TAILIEUCHUNG - A novel method for cloud and sensor networks integration services

The proposed ATRCM structure fulfills the three capacities: 1) checking CSP and SNP to avoid malicious impersonate assaults; 2) computing and managing trust and reputation with the service of CSP and SNP; and 3) assisting CSU pick desirable CSP and helping CSP in selecting suitable SNP. Detailed analysis and outline as well as further usefulness evaluation result are presented to show the effectiveness of ATRCM, followed with system security analysis. | ISSN:2249-5789 Ramaprasad Kumar Ravipalli et al, International Journal of Computer Science & Communication Networks,Vol 6(4),190-193 A Novel Method for Cloud and Sensor Networks Integration services RAMAPRASAD KUMAR RAVIPALLI M. Tech(CSE) STUDENT THANDRA PAPARAYA INSTITUTE OF SCIENCE AND TECHNOLOGY KUMAR SEKHAR YETCHERLA HOD OF CSE DEPARTMENT & ASSOCIATE PROFESSOR THANDRA PAPARAYA INSTITUTE OF SCIENCE AND TECHNOLOGY Abstract — The combination Cloud computing– Wireless sensor network has been pulling in the reasoning of numerous expert both in the college, school and the industry as it gives numerous opportunities for organizations by offering a scope of measure services, So information collection capability of wireless sensor networks (WSNs) turn out to be simple. For cloud computing to become generally use both the company and personally, several issues have to be solved. Regardless, authentication and also trust and position calculation and management of cloud service providers (CSPs) and sensor network providers (SNPs) are two particularly critical and almost explored issues for this new paradigm. To fill the gap, our paper proposes a nov el authenticated trust and reputation calculation and management (ATRCM) framework for CC-WSN combination or integration. Considering the authenticity of CSP and SNP, the attribute necessity of cloud service user (CSU) and CSP, the risk, trust, and reputation of the service of CSP and SNP , the proposed ATRCM structure fulfills the three capacities: 1) checking CSP and SNP to avoid malicious impersonate assaults; 2) computing and managing trust and reputation with the service of CSP and SNP; and 3) assisting CSU pick desirable CSP and helping CSP in selecting suitable SNP. Detailed analysis and outline as well as further usefulness evaluation result are presented to show the effectiveness of ATRCM, followed with system security analysis. Keywords:-CSP(Cloud Service Provider), CSU(Cloud Service User), ATRCM(novel authenticated

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.