Development of trust based access control models using fuzzy logic in cloud computing

نویسندگان

چکیده

Cloud computing is the technology that provides different types of services as a useful resource on Internet. Resource trust value will help cloud users to select provider for processing and storing their essential information. Also, service providers can give access based secure resources from malicious users. In this paper, models are proposed, which comes under subjective model behavior user calculate values. The fuzzy, motivated us apply fuzzy logic calculating values in environment. We use Mamdani method with gauss membership function fuzzification triangular defuzzification. Parameters such performance elasticity taken evaluation resource. attributes workload response time. And elasticity, we have scalability, availability, security, usability. C-means clustering applied parameters evaluating bad requests, bogus unauthorized total requests.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trust-Based Access Control for Secure Cloud Computing

Multi-tenancy, elasticity and dynamicity pose several novel challenges for access control in a cloud environment. Accessing subjects may dynamically change, resources requiring protection may be created or modified, and subject access requirements to resources may change during the course of the application execution. Users may need to acquire different permissions from different administrative...

متن کامل

Policy-based Access Control in Cloud Computing

Cloud Computing is a large-scale distributed computing paradigm which is based on Web Services over the Internet. Internet has many inherent security defects because of its openness. It has many other attacks and threats. One of the most challenging issue in cloud computing is access control and data security. User of the cloud outsourced their sensitive data and information to cloud provider’s...

متن کامل

Trust Model in Cloud Computing Environment Based on Fuzzy Theory

Recent years have witnessed the development of cloud computing. However, there also come some security concerns in cloud computing environment, such as emerging network attacks and intrusions, and instable cloud service provision due to flexible cloud infrastructure and resources. To this end, we research on the trusted computing in cloud computing environment. Specifically, in this paper, we p...

متن کامل

Designing a fuzzy-logic based trust and reputation model for secure resource allocation in cloud computing

To plan and improve a fuzzy logic and neural network based trust and reputation model for safe resource allocation in cloud computing is the most important motto of this research. Among the IT professionals in current scenario, the cloud computing is one of the main topics conversed. Now, to revise the security, we employ the trust manager and reputation manager in our proposed approach. At fir...

متن کامل

Trust Based Access Control Policy in Multi-domain of Cloud Computing

Cloud computing is a new paradigm which enables users to reduce their costs and is advantageous to both the serving and served organizations. However, security issue is a major concern in the adoption of cloud computing. The most effective way of protecting cloud computing services, resources and users is access control. This paper intends to provide a trust-based access control mechanism for c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of King Saud University - Computer and Information Sciences

سال: 2022

ISSN: ['2213-1248', '1319-1578']

DOI: https://doi.org/10.1016/j.jksuci.2019.11.001