7,471 research outputs found

    Determining service trustworthiness in inter loud computing environments

    Full text link
    Deployment of applications and scientific workflows that require resources from multiple distributed platforms are fuelling the federation of autonomous clouds to create cyber infrastructure environments. As the scope of federated cloud computing enlarges to ubiquitous and pervasive computing, there will be a need to assess and maintain the trustworthiness of the cloud computing entities. In this paper, we present a fully distributed framework that enable interested parties determine the trustworthiness of federated cloud computing entities.<br /

    Trust Management Model for Cloud Computing Environment

    Get PDF
    Software as a service or (SaaS) is a new software development and deployment paradigm over the cloud and offers Information Technology services dynamically as "on-demand" basis over the internet. Trust is one of the fundamental security concepts on storing and delivering such services. In general, trust factors are integrated into such existent security frameworks in order to add a security level to entities collaborations through the trust relationship. However, deploying trust factor in the secured cloud environment are more complex engineering task due to the existence of heterogeneous types of service providers and consumers. In this paper, a formal trust management model has been introduced to manage the trust and its properties for SaaS in cloud computing environment. The model is capable to represent the direct trust, recommended trust, reputation etc. formally. For the analysis of the trust properties in the cloud environment, the proposed approach estimates the trust value and uncertainty of each peer by computing decay function, number of positive interactions, reputation factor and satisfaction level for the collected information.Comment: 5 Pages, 2 Figures, Conferenc

    A context-aware framework for collaborative activities in pervasive communities

    Get PDF
    Pervasive environments involve the interaction of users with the objects that surround them and also other participants. In this way, pervasive communities can lead the user to participate beyond traditional pervasive spaces, enabling the cooperation among groups taking into account not only individual interests, but also the collective and social context. In this study, the authors explore the potential of using context-aware information in CSCW application in order to support collaboration in pervasive environments. In particular this paper describes the approach used in the design and development of a context-aware framework utilizing users' context information interpretation for behaviour adaptation of collaborative applications in pervasive communities

    Security and Privacy Preservation over Interconnected Networks

    Get PDF
    Security is a key concern in a wide spread network. Preserving private information is to be given due importance by all communication devices and search engines, since there is a threat of unauthorized users accessing secure information by trapping the network devices. Existing wide spread network of computers, mobile and other electronic devices does not define proper protocols neither based on users location nor based on the end users requirements in connecting to the network. Our proposed solution provides the most better and promising solution for a good network of plug and play Networks along with high level of authentication and authorization solutions. The proposal uses Flexi- Negotiable Security solutions that takes into account the cost and crude for such implementations along with best interoperability among the connected devices. Set of authorization policies are generated by a network manager using XACML based on the based on the available resources and the number of connected devices thus proving a reliable and secure network of devices.In this project, we are trying to incorporate a control point which will take care of controlling the devices access points. Each individual user needs to get authentication and authorization to access the resources in the network. Control point will take care of validating the request by the users. Once the users holds the authentication/authorization to access the resource in the network. They are permitted or else, no option to access the resources and they will be restricted. The authentication will be verified by the control points through a secure SOAP based web services. Our proposed system involves the above said techniques and it associated with attribute based authentication. So that, higher designated people will be provided with more access options
    • …
    corecore