Please use this identifier to cite or link to this item:
https://hdl.handle.net/2440/83851
Citations | ||
Scopus | Web of Science® | Altmetric |
---|---|---|
?
|
?
|
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Noor, T. | - |
dc.contributor.author | Sheng, Q. | - |
dc.contributor.author | Alfazi, A. | - |
dc.date.issued | 2013 | - |
dc.identifier.citation | Proceedings, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013: pp.469-476 | - |
dc.identifier.isbn | 9780769550220 | - |
dc.identifier.issn | 2324-898X | - |
dc.identifier.uri | http://hdl.handle.net/2440/83851 | - |
dc.description.abstract | Consumers' feedback is a good source to help assess overall trustworthiness of cloud services. However, it is not unusual that a trust management system experiences malicious behaviors from its users (i.e., collusion or Sybil attacks). In this paper, we propose techniques for the detection of reputation attacks to allow consumers to effectively identify trustworthy cloud services. We introduce a credibility model that not only identifies misleading trust feedbacks from collusion attacks but also detects Sybil attacks, either strategic (in a long period of time) or occasional (in a short period of time). We have collected a large collection of consumer's trust feedbacks given on real-world cloud services (over 10, 000 records) to evaluate and demonstrate the applicability of our approach and show the capability of detecting such malicious behaviors. | - |
dc.description.statementofresponsibility | Talal H. Noor, Quan Z. Sheng, and Abdullah Alfazi | - |
dc.language.iso | en | - |
dc.publisher | IEEE | - |
dc.relation.ispartofseries | IEEE International Conference on Trust Security and Privacy in Computing and Communications | - |
dc.rights | © 2013 IEEE | - |
dc.source.uri | http://dx.doi.org/10.1109/trustcom.2013.59 | - |
dc.subject | Trust management | - |
dc.subject | cloud computing | - |
dc.subject | credentials | - |
dc.subject | credibility | - |
dc.subject | reputation | - |
dc.subject | attacks detection | - |
dc.subject | privacy | - |
dc.title | Reputation attacks detection for effective trust assessment among cloud services | - |
dc.type | Conference paper | - |
dc.contributor.conference | IEEE International Conference on Trust, Security and Privacy in Computing and Communications (12th : 2013 : Melbourne, Australia) | - |
dc.identifier.doi | 10.1109/TrustCom.2013.59 | - |
dc.publisher.place | United States | - |
pubs.publication-status | Published | - |
Appears in Collections: | Aurora harvest Computer Science publications |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.