scholarly journals Trust Models in Cloud Computing - A Perspective

2013 ◽  
Vol 6 (2) ◽  
pp. 752-756
Author(s):  
Shyamlal Kumawat ◽  
Prof. Deepak Tomar

Cloud computing is a new paradigm in which dynamically scalable virtualized computing resources, services and information are provided as a service among the people and organizations across the globe over the Internet. The recent developments in cloud computing technology placed numerous challenges in the field of Cloud Computing, including data replication, consistency, reliability, availability and scalability of cloud resources, portability, trust, security, and privacy. Still most of the organizations are not adapting cloud computing due to lack of trust on service provider. This paper gives an overview of cloud computing, and discusses trust and related security challenges. The important elements of cloud environment, which shapes the users trust and provides a way of evaluating each elements importance, are emphasized. Although there are many technological approaches that can develop trust in cloud provider and improve cloud security, there are currently no one-size-fits-all solutions, and future work has to tackle challenges such as trust model for security, as well as suitable mechanisms for ensuring accountability in the cloud. As trust based schemes have been widely discussed and applied in a lot of cloud computing scenarios, becoming subject of scientific researches, this paper also presents a survey of few trust models.

Author(s):  
Anshu Devi ◽  
Ramesh Kait ◽  
Virender Ranga

Fog computing is a term coined by networking giant Cisco. It is a new paradigm that extends the cloud computing model by conferring computation, storage, and application services at the periphery of networks. Fog computing is a gifted paradigm of cloud computing that facilitates the mobility, portability, heterogeneity, and processing of voluminous data. These distinct features of fog help to reduce latency and make it suitable for location-sensitive applications. Fog computing features raise new security concerns and challenges. The existing cloud security has not been implemented directly due to mobility, heterogeneity of fog nodes. As we know, IoT has to process large amount of data quickly; therefore, it has various functionality-driven applications that escalate security concerns. The primary aim of this chapter is to present the most recent security aspects such as authentication and trust, reputation-based trust model, rogue fog node and authentication at different level, security threats, challenges, and also highlights the future aspects of fog.


2017 ◽  
Vol 8 (7) ◽  
pp. 1011-1017
Author(s):  
Mr.Ashish Sharma ◽  
Dr.Sanjay Kumar

Cloud computing enables sharing of data over internet, hence the chances of security attacks also increases. So for the security of Data Sharing or Resources Allocation various Trust Models are implemented which provides security from various attacks. One of the efficient and improved Trust Model is implemented which increases the strength of Security in Cloud Computing [1]. Here in this paper various Trust Models their advantages and limitations are analyzed and com pare on the basis of various parameters. This paper deals with the analysis and survey of all the techniques implemented for Cloud Security so that on the basis of various issues a new and efficient Trust Model is implemented in Future.


2019 ◽  
pp. 1440-1459
Author(s):  
Sara Usmani ◽  
Faiza Rehman ◽  
Sajid Umair ◽  
Safdar Abbas Khan

The novel advances in the field of Information Technology presented the people pleasure, luxuries and ease. One of the latest expansions in the Information Technology (IT) industry is Cloud Computing, a technology that uses the internet for storage and access of data. It is also known as on-demand computing. The end user can access personal data and applications anywhere any time with a device having internet. Cloud Computing has gained an enormous attention but it results in the issues of data security and privacy as the data is scattered on different machines in different places across the globe which is a serious threat to the technology. It has many advantages like flexibility, efficiency and scalability but many of the companies are hesitant to invest in it due to privacy concerns. In this chapter, the objective is to review the privacy and security issues in cloud storage of Big Data and to enhance the security in cloud environment so that end users can enjoy a trustworthy and reliable data storage and access.


Author(s):  
Sathish A. Kumar

Cloud computing is touted as the next big thing in the Information Technology (IT) industry, which is going to impact the businesses of any size. Yet, the security issue continues to pose a big threat. Lack of transparency in the infrastructure and platforms causes distrust among users, and the users are reluctant to store information on the cloud. This undermines the potential of cloud computing and has proved to be a big barrier in the realization of the potential of cloud computing and its widespread adoption. The big paradigm shifts in the technology has not been reflected on the methods used to secure the technology. When an organization builds the infrastructure for cloud computing, security and privacy controls should be kept in mind from the holistic security perspective. It is also critical that the organization monitor and adapt controls to determine the success of cloud computing in dealing with the security and reliability issues relating to the cloud. From an organizational control perspective, the authors suggest an independent governing body to mediate between the cloud provider and the user, with the control framework that they have developed to fulfill their responsibilities of protecting the cloud environment.


Author(s):  
Vaishali Ravindra Thakare ◽  
John Singh K

The interest in cloud computing and its techniques are gaining exponentially in IT industries because of its cost-effective architecture and services. However, these flexible services of cloud bring many security and privacy challenges due to loss of control over the data. This paper focuses on an analysis of various computational trust models in cloud security environment. The computational trust models that are used to build secure cloud architectures are not available in a blended fashion to overcome security and privacy challenges. The paper aims to contribute to the literature review to assist researchers who are striving to contribute in this area. The main objective of this review is to identify and analyse the recently published research topics related to trust models and trust mechanisms for cloud with regard to research activity and proposed approaches. The future work is to design a trust mechanism for cloud security models to achieve the higher level of security.


2019 ◽  
pp. 226-248
Author(s):  
Muthu Ramachandran

Enterprise security is the key to achieve global information security in business and organisations. Enterprise Cloud computing is a new paradigm for that enterprise where businesses need to be secured. However, this new trend needs to be more systematic with respect to Enterprise Cloud security. This chapter has developed a framework for enterprise security to analyze and model Enterprise Cloud organisational security of the Enterprise Cloud and its data. In particular, Enterprise Cloud data & Enterprise Cloud storage technologies (Amazon s3, Drop Box, Google Drive, etc.) have now become a normal practice for almost every computing user's. Therefore, building trust for Enterprise Cloud users should be the one of the main focuses of Enterprise Cloud computing research. This chapter has developed a framework for enterprises which comprises of two models of businesses: Enterprise Cloud provider enterprise model and Enterprise Cloud consumer enterprise model.


2015 ◽  
pp. 1798-1809
Author(s):  
Sathish A. Kumar

Cloud computing is touted as the next big thing in the Information Technology (IT) industry, which is going to impact the businesses of any size. Yet, the security issue continues to pose a big threat. Lack of transparency in the infrastructure and platforms causes distrust among users, and the users are reluctant to store information on the cloud. This undermines the potential of cloud computing and has proved to be a big barrier in the realization of the potential of cloud computing and its widespread adoption. The big paradigm shifts in the technology has not been reflected on the methods used to secure the technology. When an organization builds the infrastructure for cloud computing, security and privacy controls should be kept in mind from the holistic security perspective. It is also critical that the organization monitor and adapt controls to determine the success of cloud computing in dealing with the security and reliability issues relating to the cloud. From an organizational control perspective, the authors suggest an independent governing body to mediate between the cloud provider and the user, with the control framework that they have developed to fulfill their responsibilities of protecting the cloud environment.


Author(s):  
MISS. SAMRUDDHI SHETTY ◽  
SANDEEP KELKAR

The research is conducted on the people serving IT Support and Development in various Sectors by filling an online questionnaire and interpreting the data collected by analysing demographically to find out opinion and thoughts about the disruption and ranking them and statistically by finding the associations between factors like reliability and the location of Data Center, Organization Culture and Disruption and between Security and Compliances and Regulatory. The research concluded that the Cloud Computing has brought Disruption in IT service Industry and population agrees to the statement but not strongly agree to it and Disruption will happen whether management supports the Innovation or Understands or not, it is the need of the hour. The main point of criticism for Cloud is concerns about security and privacy of Data which can be resolved with various compliances and Localization of Data Centers


Author(s):  
Neeraj single

Cloud computing is a rapidly emerging new paradigm for delivering computing as a service. There are many research issues in cloud computing. Resource allocation is one of the challenging tasks in cloud environment. The main aim of resource allocation to reduce the infrastructure cost associated with companies. The resources offered in the cloud are probably heterogeneous and extremely dynamic. Due to this dynamic access, load balancing of jobs required. Cloud computing resource allocation should be elastic and intelligent, based on application demand and user requirements [1].Green cloud computing is a trend which has become popular with the emergence of internet driven services in every field of life. It refers to the prospective environmental advantages that computer based internet services can guarantee to the environment, by processing huge amount of data and information from collective resources pool.load balancing in an efficient way so that the resource utilization can be maximized and the energy consumption of the data centre could be minimized that can further result in reducing global warming. We have concluded the parameters that should be analysed and improved that will result in reduction of global warming and will increase the profits of cloud provider and the client. Cloud computing resource allocation should be elastic and intelligent, based on application demand and user requirements. Green cloud computing is a trend which has become popular with the emergence of internet driven services in every field of life


Sign in / Sign up

Export Citation Format

Share Document