SEUIR Repository

Trust information management system for cloud service providers

Show simple item record

dc.contributor.author Anakath, A. S.
dc.contributor.author Kannadasan, R.
dc.contributor.author Rajakumar, S.
dc.contributor.author Ambika, S.
dc.date.accessioned 2021-05-18T05:37:01Z
dc.date.available 2021-05-18T05:37:01Z
dc.date.issued 2021-01-19
dc.identifier.citation 9th South Eastern University International Arts Research Symposium -2020 on " Global Dimension of Social Sciences and Humanities through Research and Innovation". 19h January 2021. South Eastern University of Sri Lanka, Oluvil, Sri Lanka. p.57. en_US
dc.identifier.isbn 9789556272536
dc.identifier.uri http://ir.lib.seu.ac.lk/handle/123456789/5564
dc.description.abstract Trust model depends on the conduct of client and specialist organization to figure the trust esteems. The trust is fluffy, which propelled us to apply fluffy rationale for figuring the trust estimations of the cloud clients and service providers in the cloud environment. We make use of a Mamdani fluffy technique with gauss participation work for fuzzification and triangular enrollment work for defuzzification. The trust value is classified using the fuzzification. If the trust value is between 0 and 4 there is a low trust between the CSP and client/user. If the trust value is 5 then there is an agreeable trust between the CSP and client/user. If the trust value is between 6 and 10 then there is high trust among CSP and client/user. Parameters for example: execution, pliancy and versatility are taken for trust assessment of the asset. This characterization of fuzzy values is helpful in computing the trust value to be considered for communication. The properties for ascertaining execution are remaining burden and reaction time. What's more, for figuring flexibility, we have taken versatility, accessibility, security, and ease of use. The fluffy C-means gathering/bunching is applied to parameters for assessing the trust estimation of clients, for example, terrible solicitations, counterfeit solicitations, unapproved demands, and all out solicitations. Our method of computing trust value considers the parameters and compare them using the mathematical models equipped with software. This trust method implemented between the Cloud Service Provider and the Cloud User is considered to be efficient by incurring less time and hence is faster comparing to existing methods. en_US
dc.language.iso en_US en_US
dc.publisher Faculty of Arts and Culture South Eastern University of Sri Lanka en_US
dc.subject Trust model en_US
dc.subject Fluffy Technique en_US
dc.subject Versatility en_US
dc.subject Accessibility en_US
dc.subject Fluffy C-means en_US
dc.title Trust information management system for cloud service providers en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search SEUIR


Advanced Search

Browse

My Account