Please use this identifier to cite or link to this item: http://ir.lib.seu.ac.lk/handle/123456789/5564
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAnakath, A. S.-
dc.contributor.authorKannadasan, R.-
dc.contributor.authorRajakumar, S.-
dc.contributor.authorAmbika, S.-
dc.date.accessioned2021-05-18T05:37:01Z-
dc.date.available2021-05-18T05:37:01Z-
dc.date.issued2021-01-19-
dc.identifier.citation9th South Eastern University International Arts Research Symposium -2020 on " Global Dimension of Social Sciences and Humanities through Research and Innovation". 19h January 2021. South Eastern University of Sri Lanka, Oluvil, Sri Lanka. p.57.en_US
dc.identifier.isbn9789556272536-
dc.identifier.urihttp://ir.lib.seu.ac.lk/handle/123456789/5564-
dc.description.abstractTrust model depends on the conduct of client and specialist organization to figure the trust esteems. The trust is fluffy, which propelled us to apply fluffy rationale for figuring the trust estimations of the cloud clients and service providers in the cloud environment. We make use of a Mamdani fluffy technique with gauss participation work for fuzzification and triangular enrollment work for defuzzification. The trust value is classified using the fuzzification. If the trust value is between 0 and 4 there is a low trust between the CSP and client/user. If the trust value is 5 then there is an agreeable trust between the CSP and client/user. If the trust value is between 6 and 10 then there is high trust among CSP and client/user. Parameters for example: execution, pliancy and versatility are taken for trust assessment of the asset. This characterization of fuzzy values is helpful in computing the trust value to be considered for communication. The properties for ascertaining execution are remaining burden and reaction time. What's more, for figuring flexibility, we have taken versatility, accessibility, security, and ease of use. The fluffy C-means gathering/bunching is applied to parameters for assessing the trust estimation of clients, for example, terrible solicitations, counterfeit solicitations, unapproved demands, and all out solicitations. Our method of computing trust value considers the parameters and compare them using the mathematical models equipped with software. This trust method implemented between the Cloud Service Provider and the Cloud User is considered to be efficient by incurring less time and hence is faster comparing to existing methods.en_US
dc.language.isoen_USen_US
dc.publisherFaculty of Arts and Culture South Eastern University of Sri Lankaen_US
dc.subjectTrust modelen_US
dc.subjectFluffy Techniqueen_US
dc.subjectVersatilityen_US
dc.subjectAccessibilityen_US
dc.subjectFluffy C-meansen_US
dc.titleTrust information management system for cloud service providersen_US
dc.typeArticleen_US
Appears in Collections:SEUIARS - 2020

Files in This Item:
File Description SizeFormat 
16.pdf165.35 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.