Trust Model for a Cloud Computing Application and Service

被引:0
作者
Shaikh, Rizwana A. R. [1 ,2 ]
Sasikumar, M. [3 ]
机构
[1] SIES Grad Sch Technol, Nerul, India
[2] NMIMS, Bombay, Maharashtra, India
[3] Ctr Dev Adv Comp, Kharghar, India
来源
2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC) | 2012年
关键词
Cloud Computing; Security; Trust; Trust Model;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing has attracted great attention due its various features. There are various rising concerns in its growth, one of which is security. Trust between provider and a user is the most important factor to be considered for achieving security, which is also essential to promote the reputation of various cloud providers and their offered services. Here we present a trust based solution in terms of a trust model that can be used to calculate the security strength of a particular cloud service. The trust value acts as a means for selecting any cloud service.
引用
收藏
页码:17 / 20
页数:4
相关论文
共 20 条
[1]  
Ahmed M., 2010, Proceedings 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010), P723, DOI 10.1109/EUC.2010.114
[2]  
Basu J., 2005, IEE Seminar on Intelligent Building Environments, P223
[3]  
Giang PD, 2007, 2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, P149
[4]   Trust management and service selection in pervasive computing environments [J].
Guan, Shangyuan ;
Dong, Xiaoshe ;
Wu, Weiguo ;
Mei, Yiduo ;
Liao, Shihua .
CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, :620-623
[5]  
Iltaf Naima, 2006, INT S HIGH CAP OPT N, P1
[6]  
Khiabani Hamed, 2010, INT C TECHN POSTGR M, P1
[7]  
Kim H, 2010, INT J GRID DISTRIB, V3
[8]   Trust Model of Users' behavior in Trustworthy Internet [J].
Li Wen ;
Ping Lingdi ;
Lu Kuijun ;
Chen Xiaoping .
2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL I, 2009, :403-406
[9]  
Li-qin Tian, 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), P567, DOI 10.1109/ICCASM.2010.5620636
[10]  
Liu Zhaoyu, 2005, 2 INT C EMB SOFTW SY