The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Designing a Fuzzy-Logic Based Trust and Reputation Model for Secure Resource

#


[1] Asma A., Chaurasia M., and Mokhtar H., Cloud Computing Security Issues, Journal of Application or Innovation in Engineering, vol. 1, no. 2, pp. 1

[2] Azzedin F. and Maheswaran M., Trust-Aware Resource Management in Grid Computing Systems, IEEE/ACM International Symposium on Cluster Computing and the Grid 2002.

[3] Chaisiri S., Lee B. , and Niyato of Resource Provisioning Cost in Cloud Computing, IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 164

[4] Firdhous M., Ghazali O. Management in Clou Review, International Journal on Advances in ICT for Emerging Regions 26, 2011.

[5] Gao K., Wang Q., and Xi L., Based Execution Times Prediction in Knowledge Discovery Cloud Computing Environment International Arab Journal of Information Technology, vol. 11, no. 3,

[6] Habib S., Ries S., and Muhlhauser M., Cloud Computing Landscape Regarding Trust and Reputation, of Symposia and Workshops on A pp. 410-415, 2010. The International Arab Journal of Information Technology for two hundred users, the score value for the first resource center is 0.067161597 and for the second resource center is 0.067174059 and for the third resource center is 0.074504212 and it is for the fourth resource center. When we the feedback for two hundred and fifty users, the score values are as follows: 0.067118327 for the 0.067153199 for the second 0.080761123 for the third resource for the fourth resource center. method for secure resource allocation in cloud computing by means of fuzzy logic based trust and reputation model in , we have applied the trust manager and reputation manager to revise the security of a , user executed a task through the scheduling manager and following the task, user values for TF and RF of the . Based on the characteristics sers, TF and RF is computed to the fuzzy logic system and neural the SS of a resource center. With the comment of dissimilar number of users, we d the experimentation of our method and reshold values to make a decision whether a resource center is protected or not. Asma A., Chaurasia M., and Mokhtar H., Cloud Computing Security Issues, International Journal of Application or Innovation in , vol. 1, no. 2, pp. 1-5, 2012. Azzedin F. and Maheswaran M., Towards Resource Management in Grid in Proceedings of the 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid, Washington, pp. 452, , and Niyato D., Optimization urce Provisioning Cost in Cloud IEEE Transactions on Services , vol. 5, no. 2, pp. 164-177, 2012. Firdhous M., Ghazali O., and Hassan S., Trust Management in Cloud Computing: A Critical International Journal on Advances in ICT for Emerging Regions, vol. 4, no. 2, pp. 24- Gao K., Wang Q., and Xi L., Reduct Algorithm Based Execution Times Prediction in Knowledge Discovery Cloud Computing Environment, the International Arab Journal of Information , vol. 11, no. 3, pp. 268-275, 2013. and Muhlhauser M., Cloud Computing Landscape and Research Challenges Regarding Trust and Reputation, in Proceedings Symposia and Workshops on ATC/ UIC , Xian, Designing a Fuzzy/Logic Based Trust and Reputation Model for Secure Resource Allocation 37

[7] Habib S., Ries S., and Muhlhauser M., Towards a Trust Management System for Cloud Computing, in Proceedings of the 10 th International Conference on Trust, Security and Privacy in Computing and Communications , Changsha, pp. 933-939, 2011.

[8] Josang A., Keser C., and Dimitrakos T., Can We Manage Trust?, in Proceedings of the 3 rd International Conference on Trust Management , Paris, pp. 93-107, 2005.

[9] Jsang A., Ismail R., and Boyd C., A Survey of Trust and Reputation Systems for Online Service Provision, Decision Support Systems , vol. 43, no. 2, pp. 618-644, 2007.

[10] Khan S. and Hamlen K., Hatman: Intra-cloud Trust Management for Hadoop, in Proceedings of the 5th IEEE International Conference on Cloud Computing , Honolulu, pp. 494-501, 2012.

[11] Malaga R., Web-Based Reputation Management Systems: Problems and Suggested Solutions, Journal of Electronic Commerce Research , Springer Netherlands, vol. 1, no. 4, pp. 403-417, 2001.

[12] Song S. and Hwang K., Dynamic Grid Security with Trust Integration and Optimized Resource Allocation, in Proceedings of the International Symposium on High/Performance distributed computing , Honolulu, pp. 1-16, 2004.

[13] Song S., Hwang K., and Kwok Y., Trusted Grid Computing with Security Binding and Trust Integration, Journal of Grid Computing , vol. 3, no. 1, pp. 53-73, 2005.

[14] Tripathi A. and Mishra A., Cloud Computing Security Considerations, IEEE International Conference on Signal Processing, Communications and Computing , Xi'an, pp. 1-5, 2011.

[15] Vivekananth P., Trusted Resource Allocation in Grid Computing by using Reputation, International Journal of Computer Science and Communication , vol. 1, no. 2, pp. 23-25, 2010. Kamalanathan Chandran obtained his BE in electronics and communication engineering degree in 2005 from Anna University, Chennai and MTech in applied electronics in 2008 from Dr.MGR University, Chennai. Currently, he is pursuing his PhD degree under Anna University, Chennai. He is presently working a s Assistant Professor (Sr.Grade) in the Department of Electronics and Communication Engineering at Bannari Amman Institute of Technology, Sathyamangalam. He is having a total of 7 years of teaching experience in various engineering colleges . His research area includes cloud computing, wired a nd wireless networks and network security. He is the l ife member in Indian Society for Technical Education. H e has published 7 papers in International Journals, 2 0 papers in International and National conferences. Valarmathy Shanmugasudaram received her BE in electronics and communication engineering degree and ME in applied electronics degree from Bharathiar University, Coimbatore in 1989 and 2000 respectively. She received her PhD degree at Anna University, Chennai in the area of Biometrics in 2009. She is presently working as Professor and Head in the Department of Electronics and Communication Engineering, Bannari Amman Institute of Technology, Sathyamangalam. She is having a total of 21 years of teaching experience i n various engineering colleges. Her research interest includes biometrics, image processing, soft computi ng, pattern recognition and neural networks. She is the life member in Indian Society for Technical Education an d Member in Institution of Engineers. She has publish ed 38 papers in International and National Journals, 6 8 papers in International conferences and National Conferences. Kirubakaran Subramani obtained his BE in electronics and communication engineering from Bharathiyar University, Coimbatore in 2004 and ME in network engineering Anna University of Technology-Coimbatore in 2009. Currently, he is pursuing his PhD degree from Anna University, Chennai in the area of cloud computing. He is presently working as Assistant Professor (Sr.G) in the Department of Electronics and Communication at Bannari Amman Institute of Technology, Sathyamangalam. He is having a total of 6 years of teaching experience in various engineering colleges . His research interest includes P2P networks, overla y networks, data management in cloud computing and distributed systems. He has published 7 papers in International and National Conferences.