Novel Techniques In Detecting Reputation based Attacks And Effectively Identify Trustworthy Cloud Services

Abstract

The very dynamic, distributed, and non-transparent nature of cloud administrations make the trust administration in cloud situations a noteworthy test. Customers' criticism is a decent source to evaluate the general dependability of cloud administrations. A few specialists have perceived the importance of trust administration and proposed answers for evaluate and oversee trust taking into account feedbacks gathered from member. Trust administration is is one of the most difficult issues for the appropriation and development of distributed computing. The profoundly alert, appropriated, and non-straightforward nature of cloud administrations presents a few testing issues, for example, protection, security, and accessibility. Saving purchasers' security is not a simple undertaking because of the delicate data required in the communications between buyers and the trust administration.

Authors and Affiliations

SushmaTalluri| M.Tech, Software Engineer, TATA Consultancy services,Gachibowli, Hyderabad

Keywords

Related Articles

Data Access In Disruption Tolerant Networks Using Cooperative Caching

Disruption tolerant networks (DTNs) consist of mobile devices that call each other opportunistically. Due to the low node density and impulsive no demobility, only broken network connectivity exists in DTNs, and the...

Powerful Mechanism To Avoid Denial Of Service Attack For Providing Data Security Using Software Puzzle

Network is a gathering of hubs that interrelate with each other for switch over the data. This data is vital for that hub is saved secretly. Attacker in the framework may catch this private data and twisted. So secur...

Ergonomic Evaluation of Workstations in an IT Industry

In the Information Technology (IT) industry an individual spends most of time in front of their computers working for more than 7 to 8 hours per day. This continuous sitting in the same postures has been the reason for...

A New Algorithm for Distributed Generator (DG) Placement and Sizing for Distribution Systems

In today’s distribution grids the number of distributed generation units is increasing rapidly. Combined heat and power (CHP) plants and wind turbines are most often installed. Integration of these DG units into th...

Performance Improved Active Power Filter Using Fuzzy Based Adaptive Controller for Renewable Power Generation Systems

An Active power filter implemented with a four-leg voltage-source inverter utilizing a predictive control scheme is introduced. The utilization of a fourleg voltage-source inverter permits the pay of current consonant...

Download PDF file
  • EP ID EP16759
  • DOI -
  • Views 275
  • Downloads 9

How To Cite

SushmaTalluri (2016). Novel Techniques In Detecting Reputation based Attacks And Effectively Identify Trustworthy Cloud Services. International Journal of Science Engineering and Advance Technology, 4(6), 287-289. https://europub.co.uk/articles/-A-16759