Deception in Cyberspace: Performance Focused Con Resistant Trust Algorithm
A con man trick appears in cyberspace as a deception around cloud services from the service provider. Con man resistant trust algorithm continuously monitors cloud service's performance to detect this con man behavior. A cloud service is identified as a con when a lapse in service performance r...
Saved in:
| Published in | 2017 International Conference on Computational Science and Computational Intelligence (CSCI) pp. 25 - 30 |
|---|---|
| Main Authors | , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.12.2017
|
| Subjects | |
| Online Access | Get full text |
| DOI | 10.1109/CSCI.2017.5 |
Cover
| Abstract | A con man trick appears in cyberspace as a deception around cloud services from the service provider. Con man resistant trust algorithm continuously monitors cloud service's performance to detect this con man behavior. A cloud service is identified as a con when a lapse in service performance repeats by an amount more than the consumer of this service can accept. Like the repetition, performance of a degraded amount is another service performance attribute affecting consumer satisfaction. The work presented in this paper includes performance degradation following various models. The algorithm's mathematical scheme tracks the performance degradation amount. This revision evaluates con behavior in proportion to the performance degradation. This proportional affect follows an exponential function. Three alternative exponential functions are evaluated. Each of these functions is applicable for specific cloud services. These functions are compared with each other and their properties effecting con resistant Trust are analyzed resulting in a set of principles. Also, the relationship between performance degradation amounts and con behavior detection speed are unlocked resulting in a principle. The result correctness and effectiveness of the principles. |
|---|---|
| AbstractList | A con man trick appears in cyberspace as a deception around cloud services from the service provider. Con man resistant trust algorithm continuously monitors cloud service's performance to detect this con man behavior. A cloud service is identified as a con when a lapse in service performance repeats by an amount more than the consumer of this service can accept. Like the repetition, performance of a degraded amount is another service performance attribute affecting consumer satisfaction. The work presented in this paper includes performance degradation following various models. The algorithm's mathematical scheme tracks the performance degradation amount. This revision evaluates con behavior in proportion to the performance degradation. This proportional affect follows an exponential function. Three alternative exponential functions are evaluated. Each of these functions is applicable for specific cloud services. These functions are compared with each other and their properties effecting con resistant Trust are analyzed resulting in a set of principles. Also, the relationship between performance degradation amounts and con behavior detection speed are unlocked resulting in a principle. The result correctness and effectiveness of the principles. |
| Author | Kambhampaty, Krishna Alruwaythi, Maryam Nygard, Kendall E. Chowdhury, Md Minhaz |
| Author_xml | – sequence: 1 givenname: Md Minhaz surname: Chowdhury fullname: Chowdhury, Md Minhaz email: Md.Chowdhury@ndsu.edu organization: Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND, USA – sequence: 2 givenname: Kendall E. surname: Nygard fullname: Nygard, Kendall E. email: Kendall.Nygard@ndsu.edu organization: Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND, USA – sequence: 3 givenname: Krishna surname: Kambhampaty fullname: Kambhampaty, Krishna email: k.kambhampaty@ndsu.edu organization: Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND, USA – sequence: 4 givenname: Maryam surname: Alruwaythi fullname: Alruwaythi, Maryam email: maryam.alruwaythi@ndsu.edu organization: Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND, USA |
| BookMark | eNotjjtPwzAYAI0EElAyMbL4DyT4ET_CVhkKRZVAUObKdT6DUeNEtjv037cSTLecTneNzuMYAaFbShpKSXdvPs2yYYSqRpyhqlOaCq4lk4LpS1Tl_EsIYVJzxcUVen0EB1MJY8QhYnPYQsqTdfCA3yH5MQ02OsCL0e0z9NictA_IIRcbC16nfS54vvseUyg_ww268HaXofrnDH0tntbmpV69PS_NfFUHqkSpmQJmfc_b1gsHQHrRts47pwjjvJOkU_a06-yWut4SIT1pgXvLWys0d5zyGbr76wYA2EwpDDYdNlpIoqjkR3d5TKE |
| CODEN | IEEPAD |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/CSCI.2017.5 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9781538626528 1538626527 |
| EndPage | 30 |
| ExternalDocumentID | 8560716 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IL 6IN AAJGR AAWTH ABLEC ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK OCL RIB RIC RIE RIL |
| ID | FETCH-LOGICAL-i175t-27e2afd344f5cee0d544cfcc7023396097a386cab1cda056f04e3fa34a583c313 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 20 06:20:52 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-27e2afd344f5cee0d544cfcc7023396097a386cab1cda056f04e3fa34a583c313 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_8560716 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-Dec. |
| PublicationDateYYYYMMDD | 2017-12-01 |
| PublicationDate_xml | – month: 12 year: 2017 text: 2017-Dec. |
| PublicationDecade | 2010 |
| PublicationTitle | 2017 International Conference on Computational Science and Computational Intelligence (CSCI) |
| PublicationTitleAbbrev | CSCI |
| PublicationYear | 2017 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0002683735 |
| Score | 1.7668777 |
| Snippet | A con man trick appears in cyberspace as a deception around cloud services from the service provider. Con man resistant trust algorithm continuously monitors... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 25 |
| SubjectTerms | Compound Interest Formula Compounds Computational intelligence Continuous Customer satisfaction Cyberspace Degradation Discrete Logistic Growth Function Logistics Mathematical models Monitoring Performance Degradation Resistance Scientific computing |
| Title | Deception in Cyberspace: Performance Focused Con Resistant Trust Algorithm |
| URI | https://ieeexplore.ieee.org/document/8560716 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwGG2AkydUMP5ODx7d2NZ2P7yZKUESDFFIuJH2a6tEHAbGQf96221ANB68NT20TZsv72v73vcQujLxIwWTvhMYdHIM3nJHJKFyIGEeTxQFKJznBo9hb0z7EzapoeutFkYpVZDPlGubxV--XMDaPpV1YmaroYV1VI_isNRqbd9TgtBctQirJHi-l3TS5_TBcrcil_2wTimQo9tEg82cJWHkzV3nwoWvX-UY_7uofdTeafTwcIs-B6imskPU3Jg04CpmW6h_pyrmCp5lOP0UVl3JQd3g4U4zgLtmnpWS2AyOn9TKJpVZjkdWkIFv5y-L5Sx_fW-jcfd-lPacykDBmZmsIHeCSAVcS0KpZmY5nmSUggaIDFATW2ou4iQOgQsfJDeZkPaoIpoTyllMgPjkCDWyRaaOEU6A0xDA056U1j5dBEz4EiJNAp7wSJ-glt2a6UdZI2Na7crp391naM8eTEkLOUeNfLlWFwbcc3FZnOo37ommKw |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwGG0QD3pCBeNve_Doxra2G_NmpgQQCFFIuJHua6tEHQbGQf96221ANB68NT20zdc072v73vcQutLnR8RMuJan0cnSeMutOPSlBSFzeCgpQOY81-v7rRHtjNm4hK7XWhgpZUY-k7ZpZn_5YgZL81RWbzBTDc3fQtuMUspytdb6RcXz9WWLsEKE5zphPXqK2oa9Fdjsh3lKhh3NCuqtZs0pI6_2Mo1t-PpVkPG_y9pDtY1KDw_W-LOPSjI5QJWVTQMuTm0Vde5kwV3B0wRHn7HRV3KQN3iwUQ3gpp5nIQXWg-NHuTBpZZLioZFk4Nu359l8mr6819CoeT-MWlZhoWBNdV6QWl4gPa4EoVQxvRxH6MCBAgg0VBNTbC7gpOEDj10QXOdCyqGSKE4oZw0CxCWHqJzMEnmEcAic-gCOcoQwBuqxx2JXQKCIx0MeqGNUNaGZfORVMiZFVE7-7r5EO61hrzvptvsPp2jXbFJOEjlD5XS-lOca6tP4Itvhb9AHqXg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+International+Conference+on+Computational+Science+and+Computational+Intelligence+%28CSCI%29&rft.atitle=Deception+in+Cyberspace%3A+Performance+Focused+Con+Resistant+Trust+Algorithm&rft.au=Chowdhury%2C+Md+Minhaz&rft.au=Nygard%2C+Kendall+E.&rft.au=Kambhampaty%2C+Krishna&rft.au=Alruwaythi%2C+Maryam&rft.date=2017-12-01&rft.pub=IEEE&rft.spage=25&rft.epage=30&rft_id=info:doi/10.1109%2FCSCI.2017.5&rft.externalDocID=8560716 |