30
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Development of Trustworthiness for Cloud Service Providers Using DBN-Based Trust Model in Cloud Computing Environment

&
Received 26 Dec 2023, Accepted 30 Apr 2024, Published online: 03 Jun 2024

References

  • Challagidad, P. S., & Birje, M. N. (2020). Multi-dimensional dynamic trust evaluation scheme for cloud environment. Computers & Security, 91, 101722. https://doi.org/10.1016/j.cose.2020.101722
  • Chen, Y., Zhao, X., & Jia, X. (2015). Spectral–spatial classification of hyperspectral data based on deep belief network. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 8(6), 2381–2392. https://doi.org/10.1109/JSTARS.2015.2388577
  • Firdhous, M., Ghazali, O., & Hassan, S. (2012). Trust management in cloud computing: A critical review. arXiv preprint arXiv:1211.3979.
  • Gopalakrishnan, S., & Alli, P. (2021). Trust based approach and risk management for IT systems in cloud service selection. Wireless Personal Communications, 117(4), 3109–3127. https://doi.org/10.1007/s11277-020-07796-z
  • Guesmi, H., Kalghoum, A., Ghazel, C., & Saidane, L. A. (2021). FFED: A novel strategy based on fast entropy to detect attacks against trust computing in cloud. Cluster Computing, 24(3), 1945–1954. https://doi.org/10.1007/s10586-021-03233-3
  • Habib, M. S., Ries, S., Mühlhäuser, M., & Varikkattu, P. (2014). Towards a trust management system for cloud computing marketplaces: Using CAIQ as a trust information source. Security and Communication Networks, 7(11), 2185–2200. https://doi.org/10.1002/sec.748
  • Habib, M. S., Ries, S., & Muhlhauser, M. (2011). Towards a trust management system for cloud computing [Paper presentation]. 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 933–939). IEEE.
  • Hassan, H., El-Desouky, A. I., Ibrahim, A., El-Kenawy, E.-S M., & Arnous, R. (2020). Enhanced QoS-based model for trust assessment in cloud computing environment. IEEE Access, 8, 43752–43763. https://doi.org/10.1109/ACCESS.2020.2978452
  • Jaithunbi, A. K., Sabena, S., & SaiRamesh, L. (2021). Trust evaluation of public cloud service providers using genetic algorithm with intelligent rules. Wireless Personal Communications, 121(4), 3281–3295. https://doi.org/10.1007/s11277-021-08876-4
  • Javadpour, A., Ja’fari, F., Taleb, T., Zhao, Y., Yang, B., & Benzaïd, C. (2024). Encryption as a service for IoT: Opportunities, challenges, and solutions. IEEE Internet of Things Journal, 11(5), 7525–7558. https://doi.org/10.1109/JIOT.2023.3341875
  • Javadpour, A., Wang, G., & Rezaei, S. (2020). Resource management in a peer to peer cloud network for IoT. Wireless Personal Communications, 115(3), 2471–2488. https://doi.org/10.1007/s11277-020-07691-7
  • Kesarwani, A., & Khilar, P. M. (2022). Development of trust based access control models using fuzzy logic in cloud computing. Journal of King Saud University-Computer and Information Sciences, 34(5), 1958–1967. https://doi.org/10.1016/j.jksuci.2019.11.001
  • Latif, R., Afzaal, S. H., & Latif, S. (2021). A novel cloud management framework for trust establishment and evaluation in a federated cloud environment. Journal of Supercomputing, 77(11), 12537–12560. https://doi.org/10.1007/s11227-021-03775-8
  • Liu, Y.-C., Ma, Y.-T., Zhang, H.-S., Li, D.-Y., & Chen, G.-S. (2011). A method for trust management in cloud computing: Data coloring by cloud watermarking. International Journal of Automation and Computing, 8(3), 280–285. https://doi.org/10.1007/s11633-011-0583-3
  • Mohamed, A-r., Dahl, G. E., & Hinton, G. (2012). Acoustic modeling using deep belief networks. IEEE Transactions on Audio, Speech, and Language Processing, 20(1), 14–22. https://doi.org/10.1109/TASL.2011.2109382
  • Mujawar, T. N., & Bhajantri, L. B. (2022). Behavior and feedback based trust computation in cloud environment. Journal of King Saud University-Computer and Information Sciences, 34(8), 4956–4967. https://doi.org/10.1016/j.jksuci.2020.12.003
  • Nandakumar, P., & Narayan, S. (2022). Cardiac disease detection using cuckoo search enabled deep belief network. Intelligent Systems with Applications, 16, 200131. https://doi.org/10.1016/j.iswa.2022.200131
  • Noor, T. H., Sheng, Q. Z., Zeadally, S., & Yu, J. (2013). Trust management of services in cloud environments: Obstacles and solutions. ACM Computing Surveys, 46(1), 1–30. https://doi.org/10.1145/2522968.2522980
  • Noor, T. H., & Sheng, Q. Z. (2011). Trust as a service: A framework for trust management in cloud environments [Paper presentation]. Web Information System Engineering–WISE 2011: 12th International Conference, Sydney, Australia. Springer Berlin Heidelberg.
  • Qian, L., Luo, Z., Du, Y., & Guo, L. (2009). Cloud computing: An overview [Paper presentation]. Cloud Computing: First International Conference, CloudCom 2009 (pp. 626–631). Beijing, China.
  • Rjoub, G., Bentahar, J., & Wahab, O. A. (2020). BigTrustScheduling: Trust-aware big data task scheduling approach in cloud computing environments. Future Generation Computer Systems, 110, 1079–1097. https://doi.org/10.1016/j.future.2019.11.019
  • Sengupta, S., Kaulgud, V., & Sharma, V. S. (2011). Cloud computing security–trends and research directions [Paper presentation]. 2011 IEEE World Congress on Services (pp. 524–531). IEEE.
  • Soleymani, M., Abapour, N., Taghizadeh, E., Siadat, S., & Karkehabadi, R. (2021). Fuzzy rule-based trust management model for the security of cloud computing. Mathematical Problems in Engineering, 2021, 1–14. https://doi.org/10.1155/2021/6629449
  • Wang, L., Laszewski, G. V., Younge, A., He, X., Kunze, M., Tao, J., & Fu, C. (2010). Cloud computing: A perspective study. New Generation Computing, 28(2), 137–146. https://doi.org/10.1007/s00354-008-0081-5
  • Wen, Y., Wang, Y., Liu, J., Cao, B., & Fu, Q. (2020). CPU usage prediction for cloud resource provisioning based on deep belief network and particle swarm optimization. Concurrency and Computation: Practice and Experience, 32(14), 1–16. https://doi.org/10.1002/cpe.5730
  • Yu, N.-H., Hao, Z., Xu, J.-J., Zhang, W.-M., & Zhang, C. (2013). Review of cloud computing security. Acta Electonica Sinica, 41(2), 371. https://doi.org/10.3969/j.issn.0372-2112.2013.02.026
  • Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592. https://doi.org/10.1016/j.future.2010.12.006

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.