A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Opinion Model Based Security Reputation Enabling Cloud Broker Architecture
[chapter]
2013
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
As a solution we propose a broker architecture model that enables us to build a security reputation framework for cloud service providers, capturing comprehensive evidence of security information to build ...
its trust and security reputation ...
Cloud Broker Architecture We introduce a Cloud Broker architecture that enables building of security reputation of individual service provider and sharing the same with its customers. ...
doi:10.1007/978-3-319-03874-2_11
fatcat:rxb4tjpidveitdfi5jqhxlgiym
Trust Assessment Using Cloud Broker
[chapter]
2014
IFIP Advances in Information and Communication Technology
The cloud broker operates in different modes and this enables a variety of trust assessments. ...
provisions security. ...
This paper uses the opinion based trust model to perform trust assessment of cloud providers to provide recommendations, security reputation and a group reputation in the different modes of cloud broker ...
doi:10.1007/978-3-662-43813-8_18
fatcat:i56p6bbafnh4dfjylfv6kpv4cu
An Effective Way of Evaluating Trust in Inter-cloud Computing
2017
International Journal of Computer Network and Information Security
This is accomplished through trust management systems that calculate the trust rating of clouds from opinions from their peers. ...
This paper proposes a method to reduce such problems by considering the latest history of communication of a particular cloud and ignore the opinions given by less trusted clouds. ...
Each broker is responsible for all the resources in its domain. Accuracy concept is used to enable peer review-based mechanisms to function with imprecise trust metrics. ...
doi:10.5815/ijcnis.2017.02.05
fatcat:shjkv3w5gjfwbdcm2jro5djopi
Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing
2019
Information
This new network architecture model can deliver services directly from the cloud to the very edge of the network while providing the best efficiency in mobile networks. ...
All these ways focus on enhancing the efficiency, stability, and security of MEC services in presenting trustworthy services. ...
From the perspective of the network architecture, MEC enables some of the cloud computing tasks to be undertaken by edge computing devices. ...
doi:10.3390/info10080259
fatcat:zu5n2i3enjczxbbkhr2x3ptg54
Trust Models in Cloud Computing: A Review
2017
International Journal of Wireless and Microwave Technologies
In this paper, a methodical literature analysis of trust management and existing trust models is presented to evaluate trust based on various QoS parameters. ...
Trust is a vital factor, especially for service oriented systems in the area of Information Technology and Security. ...
[22] have reported a trust model which is based on a reputation of a cloud provider. This model has used intermediate entities and brokers. This design depends on several brokers in every sphere. ...
doi:10.5815/ijwmt.2017.04.02
fatcat:4iizflaylfcshhu4srycwmniim
Secure service interaction for collaborative business processes in the inter-cloud
2015
Proceedings of the 2015 Federated Conference on Computer Science and Information Systems
The proposed architecture is evaluated with a sample collaborative business process of inter-cloud service interaction. ...
The paper derives requirements and solutions in the field of inter-cloud service communication with a special focus on security. ...
The architecture is based on proxies that are managed by a central broker engine. ...
doi:10.15439/2015f282
dblp:conf/fedcsis/SchwarzbachGPRF15
fatcat:medkdcu4yvavrarzduey4cmyam
HonestChain: Consortium blockchain for protected data sharing in health information systems
2021
Peer-to-Peer Networking and Applications
., HIPAA, common data model) distributed data sets that enable predictive analytics. ...
We evaluate HonestChain using Hyperledger Composer in a realistic simulation testbed on a public cloud infrastructure. ...
Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the author(s) and do not nec-essarily reflect the views of the National Science Founda-tion. ...
doi:10.1007/s12083-021-01153-y
pmid:33968293
pmcid:PMC8092970
fatcat:73evd6g73fdjdg357cumnecpoe
Optimal selection techniques for Cloud service providers
2020
IEEE Access
We had catalogue in three subsets: i) Selection Strategies, ii) Broker-based Architectures and Frameworks and iii) Mathematical Algorithm and Models. ...
[69] focus on the architecture of the Cloud Coordinator component of the Broker-based architecture presented in Buyya et al. [44] . ...
He is co-leading the design of Stack4Things IoTronic, an OpenStack-based I/Ocloud framework. ...
doi:10.1109/access.2020.3035816
fatcat:5iszso43qzbktmqzayv4k5rodm
Trust mechanisms for cloud computing
2013
Journal of Cloud Computing: Advances, Systems and Applications
Trust is a critical factor in cloud computing; in present practice it depends largely on perception of reputation, and self assessment by providers of cloud services. ...
mechanisms together to reveal chains of trust in the cloud. ...
http://www.journalofcloudcomputing.com/content/2/1/9
Acknowledgements This material is based upon research sponsored by the U.S. Air Force Research Laboratory (AFRL) and the U.S. ...
doi:10.1186/2192-113x-2-9
fatcat:34olggqqxvcatp5vcge3rgns2u
Trusted Computing Model with Attestation to Assure Security for Software Services in a Cloud Environment
2017
International Journal of Intelligent Engineering and Systems
The model implements an attestation rule engine based on a Cloud Attestation Protocol (CAP). ...
Predicting the behavioural patterns of an ambiguous environment is a complex task that could risk the integrity of security architecture if left unnoticed. ...
Services
Cloud
Broker
2. ...
doi:10.22266/ijies2017.0228.16
fatcat:3sewkjjggrhhjpnqwct3vwbc6m
T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
2015
IEEE Transactions on Information Forensics and Security
First, a trusted third party-based service brokering architecture is proposed for multiple cloud environment, in which the T-broker acts as a middleware for cloud trust management and service matching. ...
Oriented by requirement of trust management in multiple cloud environment, this paper presents T-broker, a trustaware service brokering scheme for efficient matching cloud services (or resources) to satisfy ...
As depicted in Fig. 2 , T-broker architecture, a service brokering system is proposed based on direct monitoring information and indirect feedbacks for the multiple cloud environment, in which T-broker ...
doi:10.1109/tifs.2015.2413386
fatcat:333cfuwqm5d4liqp7kchvma4m4
Trust as a facilitator in cloud computing: a survey
2012
Journal of Cloud Computing: Advances, Systems and Applications
for trust and reputation models (or systems) to support the consumers in establishing trust on Cloud providers. ...
Hence, cloud-related specific parameters (QoS+) are required for the trust and reputation systems in Cloud environments. ...
Acknowledgements This work is supported by Center for Advanced Security Research Darmstadt (CASED). ...
doi:10.1186/2192-113x-1-19
fatcat:pgnqlqjq7rgetn3mwppipg5ere
Resource Allocation Based on Matchmaking Services in Multiple Clouds Using Trustworthy and Scalable Service Providers Algorithm
2019
International Journal of Intelligent Engineering and Systems
To bring the better solution, Trustworthy and Scalable Service Providers Algorithm is proposed for analyzing the design the relationship among the users, the broker, and cloud service providers. ...
Proposed method works based on information entropy theory to evaluate the multi-attribute based decision-making. Here, cloud user efficiently can find trustable cloud service providers in advance. ...
In [17] designed a brokerage-based architecture; where, the cloud brokers are responsible for the service selection. ...
doi:10.22266/ijies2019.0831.03
fatcat:lfn2cslojbaxbe5xrowjqucuki
The Cloud Needs a Reputation System
[article]
2015
arXiv
pre-print
revenues for high quality service providers by enabling reputation to impact discovery. ...
In this paper, we introduce Seit, an inter-tenant framework that manages the interactions between cloud services. Seit is a software-defined reputation-based framework. ...
Section 3 highlights how a reputation-based system can benefit different cloud environments, and also identifies key design challenges. Section 4 describes the architecture of Seit. ...
arXiv:1509.09057v1
fatcat:5lo622cterapbm3rdnefgq2cmy
Modeling and Analysis of Cloud Collaborative Commerce
2013
International Journal on Cloud Computing Services and Architecture
The model consists of six main components, these are: client, provider, auditor, broker, security and privacy, and communications network. ...
The new cc-commerce model is used to develop a simple and flexible Web-based test tool, namely, the cc-commerce test (3CT) tool. ...
Finally, the service oriented architecture (SOA) and model-driven architecture (MDA) based-platform for c-commerce is developed to enable value-added collaboration between partners by providing new technical ...
doi:10.5121/ijccsa.2013.3101
fatcat:n2adec5zanfjto5tfgoogxn6ye
« Previous
Showing results 1 — 15 out of 1,551 results