scholarly journals A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments

2018 ◽  
Vol 75 (7) ◽  
pp. 3534-3554 ◽  
Author(s):  
Heba Kurdi ◽  
Auhood Alfaries ◽  
Abeer Al-Anazi ◽  
Sara Alkharji ◽  
Maimona Addegaither ◽  
...  
Author(s):  
Punit Gupta

Trust is a firm belief over a person or a thing in distributed environment based on its feedback on review based on its performance by others. Similarly, in cloud, trust models play an important role in solving various open challenges in cloud environment. This chapter showcases all such issues that can be solved by trust management techniques. This work discourses various trust management models and its categorization. The work discourses existing work using trust models from the field of grid computing, cloud computing, and web services because all these domains are sub child of each other. The work provides an abstract view over all trust models and find the suitable one for cloud and its future prospects.


Author(s):  
Kiran Kumar S V N Madupu

Big Data has terrific influence on scientific discoveries and also value development. This paper presents approaches in data mining and modern technologies in Big Data. Difficulties of data mining as well as data mining with big data are discussed. Some technology development of data mining as well as data mining with big data are additionally presented.


2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
S. Tephillah ◽  
J. Martin Leo Manickam

Security is a pending challenge in cooperative spectrum sensing (CSS) as it employs a common channel and a controller. Spectrum sensing data falsification (SSDF) attacks are challenging as different types of attackers use them. To address this issue, the sifting and evaluation trust management algorithm (SETM) is proposed. The necessity of computing the trust for all the secondary users (SUs) is eliminated based on the use of the first phase of the algorithm. The second phase is executed to differentiate the random attacker and the genuine SUs. This reduces the computation and overhead costs. Simulations and complexity analyses have been performed to prove the efficiency and appropriateness of the proposed algorithm for combating SSDF attacks.


Sign in / Sign up

Export Citation Format

Share Document