Rs 810 only/-
9907385555 asingh039@gmail.com
MP NAGAR BHOPAL
Cloud environment provide virtual machines for the tenants services. Virtual machine provide processor, memory, bandwidth as a resource for daily, monthly, yearly basis as per utilization. All of machine are from unreliable environment so trust need to be calculate for understanding the machine behavior in cloud. This chapter explained the proposed methodology working steps. In the propose work no need of any format for the input data such as node identification symbol or special character, here all process is done by utilizing the different actions perfrom by nodes. This chapter has work on trust based malicious machine detection after fix number of virtual packet clock cycle(VPCC). Estimation of machine trust was done centrally by use of social digital user Sorensen function, resource utilization belief and HITS algorithm. VPCC based Sorensen function value was estimated for each virtual machine. Based on individual machine resources utilization belief value was calculated. Finally Sorensen and resource utilization belief value was used for HITS hub based final trust was proposed. Experiment was done on two type of environment first was ideal and other was DDoS attack.
IEEE Base Paper | |||
Doc | Document File | ||
Source Code | Complete Code Files |