International Journal of Engineering in Computer Science

P-ISSN: 2663-3582, E-ISSN: 2663-3590
Printed Journal   |   Refereed Journal   |   Peer Reviewed Journal

2020, Vol. 2, Issue 1, Part A

A novel trust evaluation protocol with privacy protection for intercloud using holomorphic encryption


Author(s): Hurali Akhila

Abstract: Intercloud looks to encourage asset sharing among mists. To help Intercloud, a trust assessment structure among mists and clients is required. For trust assessment, ordinary conventions are normally founded on an incorporated design concentrating on a single direction relationship. For Intercloud, the earth is exceptionally powerful and disseminated, and connections can be single direction or two-way (i.e., mists offer types of assistance to one another). This paper presents a disseminated trust assessment convention with security assurance for Intercloud. The new commitments and imaginative highlights are abridged beneath. To start with, input is secured by homomorphic encryption with obvious mystery sharing. Second, to take into account the dynamic idea of Intercloud, trust assessment can be led in a disseminated way and is practical in any event, when a portion of the gatherings are disconnected. Third, to encourage modified trust assessment, a creative system is utilized to store criticism, with the end goal that it tends to be handled deftly while securing input protection. The convention has been demonstrated dependent on a conventional security model. Reenactments have been performed to show the adequacy of the convention. The outcomes show that in any event, when half of the mists are pernicious or disconnected, by picking appropriate operational parameters the convention can in any case bolster successful trust assessment with security insurance.

DOI: 10.33545/26633582.2020.v2.i1a.24

Pages: 05-09 | Views: 992 | Downloads: 464

Download Full Article: Click Here
How to cite this article:
Hurali Akhila. A novel trust evaluation protocol with privacy protection for intercloud using holomorphic encryption. Int J Eng Comput Sci 2020;2(1):05-09. DOI: 10.33545/26633582.2020.v2.i1a.24
International Journal of Engineering in Computer Science

International Journal of Engineering in Computer Science

International Journal of Engineering in Computer Science
Call for book chapter