2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS) 2015
DOI: 10.1109/intelcis.2015.7397227
|View full text |Cite
|
Sign up to set email alerts
|

Trust management in cloud computing: A survey

Abstract: Cloud computing is a new computing model that involves outsourcing of computer technologies due to the lack of their availability in certain locations. However, when there is no previous experience between cloud service providers and their consumers, consumers often hold a degree of uncertainty about the reliability, quality and performance of the services being offered. This paper presents a survey about the current trust management techniques regarding to the performance of cloud service providers taking int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 73 publications
0
4
0
Order By: Relevance
“…Policies are the preset rules to evaluate the trustworthiness of nodes to detect malicious behaviour of nodes that have been compromised. These policies rely on network configuration as well as contextual information and can be expressed in mathematical or in language form [154] [155]. A number of policy-based trust management schemes on IoT are present in research literature [130][136] [137][150] [156], however, these schemes are not yet employed in the SIoT.…”
Section: Yesmentioning
confidence: 99%
“…Policies are the preset rules to evaluate the trustworthiness of nodes to detect malicious behaviour of nodes that have been compromised. These policies rely on network configuration as well as contextual information and can be expressed in mathematical or in language form [154] [155]. A number of policy-based trust management schemes on IoT are present in research literature [130][136] [137][150] [156], however, these schemes are not yet employed in the SIoT.…”
Section: Yesmentioning
confidence: 99%
“…This technique is used when a new device joins the network and starts communication with its neighbors. By using prediction-based TM, not only malicious devices are detected but the network security and robustness are also improved [103]. Based on this technique, devices with low trust-level are avoided for communication.…”
Section: Prediction-based-in This Techniquementioning
confidence: 99%
“…They have provided a table in which some features of reviewed papers such as capability, applicability, implement‐ability, heterogeneity support, and SLA support have been investigated. As another research, authors in Reference 70 have provided a survey on trust management in a cloud environment. This research investigates some aspects such as security, privacy, the performance of cloud service providers, user feedback, credibility, and so on.…”
Section: Related Workmentioning
confidence: 99%