • EP ID EP731690
  • DOI -
  • Views 38
  • Downloads 0

How To Cite

Mihan Hosseinnezhad, Mohammad Abdollahi Azgomi, Mohammad Reza Ebrahimi Dishabi, (2023). A Trust Evaluation Model for Cloud Computing Using Bayesian Network. Electronic and Cyber Defense, 10(4), -. https://europub.co.uk/articles/-A-731690