A Heuristic Secure Resource Sharing Method In Internet Of Things Environment

Main Article Content

C Kamalanathan, S Karthick, Sunita Panda, S Raja Gopal, D V Soundari


In recent times one of the emerging and intelligent tool is Cloud Computing. It has developed a leading model of computing and IT service delivery. Cloud Computing is characterized by three-layered basic service forms such as, Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS) and Infrastructure-as-a Service (IaaS). Pushing information into the cloud extends larger closeness since users are not necessary to be concerned about the storage capacity, storing techniques, hardware management, or data maintenance. A key problem that requires specific consideration is security of clouds. Existing approaches for secured outsourcing of information and random calculations are either support on a single tamper-proof hardware, or based on homomorphic encryption. To overcome existing issues a novel approach is proposed to focus on security experiments in cloud computing and to provide solutions. To provide unfailing security to the users, the purpose of this paper is in three folding. 1) To design a mathematical model for trust and reputation calculation. 2) To propose TR-SS algorithm for calculation of security score.  3) To compare the security score of trust and reputation factors by Fuzzy Logic System, Neural Network. This work is focused on controlling the security issues in cloud environment by means of trust and reputation factors using mathematical model, Trust and Reputation Security Score (TRSS) algorithm, Fuzzy Logic System, Neural Network in Internet of Things applications.


Article Details