Advertisement

Trust Management in Cloud Services

  • Talal H. Noor
  • Quan Z. Sheng
  • Athman Bouguettaya

Table of contents

  1. Front Matter
    Pages i-xix
  2. Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya
    Pages 1-7
  3. Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya
    Pages 9-35
  4. Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya
    Pages 37-43
  5. Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya
    Pages 45-57
  6. Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya
    Pages 59-68
  7. Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya
    Pages 69-79
  8. Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya
    Pages 81-104
  9. Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya
    Pages 105-110
  10. Back Matter
    Pages 111-119

About this book

Introduction

This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services. The authors present the design and implementation of a novel protocol that preserves the consumers’ privacy, an adaptive and robust credibility model, a scalable availability model that relies on a decentralized architecture, and a cloud service crawler engine for automatic cloud services discovery. This book also analyzes results from a performance study on a number of open research issues for trust management in cloud environments including distribution of providers, geographic location and languages. These open research issues illustrate both an overview of the current state of cloud computing and potential future directions for the field. Trust Management in Cloud Services contains both theoretical and applied computing research, making it an ideal reference or secondary text book to both academic and industry professionals interested in cloud services. Advanced-level students in computer science and electrical engineering will also find the content valuable.

Keywords

Cloud armor Cloud computing Cloud services Credibility Feedback collusion detection Recommendation Reputation Sybil attacks detection Trust management Trust result caching

Authors and affiliations

  • Talal H. Noor
    • 1
  • Quan Z. Sheng
    • 2
  • Athman Bouguettaya
    • 3
  1. 1.College of Computer Science and EngineeringTaibah UniversityYanbuSaudi Arabia
  2. 2.School of Computer ScienceThe University of AdelaideAdelaideAustralia
  3. 3.School of Computer Science and Information TechnologyRMIT UniversityMelbourneAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-12250-2
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-12249-6
  • Online ISBN 978-3-319-12250-2
  • Buy this book on publisher's site
Industry Sectors
Pharma
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Engineering