Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/449761
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | ||
dc.date.accessioned | 2023-01-19T08:05:35Z | - |
dc.date.available | 2023-01-19T08:05:35Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/449761 | - |
dc.description.abstract | Importance of digital world increases after pandemic, as most of service get online and need services. A large number of digital platforms rely on cloud infrastructure to provide services to their customers. Due to the fact that these services require machines to execute user requests, some of the work is outsourced to tenants. Inner security is also a major concern to monitor. Cloud infrastructure requirement for management of various services indirectly depends on virtual machine acting as tenants. It is necessary to monitor cloud service tenants in order to improve the privacy and security of cloud services. Multi-tenant cloud architecture need two inner and outer side security. In order for cloud users to evaluate the trustworthiness of cloud service providers when constructing or migrating their distributed systems to cloud data centers, the proposed scheme must be implemented. In this work, a trust evaluation scheme based on a fuzzy logic system is discussed in greater detail. The trust-based tenant machine evaluation method proposed in this paper has been implemented. Proposed model has created a virtual window to evaluate trust value of each tenant present in cloud. The Sorensen trust value was estimated by the model based on the behavior of machines in the network. Proposed model utilizes mutual trust value of the nodes by using Sorensen function. To increase the detection performance individual machine utilization parameter was used. HITS algorithm finds the hub value of the work for node class detection into legitimate and malicious nodes. One more method of trust evaluation was proposed is Leicht Holme Newman trust in cloud. The extracted feature values were then used to train the Adaptive neural fuzzy interference system mathematical model, which was then used to train the model. This behavior of tenants in virtual window to identify malicious nodes. The trained ANFIS model divides the machine into two categories: the first is a malicious node, and the second is a legitimate node. The experiments were carried out under a variety of cloud environmental conditions. The implementation was carried out using the MATLAB software. The results show that different evaluation parameter values were optimized in the work. Result shows that proposed LHN-ANFIS has improved the recall value by 2.17% as compared to SHCTM and 3.23% as compared to TMM model. Further it was obtained that FNR of the model was also reduced by 33.74% as compared to SHCTM model. Use of social trust and ANFIS model for detection of malicious node increases the work performance. newline | |
dc.format.extent | ||
dc.language | English | |
dc.relation | ||
dc.rights | university | |
dc.title | Trust Evaluation Models for the Security Problems in Multi Tenant Cloud Computing | |
dc.title.alternative | ||
dc.creator.researcher | Singh B G, Surendranath | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Computer Science Interdisciplinary Applications | |
dc.subject.keyword | Engineering and Technology | |
dc.description.note | ||
dc.contributor.guide | Phulre, Sunil | |
dc.publisher.place | Bhopal | |
dc.publisher.university | LNCT University | |
dc.publisher.institution | Department of Computer Science and Engineering | |
dc.date.registered | 2018 | |
dc.date.completed | 2022 | |
dc.date.awarded | 2022 | |
dc.format.dimensions | ||
dc.format.accompanyingmaterial | None | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
80_recommendation.pdf | Attached File | 810.07 kB | Adobe PDF | View/Open |
abstract.pdf | 9.15 kB | Adobe PDF | View/Open | |
acknowledgements.pdf | 104.21 kB | Adobe PDF | View/Open | |
certificate.pdf | 112.86 kB | Adobe PDF | View/Open | |
chapter 1.pdf | 20.48 MB | Adobe PDF | View/Open | |
chapter-2.pdf | 14.61 MB | Adobe PDF | View/Open | |
chapter-3.pdf | 3.42 MB | Adobe PDF | View/Open | |
chapter-4.pdf | 2.91 MB | Adobe PDF | View/Open | |
chapter-5.pdf | 4.3 MB | Adobe PDF | View/Open | |
chapter-6.pdf | 694.35 kB | Adobe PDF | View/Open | |
chapter-7.pdf | 786.72 kB | Adobe PDF | View/Open | |
content and list of tables.pdf | 2.32 MB | Adobe PDF | View/Open | |
declaration.pdf | 101.15 kB | Adobe PDF | View/Open | |
packages ( software used).pdf | 273.62 kB | Adobe PDF | View/Open | |
title.pdf | 208.55 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: