UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 12 | Issue 10 | October 2025

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 9 Issue 5
May-2022
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2205400


Registration ID:
402167

Page Number

c769-c778

Share This Article


Jetir RMS

Title

Cloud Computing Accessibility through User Behaviour Trust with Triple Dynamic Window

Abstract

Abstract Human-centered computing models, such as Cloud Computing (CC), have emerged as a result of the advancements in computer hardware, software, and communication technologies. Consequently, the identity-based access control system does not effectively prevent malicious users from gaining access regarding information security difficulties, system stability problems and trust issues between cloud service users and cloud service providers are all occurring. It's not yet mature enough to solve issues such as UBT (User Behaviour Trust) evaluation complexity, trust dynamic update efficiency, and evaluation correctness, all of which can pose security challenges for identity-based access control systems. An improved UBT-based CC access control model compared to the current state of the art is the goal of the research. As a result, SLR was used to identify the structure of the UBT-based access control model, summarise CSU behaviours that can be collected as evidence for UBT evaluation, identify trust attributes that will affect the assessment of UBT, and evaluate the current state of technology and its potential advantages, opportunities, and weaknesses. There are eight current state-of-the-art UBT-based access control models, as well as 23 evidence items from CSU's behaviour that have been grouped into three categories: four important trust qualities, influencers, and countermeasures. The simulation findings reveal that the TDW model performs effectively when it comes to trust fraud and trust expiration while using a prototype of the Triple Dynamic Window Access Control model. This work developed an access control model based on TDW to address the flaws II of trust fraud protection and the trust expiration problem.

Key Words

Keywords: Internet of Things, Triple Dynamic Windows-based Access Control Model, BTR (Behaviour Trust Record), S3, NetLogo

Cite This Article

"Cloud Computing Accessibility through User Behaviour Trust with Triple Dynamic Window", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.9, Issue 5, page no.c769-c778, May-2022, Available :http://www.jetir.org/papers/JETIR2205400.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Cloud Computing Accessibility through User Behaviour Trust with Triple Dynamic Window", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.9, Issue 5, page no. ppc769-c778, May-2022, Available at : http://www.jetir.org/papers/JETIR2205400.pdf

Publication Details

Published Paper ID: JETIR2205400
Registration ID: 402167
Published In: Volume 9 | Issue 5 | Year May-2022
DOI (Digital Object Identifier):
Page No: c769-c778
Country: Bhopal (M.P), M.P, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000421

Print This Page

Current Call For Paper

Jetir RMS