22 research outputs found

    Trust Management Model for Cloud Computing Environment

    Get PDF
    Software as a service or (SaaS) is a new software development and deployment paradigm over the cloud and offers Information Technology services dynamically as "on-demand" basis over the internet. Trust is one of the fundamental security concepts on storing and delivering such services. In general, trust factors are integrated into such existent security frameworks in order to add a security level to entities collaborations through the trust relationship. However, deploying trust factor in the secured cloud environment are more complex engineering task due to the existence of heterogeneous types of service providers and consumers. In this paper, a formal trust management model has been introduced to manage the trust and its properties for SaaS in cloud computing environment. The model is capable to represent the direct trust, recommended trust, reputation etc. formally. For the analysis of the trust properties in the cloud environment, the proposed approach estimates the trust value and uncertainty of each peer by computing decay function, number of positive interactions, reputation factor and satisfaction level for the collected information.Comment: 5 Pages, 2 Figures, Conferenc

    FUZZY BASED TRUST MANAGEMENT SYSTEM FOR CLOUD ENVIRONMENT

    Full text link
    Cloud computing is a business model with high degree of flexibility, scalability in providing infrastructure, platform and software as a service over the internet. Cloud promises for easiness and reduced expense to service providers and consumers. However, a lack of trust between these two stakeholders has hindered the universal acceptance of cloud for outsourced services. In this paper, a fuzzy based trust management system is proposed to facilitate cloud consumers in identifying trustworthy providers. The performance of proposed system is validated through a simulation using CloudAnalyst and Simulink

    Issues in a Scalable Inter Cloud Environment with Unified Brokering Approach

    Get PDF
    Cloud Computing providers are currently serving customers throughout the world. Inter- Cloud Computing, where a number of providers come together, has already paved its way, It is meant to address the growing challenges of load balancing and optimal utilization of resources. At the same time, its objectives also include QoS and SLA accomplishment. A centralized Federation of clouds is a confederacy of cloud providers attached to and dependent upon a single unified broker entity. This unified broker acts as a linchpin for the entire system. This paper envisions and elaborates upon the idea of centralized Inter-cloud federation environment. We propose issues open to centralized Inter-Clouds at two levels namely unified broker and the cloud providers

    Analysis of the major issues in Cloud Computing Environments

    Get PDF
    Cloud computing is a model for enabling service user’s ubiquitous, convenient and on-demand network access to a shared pool of configurable computing resources. Cloud computing is a promising technology to facilitate development of large-scale, on-demand, flexible computing infrastructures. But without security embedded into innovative technology that supports cloud computing, businesses are setting themselves up for a fall. The trend of frequently adopting this technology by the organizations automatically introduced new risk on top of existing risk. Obviously putting everything into a single box i.e. into the cloud will only make it easier for hacker. This paper presents an overview and the study of the cloud computing. Also include the several security and challenging issues, emerging application and the future trends of cloud computing

    Identifying cloud security threats to strengthen cloud computing adoption framework

    Get PDF
    Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing

    A Behaviour Study on Cloud Eco-System: Data Security Perspective

    Get PDF
    Cloud eco-system is a revolution now, which modifies the way in which the IT-based services are being delivered to end customers. It is increasing or we can also say grown-up technology that delivers multiple benefits whether in terms of economics or in terms of cost-effective resource utilization. The ability to install and improve their services on that platform is made possible by the advent of cloud computing, which opens up new options for long-term solutions. Cloud computing's environmental and economic impacts must be considered while assessing its long-term viability. A growing number of organizations, businesses, and personal users are depending on services supplied by the cloud and keeping crucial information in the cloud because of its easy-to-use characteristics. The cloud, despite its widespread use, nevertheless has a number of drawbacks when it comes to data security. Customers are concerned about how their personal information is transported to and from the cloud. Research articles in this topic have been thoroughly analyzed and examined in this report

    A STRUCTURE TO ASSIST COLLECTION OF CLOUD PROVISION PROVIDERS

    Get PDF
    Cloud-computing is a developing concept, by which new providers and services information are often entering existence, offering services of comparable functionality. Trust in addition to status is important concepts within online applications. They have produced easy selection appropriate to picking of consistent agent for electronic transactions. We   present a method referred to as choice of cloud firms that mixes reliability in addition to competence for estimation of chance of interaction which estimates supposed volume of interaction risk by way of mixing reliability in addition to competence of cloud provider. Reliability is computed from personal encounters that's acquired completely through direct relations otherwise from feedbacks connected with reputations of vendors.  Competence is assessed based on transparency within provider service level contracts guarantees

    An Empirical Analysis of Security Issues in Cloud Environment

    Full text link
    Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Cloud Computing leverages many technologies (SOA, virtualization, Web 2.0); it also inherits their security issues, which we discuss here, identifying the main vulnerabilities in this kind of systems and the most important threats found in the literature related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with possible solutions
    corecore