Enhancement of Cloud Security and Strength of Service Using Trust Model

被引:1
作者
Prakash, Pragati [1 ]
Ekka, Nidhi [1 ]
Kathane, Tanmay [1 ]
Yadav, Nishi [1 ]
机构
[1] Guru Ghasidas Vishwavidyalaya, Dept Comp Sci & Engn, Bilaspur, India
来源
INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018 | 2019年 / 26卷
关键词
Cloud computing; Service provider; Trust model; Fuzzy logic; Reliability; Availability; Turnaround time; Cloud security; Issues and challenges;
D O I
10.1007/978-3-030-03146-6_157
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cloud Computing involves delivering hosted services over the internet. These services are broadly classified into three categories: Software-as-a-service (SaaS), Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS). The abstracted power of hardware and software accessed over the Internet, created and disposed off efficiently, are dynamically scalable through a variety based on measurable usage. This paper deals with the classification of cloud layers and measures trust value for cloud service providers using fuzzy logic centroid method of defuzzification. We have used three parameters, reliability, availability and turn-around time for evaluating trust. With this trust value, the strength and security of cloud service are enhanced as compared to that in Trust Model for Measuring Security Strength of Cloud Computing Service [5]. The advantage of using this model is that it is more convenient and the trust is evaluated using lesser parameters.
引用
收藏
页码:1345 / 1353
页数:9
相关论文
共 16 条
[1]  
Banirostam H., 2013, TRUST BASED APPROACH
[2]  
Bhadauria Rohit., 2012, INT J COMPUTER APPL, V47, P47, DOI DOI 10.5120/7292-0578
[3]  
Columbus L, 2014, 2014 CLOUD SURVEY RE
[4]  
Elias H.D., 2011, EMC
[5]   Cloud Computing Security by Integrating Classical Encryption [J].
Goodarzi, Koorosh ;
Karimi, Abbas .
MEDICAL AND REHABILITATION ROBOTICS AND INSTRUMENTATION (MRRI2013), 2014, 42 :320-326
[6]   An analysis of security issues for cloud computing [J].
Hashizume, Keiko ;
Rosado, David G. ;
Fernandez-Medina, Eduardo ;
Fernandez, Eduardo B. .
JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2013, 4 (01) :1-13
[7]   Trust mechanisms for cloud computing [J].
Huang, Jingwei ;
Nicol, David M. .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2013, 2
[8]  
Hussain M., 2011, SECAAS SECURITY SERV, DOI DOI 10.1145/2107556.2107564
[9]  
Marinos A., 2009, LECT NOTES COMPUTER, V5931
[10]  
Peng Y., 2012, J CHINA U POSTS TELE, V19, P182, DOI [10.1016/s10058885(11)60424x, DOI 10.1016/S1005-8885(11)60424-X]