A Trust Management System Model for Cloud

被引:0
作者
Ali, Ahmad [1 ]
Ahmed, Mansoor [1 ]
Khan, Abid [1 ]
Ilyas, Muhammad [2 ]
Razzaq, Muhammad Saad [2 ]
机构
[1] COMSATS Inst Informat Technol, Dept Comp Sci, Islamabad, Pakistan
[2] Univ Sargodha, Dept Comp Sci & IT, Sargodha, Punjab, Pakistan
来源
2017 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC) | 2017年
关键词
Trust; Trustworthiness; Trust Parameters; Distributed computing; Cloud Computing; Security and Privacy in Cloud Computing; and Trust Management System;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed computing environments merged into cloud computing architecture which is being used extensively for resource sharing. It has provided efficient and flexible ways for the provision of services meeting resource sharing needs and challenges of the time. Cloud computing has become a cost effective solution as compared to traditional systems. In cloud computing, Software, Infrastructure, and Platforms are being provided as services however this introduced new dimensions of research in security and privacy breaches. Trust establishment and its maintenance play a vital role in Cloud Computing. Availability, Security and Privacy are key parameters of trust and sharing of privacy preserved statistics of these parameters with stakeholders enhances but Security and Privacy lapses shatter users trust. This paper proposes a model of Trust Management System which provides a comprehensive component based architecture to facilitate cloud service providers in maintaining Users Trust and ultimately help them in flourishing their business.
引用
收藏
页数:6
相关论文
共 22 条
  • [1] Adjei Joseph K., 2014, 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services and Engineering (MobileCloud), P283, DOI 10.1109/MobileCloud.2014.48
  • [2] Almulla S.A., 2010, 2010 2 INT C ENG SYS, P1
  • [3] Anand Priya., 2016, Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, P5
  • [4] [Anonymous], CORR
  • [5] Bernabe J. Bernal, 2016, AUTHORIZATION TRUST
  • [6] Blaze M., 1999, Secure Internet programming. Security issues for mobile and distributed objects, P185
  • [7] A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll entities
    Chiregi, Matin
    Navimipour, Nima Jafari
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2016, 60 : 280 - 292
  • [8] Trust, trustworthiness, and trust propensity: A meta-analytic test of their unique relationships with risk taking and job performance
    Colquitt, Jason A.
    Scott, Brent A.
    LePine, Jeffery A.
    [J]. JOURNAL OF APPLIED PSYCHOLOGY, 2007, 92 (04) : 909 - 927
  • [9] Flores F., 1998, Business Ethics Quarterly, V8, P205
  • [10] Towards a Trust Management System for Cloud Computing
    Habib, Sheikh Mahbub
    Ries, Sebastian
    Muehlhaeuser, Max
    [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 933 - 939