scholarly journals A Survey & Analysis of Various Trust Model for Security in Cloud Computing: Issues & Challenges

2017 ◽  
Vol 8 (7) ◽  
pp. 1011-1017
Author(s):  
Mr.Ashish Sharma ◽  
Dr.Sanjay Kumar

Cloud computing enables sharing of data over internet, hence the chances of security attacks also increases. So for the security of Data Sharing or Resources Allocation various Trust Models are implemented which provides security from various attacks. One of the efficient and improved Trust Model is implemented which increases the strength of Security in Cloud Computing [1]. Here in this paper various Trust Models their advantages and limitations are analyzed and com pare on the basis of various parameters. This paper deals with the analysis and survey of all the techniques implemented for Cloud Security so that on the basis of various issues a new and efficient Trust Model is implemented in Future.

Author(s):  
Anshu Devi ◽  
Ramesh Kait ◽  
Virender Ranga

Fog computing is a term coined by networking giant Cisco. It is a new paradigm that extends the cloud computing model by conferring computation, storage, and application services at the periphery of networks. Fog computing is a gifted paradigm of cloud computing that facilitates the mobility, portability, heterogeneity, and processing of voluminous data. These distinct features of fog help to reduce latency and make it suitable for location-sensitive applications. Fog computing features raise new security concerns and challenges. The existing cloud security has not been implemented directly due to mobility, heterogeneity of fog nodes. As we know, IoT has to process large amount of data quickly; therefore, it has various functionality-driven applications that escalate security concerns. The primary aim of this chapter is to present the most recent security aspects such as authentication and trust, reputation-based trust model, rogue fog node and authentication at different level, security threats, challenges, and also highlights the future aspects of fog.


2013 ◽  
Vol 10 (8) ◽  
pp. 1884-1891
Author(s):  
Punit Gupta ◽  
Deepika Agrawal

Reliability and trust Models are used to enhance secure , reliable scheduling , load balancing and QoS in cloud and Distributed environment. Trust models that are being used in Distributed and Grid environment, does not qualify cloud computing environment requirements. Since the parameters that have being taken into consideration in these trust models, does not fit in the cloud Infrastructure As A Service, a suitable trust model is proposed based on the existing model that is suitable for trust value management for the cloud IaaS parameters. Based on the above achieved trust values,  trust based scheduling and load balancing  is done for better allocation of resources and enhancing the QOS of services been provided to the users. In this paper, an trust based cloud computing framework is proposed using trust model ,trust based scheduling and load balancing algorithms. Here we describe the design and development of trusted Cloud service model for cloud Infrastructure as a service (IaaS) known as VimCloud .VimCloud an open source cloud computing framework that implements the tusted Cloud Service Model and  trust based scheduling and load balancing algorithm . However one of the major issues in cloud IaaS is to ensure reliability and security or used data and computation. Trusted cloud service model ensures that user virual machine executes only on trusted cloud node, whose integrity and reliability is known in term of trust value . VimCloud shown practical in term of performace which is better then existing models.


2013 ◽  
Vol 6 (2) ◽  
pp. 752-756
Author(s):  
Shyamlal Kumawat ◽  
Prof. Deepak Tomar

Cloud computing is a new paradigm in which dynamically scalable virtualized computing resources, services and information are provided as a service among the people and organizations across the globe over the Internet. The recent developments in cloud computing technology placed numerous challenges in the field of Cloud Computing, including data replication, consistency, reliability, availability and scalability of cloud resources, portability, trust, security, and privacy. Still most of the organizations are not adapting cloud computing due to lack of trust on service provider. This paper gives an overview of cloud computing, and discusses trust and related security challenges. The important elements of cloud environment, which shapes the users trust and provides a way of evaluating each elements importance, are emphasized. Although there are many technological approaches that can develop trust in cloud provider and improve cloud security, there are currently no one-size-fits-all solutions, and future work has to tackle challenges such as trust model for security, as well as suitable mechanisms for ensuring accountability in the cloud. As trust based schemes have been widely discussed and applied in a lot of cloud computing scenarios, becoming subject of scientific researches, this paper also presents a survey of few trust models.


Popular computing technologies like Distributed ,Parallel ,Grid etc., have already reached their peaks in providing services and now a hybrid aspect is capturing the focus which is a combination of traditional computing technology and network technology and termed to be “Cloud Computing ”.A desperate demand for data sharing and handling enterprise applications have called upon for cloud computing .A blocking wind for leveraging cloud computing technology is the aspect of security .But the passion towards adopting cloud have overridden the security threats. This paper glances over various security threats, risks, challenges along with their resistance capabilities to overcome the vulnerabilities in the cloud and also some of the encryption techniques that are used in the cloud.


2019 ◽  
Vol 16 (7) ◽  
pp. 174-194 ◽  
Author(s):  
Weijin Jiang ◽  
Yang Wang ◽  
Yirong Jiang ◽  
Jiahui Chen ◽  
Yuhui Xu ◽  
...  

2021 ◽  
Vol 1055 (1) ◽  
pp. 012108
Author(s):  
M Arumugam ◽  
S Deepa ◽  
G Arun ◽  
P Sathishkumar ◽  
K Jeevanantham

2021 ◽  
Vol 16 ◽  
pp. 2579-2580
Author(s):  
Caihui Lan ◽  
Caifen Wang ◽  
Haifeng Li ◽  
Liangliang Liu

2021 ◽  
Vol 1964 (4) ◽  
pp. 042061
Author(s):  
V Sureshkumar ◽  
B Baranidharan

Cell ◽  
2021 ◽  
Vol 184 (3) ◽  
pp. 566-570
Author(s):  
Vincent Chan ◽  
Pier Federico Gherardini ◽  
Matthew F. Krummel ◽  
Gabriela K. Fragiadakis
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document