Deception in Cyberspace: Performance Focused Con Resistant Trust Algorithm

A con man trick appears in cyberspace as a deception around cloud services from the service provider. Con man resistant trust algorithm continuously monitors cloud service's performance to detect this con man behavior. A cloud service is identified as a con when a lapse in service performance r...

Full description

Saved in:
Bibliographic Details
Published in2017 International Conference on Computational Science and Computational Intelligence (CSCI) pp. 25 - 30
Main Authors Chowdhury, Md Minhaz, Nygard, Kendall E., Kambhampaty, Krishna, Alruwaythi, Maryam
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2017
Subjects
Online AccessGet full text
DOI10.1109/CSCI.2017.5

Cover

Abstract A con man trick appears in cyberspace as a deception around cloud services from the service provider. Con man resistant trust algorithm continuously monitors cloud service's performance to detect this con man behavior. A cloud service is identified as a con when a lapse in service performance repeats by an amount more than the consumer of this service can accept. Like the repetition, performance of a degraded amount is another service performance attribute affecting consumer satisfaction. The work presented in this paper includes performance degradation following various models. The algorithm's mathematical scheme tracks the performance degradation amount. This revision evaluates con behavior in proportion to the performance degradation. This proportional affect follows an exponential function. Three alternative exponential functions are evaluated. Each of these functions is applicable for specific cloud services. These functions are compared with each other and their properties effecting con resistant Trust are analyzed resulting in a set of principles. Also, the relationship between performance degradation amounts and con behavior detection speed are unlocked resulting in a principle. The result correctness and effectiveness of the principles.
AbstractList A con man trick appears in cyberspace as a deception around cloud services from the service provider. Con man resistant trust algorithm continuously monitors cloud service's performance to detect this con man behavior. A cloud service is identified as a con when a lapse in service performance repeats by an amount more than the consumer of this service can accept. Like the repetition, performance of a degraded amount is another service performance attribute affecting consumer satisfaction. The work presented in this paper includes performance degradation following various models. The algorithm's mathematical scheme tracks the performance degradation amount. This revision evaluates con behavior in proportion to the performance degradation. This proportional affect follows an exponential function. Three alternative exponential functions are evaluated. Each of these functions is applicable for specific cloud services. These functions are compared with each other and their properties effecting con resistant Trust are analyzed resulting in a set of principles. Also, the relationship between performance degradation amounts and con behavior detection speed are unlocked resulting in a principle. The result correctness and effectiveness of the principles.
Author Kambhampaty, Krishna
Alruwaythi, Maryam
Nygard, Kendall E.
Chowdhury, Md Minhaz
Author_xml – sequence: 1
  givenname: Md Minhaz
  surname: Chowdhury
  fullname: Chowdhury, Md Minhaz
  email: Md.Chowdhury@ndsu.edu
  organization: Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND, USA
– sequence: 2
  givenname: Kendall E.
  surname: Nygard
  fullname: Nygard, Kendall E.
  email: Kendall.Nygard@ndsu.edu
  organization: Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND, USA
– sequence: 3
  givenname: Krishna
  surname: Kambhampaty
  fullname: Kambhampaty, Krishna
  email: k.kambhampaty@ndsu.edu
  organization: Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND, USA
– sequence: 4
  givenname: Maryam
  surname: Alruwaythi
  fullname: Alruwaythi, Maryam
  email: maryam.alruwaythi@ndsu.edu
  organization: Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND, USA
BookMark eNotjjtPwzAYAI0EElAyMbL4DyT4ET_CVhkKRZVAUObKdT6DUeNEtjv037cSTLecTneNzuMYAaFbShpKSXdvPs2yYYSqRpyhqlOaCq4lk4LpS1Tl_EsIYVJzxcUVen0EB1MJY8QhYnPYQsqTdfCA3yH5MQ02OsCL0e0z9NictA_IIRcbC16nfS54vvseUyg_ww268HaXofrnDH0tntbmpV69PS_NfFUHqkSpmQJmfc_b1gsHQHrRts47pwjjvJOkU_a06-yWut4SIT1pgXvLWys0d5zyGbr76wYA2EwpDDYdNlpIoqjkR3d5TKE
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CSCI.2017.5
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9781538626528
1538626527
EndPage 30
ExternalDocumentID 8560716
Genre orig-research
GroupedDBID 6IE
6IF
6IL
6IN
AAJGR
AAWTH
ABLEC
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
OCL
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i175t-27e2afd344f5cee0d544cfcc7023396097a386cab1cda056f04e3fa34a583c313
IEDL.DBID RIE
IngestDate Wed Aug 20 06:20:52 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-27e2afd344f5cee0d544cfcc7023396097a386cab1cda056f04e3fa34a583c313
PageCount 6
ParticipantIDs ieee_primary_8560716
PublicationCentury 2000
PublicationDate 2017-Dec.
PublicationDateYYYYMMDD 2017-12-01
PublicationDate_xml – month: 12
  year: 2017
  text: 2017-Dec.
PublicationDecade 2010
PublicationTitle 2017 International Conference on Computational Science and Computational Intelligence (CSCI)
PublicationTitleAbbrev CSCI
PublicationYear 2017
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0002683735
Score 1.7668777
Snippet A con man trick appears in cyberspace as a deception around cloud services from the service provider. Con man resistant trust algorithm continuously monitors...
SourceID ieee
SourceType Publisher
StartPage 25
SubjectTerms Compound Interest Formula
Compounds
Computational intelligence
Continuous
Customer satisfaction
Cyberspace
Degradation
Discrete
Logistic Growth Function
Logistics
Mathematical models
Monitoring
Performance Degradation
Resistance
Scientific computing
Title Deception in Cyberspace: Performance Focused Con Resistant Trust Algorithm
URI https://ieeexplore.ieee.org/document/8560716
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwGG2AkydUMP5ODx7d2NZ2P7yZKUESDFFIuJH2a6tEHAbGQf96221ANB68NT20TZsv72v73vcQujLxIwWTvhMYdHIM3nJHJKFyIGEeTxQFKJznBo9hb0z7EzapoeutFkYpVZDPlGubxV--XMDaPpV1YmaroYV1VI_isNRqbd9TgtBctQirJHi-l3TS5_TBcrcil_2wTimQo9tEg82cJWHkzV3nwoWvX-UY_7uofdTeafTwcIs-B6imskPU3Jg04CpmW6h_pyrmCp5lOP0UVl3JQd3g4U4zgLtmnpWS2AyOn9TKJpVZjkdWkIFv5y-L5Sx_fW-jcfd-lPacykDBmZmsIHeCSAVcS0KpZmY5nmSUggaIDFATW2ou4iQOgQsfJDeZkPaoIpoTyllMgPjkCDWyRaaOEU6A0xDA056U1j5dBEz4EiJNAp7wSJ-glt2a6UdZI2Na7crp391naM8eTEkLOUeNfLlWFwbcc3FZnOo37ommKw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwGG0QD3pCBeNve_Doxra2G_NmpgQQCFFIuJHua6tEHQbGQf96221ANB68NT20zdc072v73vcQutLnR8RMuJan0cnSeMutOPSlBSFzeCgpQOY81-v7rRHtjNm4hK7XWhgpZUY-k7ZpZn_5YgZL81RWbzBTDc3fQtuMUspytdb6RcXz9WWLsEKE5zphPXqK2oa9Fdjsh3lKhh3NCuqtZs0pI6_2Mo1t-PpVkPG_y9pDtY1KDw_W-LOPSjI5QJWVTQMuTm0Vde5kwV3B0wRHn7HRV3KQN3iwUQ3gpp5nIQXWg-NHuTBpZZLioZFk4Nu359l8mr6819CoeT-MWlZhoWBNdV6QWl4gPa4EoVQxvRxH6MCBAgg0VBNTbC7gpOEDj10QXOdCyqGSKE4oZw0CxCWHqJzMEnmEcAic-gCOcoQwBuqxx2JXQKCIx0MeqGNUNaGZfORVMiZFVE7-7r5EO61hrzvptvsPp2jXbFJOEjlD5XS-lOca6tP4Itvhb9AHqXg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+International+Conference+on+Computational+Science+and+Computational+Intelligence+%28CSCI%29&rft.atitle=Deception+in+Cyberspace%3A+Performance+Focused+Con+Resistant+Trust+Algorithm&rft.au=Chowdhury%2C+Md+Minhaz&rft.au=Nygard%2C+Kendall+E.&rft.au=Kambhampaty%2C+Krishna&rft.au=Alruwaythi%2C+Maryam&rft.date=2017-12-01&rft.pub=IEEE&rft.spage=25&rft.epage=30&rft_id=info:doi/10.1109%2FCSCI.2017.5&rft.externalDocID=8560716