SlideShare a Scribd company logo
1 of 10
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Service Operator-aware Trust Scheme for
Resource Matchmaking across Multiple Clouds
ABSTRACT:
 The service operator-aware trust scheme (SOTS) for resource
matchmaking across multiple clouds. Through analyzing the built-in
relationship between the users, the broker, and the service resources.
 A middleware framework of trust management that can effectively reduce
user burden and improve system dependability. Based on multi-
dimensional resource service operators, we model the problem of trust
evaluation as a process of multi-attribute decision-making, and develop an
adaptive trust evaluation approach based on information entropy theory.
 This adaptive approach can overcome the limitations of traditional trust
schemes, whereby the trusted operators are weighted manually or
subjectively. As a result, using SOTS, the broker can efficiently and
accurately prepare the most trusted resources in advance, and thus provide
more dependable resources to users.
 Our experiments yield interesting and meaningful observations that can
facilitate the effective utilization of SOTS in a large-scale multi-cloud
environment.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Existing System
Existing System
A systematic trust management scheme for multi-cloud environments
based on multi-dimensional resource service operators. SOTS evaluate the trust
of a cloud resource in contrast to traditional trust schemes that always focus on
unilateral trust factors of service resources.
An adaptive fused computing approach for dynamic service operators,
based on information entropy theory. SOTS model the problem of trust
evaluation as a process of multi-attribute decision-making, and then develops an
adaptive trust evaluation approach.
A first service, last audit (FSLA) mechanism to overcome the trust
initialization problem of newly registered resources. When a resource initially
registers for business, no user has interacted with it, and consequently,
information on past service operators is non-existent
Reputations-based schemes. Hwang et al. suggested using a trust-overlay
network over multiple data centers to implement a reputation system for
establishing trust between providers and data owners
Their trust model collects and analyzes reliability based on the historical server
information in a cloud data center.
PROPOSED SYSTEM
Proposed System
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
The proposed middleware architecture consists of a number of core
modules, including the trusted resource matchmaking and distributing module,
the adaptive trust evaluation module, the agent-based service operator acquisition
module, and the resource management module, among others.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Adaptive Trust EvaluationModule.
This module is the core of the trust-aware cloud computing system, and is
the major focus of this paper. Using this module, the broker can dynamically sort
high-performance resources by analyzing the historic resource information in
terms of providing highly trusted resources.
Trusted Resource Matchmaking and Distributing Module.
In general, each cloud manager registers its service resources through the
cloud broker. The service user negotiates with the service broker on the Service-
Level Agreement (SLA) details; they eventually prepare an SLA contract.
According to this contract, the broker selects, and then presents highly trusted
resources to users from the trusted resource pool.
Resource RegisterModule.
It manages and indexes all the resources available from multiple cloud
providers, and obtains information from each particular cloud resource, acting as
pricing interface for users, and updating the database when new information is
available.
Advantages
 The Broker is aware of the resources seeking and providing with the
matchmaking framework.
 It makes the resource availability with using security key for sharing the
content with highest security.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
MODULE DESCRIPTION
Modules:
The system consists of modules and threat modules.
 User Request and policies
 Provider services
 Broker Matchmaking Services
 Messaging
 Service status
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Module Explanation
User Requestand Policy:
The user request for the service to the broker with the policies so that client
needs the specific services for production usability, reliability and security to the
consumers
Provider Services:
The provider provides the various services through the broker so that the
broker with trust worthy for the service operator and to the consumer.
BrokerMatchmaking Services
The Broker on viewing the request and services from the consumer and
provider, matches and sends the messages and mail to the user with id and
password so that files and documents can be shared and stored in the cloud.
Messaging
The messages send to the user with password and security key for the
services can be utilised for the user convenience.
Service Status
The broker after serving the request or responding the request, the service
status has to update whether it is processed orit is pending.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
SYSTEM CONFIGURATION
SOFTWARE REQUIREMENTS:
 Operating System : Windows 7
 Technology : Java and J2EE
 Web Technologies : Html, JavaScript, CSS
 IDE : Eclipse Juno
 Web Server : Tomcat
 Database : My SQL
 Java Version : J2SDK1.5
HARDWARE REQUIREMENTS:
 Hardware : Pentium Dual Core
 Speed : 2.80 GHz
 RAM : 1GB
 Hard Disk : 20 GB
 Floppy Drive : 1.44 MB
 Key Board : Standard Windows Keyboard
 Mouse : Two or Three Button Mouse
 Monitor : SVGA
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457

More Related Content

What's hot

Service selection in service oriented architecture using probabilistic approa...
Service selection in service oriented architecture using probabilistic approa...Service selection in service oriented architecture using probabilistic approa...
Service selection in service oriented architecture using probabilistic approa...IJECEIAES
 
Automated transaction abstract ppt
Automated transaction abstract pptAutomated transaction abstract ppt
Automated transaction abstract pptmahesh9160m
 
Offline and Online Bank Data Synchronization System
Offline and Online Bank Data Synchronization SystemOffline and Online Bank Data Synchronization System
Offline and Online Bank Data Synchronization Systemijceronline
 
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCA
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCAFinal year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCA
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCAprojectsepark
 
Synopsis for property portal projects for final year students
Synopsis for property portal projects for final year studentsSynopsis for property portal projects for final year students
Synopsis for property portal projects for final year studentsSkyblue.aero
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolIJERD Editor
 
IRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data ProximityIRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data ProximityIRJET Journal
 
Sending the data already gathered from the client to the Server
Sending the data already gathered from the client to the ServerSending the data already gathered from the client to the Server
Sending the data already gathered from the client to the Serverhussam242
 
Dynamic Interface Adaptability in Service Oriented Software
Dynamic Interface Adaptability in Service Oriented SoftwareDynamic Interface Adaptability in Service Oriented Software
Dynamic Interface Adaptability in Service Oriented SoftwareMadjid KETFI
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET Journal
 
Cloud computing simplified...
Cloud computing simplified...Cloud computing simplified...
Cloud computing simplified...saili mane
 
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...1crore projects
 
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computingFlexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computingShakas Technologies
 
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS cscpconf
 
PROJECT ARRANGED (FINAL)
PROJECT ARRANGED (FINAL)PROJECT ARRANGED (FINAL)
PROJECT ARRANGED (FINAL)Joseph Olumide
 
Java project titles
Java project titlesJava project titles
Java project titlesAshly Liza
 
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...IJNSA Journal
 

What's hot (19)

Service selection in service oriented architecture using probabilistic approa...
Service selection in service oriented architecture using probabilistic approa...Service selection in service oriented architecture using probabilistic approa...
Service selection in service oriented architecture using probabilistic approa...
 
Automated transaction abstract ppt
Automated transaction abstract pptAutomated transaction abstract ppt
Automated transaction abstract ppt
 
Offline and Online Bank Data Synchronization System
Offline and Online Bank Data Synchronization SystemOffline and Online Bank Data Synchronization System
Offline and Online Bank Data Synchronization System
 
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCA
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCAFinal year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCA
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCA
 
Synopsis for property portal projects for final year students
Synopsis for property portal projects for final year studentsSynopsis for property portal projects for final year students
Synopsis for property portal projects for final year students
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
 
IRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data ProximityIRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data Proximity
 
Sending the data already gathered from the client to the Server
Sending the data already gathered from the client to the ServerSending the data already gathered from the client to the Server
Sending the data already gathered from the client to the Server
 
Dynamic Interface Adaptability in Service Oriented Software
Dynamic Interface Adaptability in Service Oriented SoftwareDynamic Interface Adaptability in Service Oriented Software
Dynamic Interface Adaptability in Service Oriented Software
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
Cloud computing simplified...
Cloud computing simplified...Cloud computing simplified...
Cloud computing simplified...
 
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...
 
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computingFlexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computing
 
Problem definition
Problem definitionProblem definition
Problem definition
 
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
 
PROJECT ARRANGED (FINAL)
PROJECT ARRANGED (FINAL)PROJECT ARRANGED (FINAL)
PROJECT ARRANGED (FINAL)
 
Java project titles
Java project titlesJava project titles
Java project titles
 
Sushma cv
Sushma cvSushma cv
Sushma cv
 
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
 

Viewers also liked

The future of storytelling online course
The future of storytelling   online courseThe future of storytelling   online course
The future of storytelling online courseMuhammad Farooq
 
PROBLEMA DE LA INVESTIGACION
PROBLEMA DE LA INVESTIGACIONPROBLEMA DE LA INVESTIGACION
PROBLEMA DE LA INVESTIGACIONmichael1887
 
ECPPM2016 - ifcOWL for Managing Product Data
ECPPM2016 - ifcOWL for Managing Product DataECPPM2016 - ifcOWL for Managing Product Data
ECPPM2016 - ifcOWL for Managing Product DataPieter Pauwels
 
Plots in neemrana behror,nh8
Plots in neemrana behror,nh8 Plots in neemrana behror,nh8
Plots in neemrana behror,nh8 Baburaj Patel
 
TRABAJANDO PARA PONER FIN A LA VIOLENCIA CONTRA NIÑAS Y NIÑOS
TRABAJANDO PARA PONER FIN A LA VIOLENCIA CONTRA NIÑAS Y NIÑOSTRABAJANDO PARA PONER FIN A LA VIOLENCIA CONTRA NIÑAS Y NIÑOS
TRABAJANDO PARA PONER FIN A LA VIOLENCIA CONTRA NIÑAS Y NIÑOSLarcery Díaz Barrantes
 
M2 t1 planificador_aamtic
M2 t1 planificador_aamticM2 t1 planificador_aamtic
M2 t1 planificador_aamticAlex GC
 
Bba i ecls_u-1.5_nouns number
Bba i ecls_u-1.5_nouns numberBba i ecls_u-1.5_nouns number
Bba i ecls_u-1.5_nouns numberRai University
 
Presentation protocole massage assis
Presentation protocole massage assisPresentation protocole massage assis
Presentation protocole massage assisstéphane Dabas
 
Access to finance for startups and SMEs
Access to finance for startups and SMEsAccess to finance for startups and SMEs
Access to finance for startups and SMEsBogdan Florin Ceobanu
 
Software testing interview Q&A – Part 2
Software testing interview Q&A – Part 2Software testing interview Q&A – Part 2
Software testing interview Q&A – Part 2Khoa Bui
 

Viewers also liked (20)

The future of storytelling online course
The future of storytelling   online courseThe future of storytelling   online course
The future of storytelling online course
 
TMRC Typical Floor Plan Zone 1
TMRC Typical Floor Plan Zone 1TMRC Typical Floor Plan Zone 1
TMRC Typical Floor Plan Zone 1
 
20.school asministrative system
20.school asministrative system20.school asministrative system
20.school asministrative system
 
PROBLEMA DE LA INVESTIGACION
PROBLEMA DE LA INVESTIGACIONPROBLEMA DE LA INVESTIGACION
PROBLEMA DE LA INVESTIGACION
 
ECPPM2016 - ifcOWL for Managing Product Data
ECPPM2016 - ifcOWL for Managing Product DataECPPM2016 - ifcOWL for Managing Product Data
ECPPM2016 - ifcOWL for Managing Product Data
 
Plots in neemrana behror,nh8
Plots in neemrana behror,nh8 Plots in neemrana behror,nh8
Plots in neemrana behror,nh8
 
Scan_0016 (1)
Scan_0016 (1)Scan_0016 (1)
Scan_0016 (1)
 
Sense títol 1
Sense títol 1Sense títol 1
Sense títol 1
 
TRABAJANDO PARA PONER FIN A LA VIOLENCIA CONTRA NIÑAS Y NIÑOS
TRABAJANDO PARA PONER FIN A LA VIOLENCIA CONTRA NIÑAS Y NIÑOSTRABAJANDO PARA PONER FIN A LA VIOLENCIA CONTRA NIÑAS Y NIÑOS
TRABAJANDO PARA PONER FIN A LA VIOLENCIA CONTRA NIÑAS Y NIÑOS
 
Notizia oggi 19122016 a
Notizia oggi 19122016 aNotizia oggi 19122016 a
Notizia oggi 19122016 a
 
Solidaridad con los pueblos del manglar
Solidaridad con los pueblos del manglarSolidaridad con los pueblos del manglar
Solidaridad con los pueblos del manglar
 
M2 t1 planificador_aamtic
M2 t1 planificador_aamticM2 t1 planificador_aamtic
M2 t1 planificador_aamtic
 
Bba i ecls_u-1.5_nouns number
Bba i ecls_u-1.5_nouns numberBba i ecls_u-1.5_nouns number
Bba i ecls_u-1.5_nouns number
 
Presentation protocole massage assis
Presentation protocole massage assisPresentation protocole massage assis
Presentation protocole massage assis
 
Programa psicologia evolutiva
Programa psicologia evolutivaPrograma psicologia evolutiva
Programa psicologia evolutiva
 
Access to finance for startups and SMEs
Access to finance for startups and SMEsAccess to finance for startups and SMEs
Access to finance for startups and SMEs
 
Ejemplos de terapia del comportamiento
Ejemplos de terapia del comportamiento Ejemplos de terapia del comportamiento
Ejemplos de terapia del comportamiento
 
Ejemplo de proyecto investigativo en la ESAP
Ejemplo de proyecto investigativo en la ESAPEjemplo de proyecto investigativo en la ESAP
Ejemplo de proyecto investigativo en la ESAP
 
Software testing interview Q&A – Part 2
Software testing interview Q&A – Part 2Software testing interview Q&A – Part 2
Software testing interview Q&A – Part 2
 
Unidad 3 1 sujeto objeto
Unidad 3   1 sujeto objetoUnidad 3   1 sujeto objeto
Unidad 3 1 sujeto objeto
 

Similar to Service operator aware trust scheme for resource

Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resourcejayaramb
 
Combining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesCombining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesPvrtechnologies Nellore
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Pvrtechnologies Nellore
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Pvrtechnologies Nellore
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET Journal
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
A trust management system for ad hoc mobile
A trust management system for ad hoc mobileA trust management system for ad hoc mobile
A trust management system for ad hoc mobileAhmed Hammam
 
Survey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computingSurvey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computingeSAT Journals
 
A computational-dynamic-trust-model-for-user-authorization-docx
A computational-dynamic-trust-model-for-user-authorization-docxA computational-dynamic-trust-model-for-user-authorization-docx
A computational-dynamic-trust-model-for-user-authorization-docxPvrtechnologies Nellore
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentIRJET Journal
 
IRJET- Trust Value Calculation for Cloud Resources
IRJET- Trust Value Calculation for Cloud ResourcesIRJET- Trust Value Calculation for Cloud Resources
IRJET- Trust Value Calculation for Cloud ResourcesIRJET Journal
 
O po r enabling proof of retrievability in cloud computing with resource cons...
O po r enabling proof of retrievability in cloud computing with resource cons...O po r enabling proof of retrievability in cloud computing with resource cons...
O po r enabling proof of retrievability in cloud computing with resource cons...Pvrtechnologies Nellore
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingPvrtechnologies Nellore
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Towards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc cloudsTowards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc cloudsAhmed Hammam
 
Analyzing and Surveying Trust In Cloud Computing Environment
Analyzing and Surveying Trust In Cloud Computing EnvironmentAnalyzing and Surveying Trust In Cloud Computing Environment
Analyzing and Surveying Trust In Cloud Computing Environmentiosrjce
 
Elewayte Cloud Computing Advancements
Elewayte Cloud Computing AdvancementsElewayte Cloud Computing Advancements
Elewayte Cloud Computing AdvancementsElewayte
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationeSAT Publishing House
 

Similar to Service operator aware trust scheme for resource (20)

Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resource
 
Combining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesCombining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information services
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
A trust management system for ad hoc mobile
A trust management system for ad hoc mobileA trust management system for ad hoc mobile
A trust management system for ad hoc mobile
 
Survey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computingSurvey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computing
 
A computational-dynamic-trust-model-for-user-authorization-docx
A computational-dynamic-trust-model-for-user-authorization-docxA computational-dynamic-trust-model-for-user-authorization-docx
A computational-dynamic-trust-model-for-user-authorization-docx
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud Environment
 
IRJET- Trust Value Calculation for Cloud Resources
IRJET- Trust Value Calculation for Cloud ResourcesIRJET- Trust Value Calculation for Cloud Resources
IRJET- Trust Value Calculation for Cloud Resources
 
O po r enabling proof of retrievability in cloud computing with resource cons...
O po r enabling proof of retrievability in cloud computing with resource cons...O po r enabling proof of retrievability in cloud computing with resource cons...
O po r enabling proof of retrievability in cloud computing with resource cons...
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Towards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc cloudsTowards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc clouds
 
Analyzing and Surveying Trust In Cloud Computing Environment
Analyzing and Surveying Trust In Cloud Computing EnvironmentAnalyzing and Surveying Trust In Cloud Computing Environment
Analyzing and Surveying Trust In Cloud Computing Environment
 
J017316670
J017316670J017316670
J017316670
 
Elewayte Cloud Computing Advancements
Elewayte Cloud Computing AdvancementsElewayte Cloud Computing Advancements
Elewayte Cloud Computing Advancements
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verification
 

More from Pvrtechnologies Nellore

A High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar CodesA High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar CodesPvrtechnologies Nellore
 
Performance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division UnitsPerformance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division UnitsPvrtechnologies Nellore
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic ArchitecturesHybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic ArchitecturesPvrtechnologies Nellore
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...Pvrtechnologies Nellore
 
2016 2017 ieee ece embedded- project titles
2016   2017 ieee ece  embedded- project titles2016   2017 ieee ece  embedded- project titles
2016 2017 ieee ece embedded- project titlesPvrtechnologies Nellore
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC ProcessorA High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC ProcessorPvrtechnologies Nellore
 
6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point CircuitsPvrtechnologies Nellore
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPvrtechnologies Nellore
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...Pvrtechnologies Nellore
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Pvrtechnologies Nellore
 
Cloud keybank privacy and owner authorization
Cloud keybank  privacy and owner authorizationCloud keybank  privacy and owner authorization
Cloud keybank privacy and owner authorizationPvrtechnologies Nellore
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiableCircuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiablePvrtechnologies Nellore
 
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...Pvrtechnologies Nellore
 

More from Pvrtechnologies Nellore (20)

A High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar CodesA High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar Codes
 
Performance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division UnitsPerformance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division Units
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic ArchitecturesHybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic Architectures
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
 
2016 2017 ieee matlab project titles
2016 2017 ieee matlab project titles2016 2017 ieee matlab project titles
2016 2017 ieee matlab project titles
 
2016 2017 ieee vlsi project titles
2016   2017 ieee vlsi project titles2016   2017 ieee vlsi project titles
2016 2017 ieee vlsi project titles
 
2016 2017 ieee ece embedded- project titles
2016   2017 ieee ece  embedded- project titles2016   2017 ieee ece  embedded- project titles
2016 2017 ieee ece embedded- project titles
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC ProcessorA High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
 
6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...
 
11.online library management system
11.online library management system11.online library management system
11.online library management system
 
06.e voting system
06.e voting system06.e voting system
06.e voting system
 
New web based projects list
New web based projects listNew web based projects list
New web based projects list
 
Power controlled medium access control
Power controlled medium access controlPower controlled medium access control
Power controlled medium access control
 
IEEE PROJECTS LIST
IEEE PROJECTS LIST IEEE PROJECTS LIST
IEEE PROJECTS LIST
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
 
Cloud keybank privacy and owner authorization
Cloud keybank  privacy and owner authorizationCloud keybank  privacy and owner authorization
Cloud keybank privacy and owner authorization
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiableCircuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
 
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Service operator aware trust scheme for resource

  • 1. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds ABSTRACT:  The service operator-aware trust scheme (SOTS) for resource matchmaking across multiple clouds. Through analyzing the built-in relationship between the users, the broker, and the service resources.  A middleware framework of trust management that can effectively reduce user burden and improve system dependability. Based on multi- dimensional resource service operators, we model the problem of trust evaluation as a process of multi-attribute decision-making, and develop an adaptive trust evaluation approach based on information entropy theory.  This adaptive approach can overcome the limitations of traditional trust schemes, whereby the trusted operators are weighted manually or subjectively. As a result, using SOTS, the broker can efficiently and accurately prepare the most trusted resources in advance, and thus provide more dependable resources to users.  Our experiments yield interesting and meaningful observations that can facilitate the effective utilization of SOTS in a large-scale multi-cloud environment.
  • 2. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 Existing System Existing System A systematic trust management scheme for multi-cloud environments based on multi-dimensional resource service operators. SOTS evaluate the trust of a cloud resource in contrast to traditional trust schemes that always focus on unilateral trust factors of service resources. An adaptive fused computing approach for dynamic service operators, based on information entropy theory. SOTS model the problem of trust evaluation as a process of multi-attribute decision-making, and then develops an adaptive trust evaluation approach. A first service, last audit (FSLA) mechanism to overcome the trust initialization problem of newly registered resources. When a resource initially registers for business, no user has interacted with it, and consequently, information on past service operators is non-existent Reputations-based schemes. Hwang et al. suggested using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between providers and data owners Their trust model collects and analyzes reliability based on the historical server information in a cloud data center. PROPOSED SYSTEM Proposed System
  • 3. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 The proposed middleware architecture consists of a number of core modules, including the trusted resource matchmaking and distributing module, the adaptive trust evaluation module, the agent-based service operator acquisition module, and the resource management module, among others.
  • 4. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 Adaptive Trust EvaluationModule. This module is the core of the trust-aware cloud computing system, and is the major focus of this paper. Using this module, the broker can dynamically sort high-performance resources by analyzing the historic resource information in terms of providing highly trusted resources. Trusted Resource Matchmaking and Distributing Module. In general, each cloud manager registers its service resources through the cloud broker. The service user negotiates with the service broker on the Service- Level Agreement (SLA) details; they eventually prepare an SLA contract. According to this contract, the broker selects, and then presents highly trusted resources to users from the trusted resource pool. Resource RegisterModule. It manages and indexes all the resources available from multiple cloud providers, and obtains information from each particular cloud resource, acting as pricing interface for users, and updating the database when new information is available. Advantages  The Broker is aware of the resources seeking and providing with the matchmaking framework.  It makes the resource availability with using security key for sharing the content with highest security.
  • 5. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 MODULE DESCRIPTION Modules: The system consists of modules and threat modules.  User Request and policies  Provider services  Broker Matchmaking Services  Messaging  Service status
  • 6. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 7. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 Module Explanation User Requestand Policy: The user request for the service to the broker with the policies so that client needs the specific services for production usability, reliability and security to the consumers Provider Services: The provider provides the various services through the broker so that the broker with trust worthy for the service operator and to the consumer. BrokerMatchmaking Services The Broker on viewing the request and services from the consumer and provider, matches and sends the messages and mail to the user with id and password so that files and documents can be shared and stored in the cloud. Messaging The messages send to the user with password and security key for the services can be utilised for the user convenience. Service Status The broker after serving the request or responding the request, the service status has to update whether it is processed orit is pending.
  • 8. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 9. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 SYSTEM CONFIGURATION SOFTWARE REQUIREMENTS:  Operating System : Windows 7  Technology : Java and J2EE  Web Technologies : Html, JavaScript, CSS  IDE : Eclipse Juno  Web Server : Tomcat  Database : My SQL  Java Version : J2SDK1.5 HARDWARE REQUIREMENTS:  Hardware : Pentium Dual Core  Speed : 2.80 GHz  RAM : 1GB  Hard Disk : 20 GB  Floppy Drive : 1.44 MB  Key Board : Standard Windows Keyboard  Mouse : Two or Three Button Mouse  Monitor : SVGA
  • 10. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457