DocumentCode :
2427644
Title :
Reputation Attacks Detection for Effective Trust Assessment among Cloud Services
Author :
Noor, Talal H. ; Sheng, Quan Z. ; Alfazi, Abdullah
Author_Institution :
Sch. of Comput. Sci., Univ. of Adelaide, Adelaide, SA, Australia
fYear :
2013
fDate :
16-18 July 2013
Firstpage :
469
Lastpage :
476
Abstract :
Consumers´ feedback is a good source to help assess overall trustworthiness of cloud services. However, it is not unusual that a trust management system experiences malicious behaviors from its users (i.e., collusion or Sybil attacks). In this paper, we propose techniques for the detection of reputation attacks to allow consumers to effectively identify trustworthy cloud services. We introduce a credibility model that not only identifies misleading trust feedbacks from collusion attacks but also detects Sybil attacks, either strategic (in a long period of time) or occasional (in a short period of time). We have collected a large collection of consumer´s trust feedbacks given on real-world cloud services (over 10, 000 records) to evaluate and demonstrate the applicability of our approach and show the capability of detecting such malicious behaviors.
Keywords :
cloud computing; trusted computing; Sybil attack detection; cloud service trustworthiness; collusion attack; consumer trust feedback; effective trust assessment; malicious behavior detection; misleading trust feedback identification; reputation attack detection; trust management system; Cloud computing; History; Privacy; Protocols; Quality of service; Time-frequency analysis; Trust management; attacks detection; cloud computing; credentials; credibility; privacy; reputation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
Type :
conf
DOI :
10.1109/TrustCom.2013.59
Filename :
6680876
Link To Document :
بازگشت