Trust Relationship Establishment Among Multiple Cloud Service Provider

2019 ◽  
pp. 1548-1576
Author(s):  
Abhishek Majumder ◽  
Samir Nath ◽  
Arpita Bhattacharjee ◽  
Ranjita Choudhury

Trust relationships among multiple Cloud Service Providers is a concept in which multiple cloud service providers from multiple distributed Identity Provider can access resources of each other, only if they are trusted with their Identity Provider. In this chapter a scheme has been proposed to enhance the security of data in a multi-cloud environment by improving trust relationships among multiple clouds. The scheme is also designed to overcome interoperability problem between different clouds. In the proposed scheme concept of proxy is used. Client organization tries to communicate with multiple cloud service providers through proxy. Client organization send resource request to cloud service providers. On receiving the resource request the cloud service provider collect the authentication confirmation from proxy. Then it sends the reply and data to requested client organization. Numerical analysis and comparative study of the proposed scheme with some of the existing scheme has been carried out.

Author(s):  
Abhishek Majumder ◽  
Samir Nath ◽  
Arpita Bhattacharjee ◽  
Ranjita Choudhury

Trust relationships among multiple Cloud Service Providers is a concept in which multiple cloud service providers from multiple distributed Identity Provider can access resources of each other, only if they are trusted with their Identity Provider. In this chapter a scheme has been proposed to enhance the security of data in a multi-cloud environment by improving trust relationships among multiple clouds. The scheme is also designed to overcome interoperability problem between different clouds. In the proposed scheme concept of proxy is used. Client organization tries to communicate with multiple cloud service providers through proxy. Client organization send resource request to cloud service providers. On receiving the resource request the cloud service provider collect the authentication confirmation from proxy. Then it sends the reply and data to requested client organization. Numerical analysis and comparative study of the proposed scheme with some of the existing scheme has been carried out.


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


2020 ◽  
Vol 31 (4) ◽  
pp. 411-424
Author(s):  
Han Lai ◽  
Huchang Liao ◽  
Zhi Wen ◽  
Edmundas Kazimieras Zavadskas ◽  
Abdullah Al-Barakati

With the rapid growth of available online cloud services and providers for customers, the selection of cloud service providers plays a crucial role in on-demand service selection on a subscription basis. Selecting a suitable cloud service provider requires a careful analysis and a reasonable ranking method. In this study, an improved combined compromise solution (CoCoSo) method is proposed to identify the ranking of cloud service providers. Based on the original CoCoSo method, we analyze the defects of the final aggregation operator in the original CoCoSo method which ignores the equal importance of the three subordinate compromise scores, and employ the operator of “Linear Sum Normalization” to normalize the three subordinate compromise scores so as to make the results reasonable. In addition, we introduce a maximum variance optimization model which can increase the discrimination degree of evaluation results and avoid inconsistent ordering. A numerical example of the trust evaluation of cloud service providers is given to demonstrate the applicability of the proposed method. Furthermore, we perform sensitivity analysis and comparative analysis to justify the accuracy of the decision outcomes derived by the proposed method. Besides, the results of discrimination test also indicate that the proposed method is more effective than the original CoCoSo method in identifying the subtle differences among alternatives.


2021 ◽  
Author(s):  
Hamza Ali Imran ◽  
Usama Latif ◽  
Ataul Aziz Ikram ◽  
Maryam Ehsan ◽  
Ahmed Jamal Ikram ◽  
...  

<div>In the span of a decade, innovations in cloud computing have led to a new understanding of computing to be used as a utility. Majority of cloud service providers are making the service better and competitive for end-user. Aside from the number of services introduced by these providers, users are feeling uneasy and are unaware of consequences while switching from one service to another. Internal architecture of the cloud makes it difficult for end-users to understand. To overcome this issue a new concept of multi-cloud has been introduced. In multi-cloud technology, we can use multiple clouds from different vendors without platform complexity. Hence summarized, Multi-cloud is the usage of autonomous cloud platforms with one interface which may clue to different administrative and implementation domains. This paper reviews the literature of recently presented solutions and architectures for multi-cloud platforms.</div>


Cloud computing has evolved over a decade and thrived to the state that Information Technology cannot survive without cloud. It has evolved in such a way that it is embedded in every one’s life. Though cloud has become integral part of every new software, still there are gaps in security features and customers keenly look into multiple aspects of cloud service provider features before choosing their appropriate CSP. More than cost and features Cloud Service Provider should gain trust of the clients to do more business. There are lot of factors involved to gain confidence of client such as transparency, cost, security etc. Also how flexible the provider can help in deploying for various light weight devices such as Internet of Things (IoT) also matters where in IoT is emerging industry. Concurrently Cloud Service capability to work in collaborative fashion and other machine learning features will also take into account by clients to choose their respective best fit Cloud Service Provider.


2020 ◽  
Vol 9 (1) ◽  
pp. 2127-2130

The cloud refers to a set of services and infrastructure that are accessed via the internet. the cloud infrastructure is shared by many users each one performing different tasks. in order to prevent data leakage in the cloud the Cloud Service Provider should employ an Encryption Algorithm to protect the data of the users. Since the cloud service providers and large amount of data the Encryption Algorithm should be very efficient in terms of computational cost and time. Current Cloud service providers you son of the following algorithms to encrypt and decrypt the data Advanced encryption standard(AES), Rivest–Shamir–Adleman (RSA) and elliptic curve cryptography(ECC).The encryption for cloud should be chosen such that it is computationally efficient for the Cloud Service Provider and also meets the security requirement of the user


2021 ◽  
Author(s):  
Hamza Ali Imran ◽  
Usama Latif ◽  
Ataul Aziz Ikram ◽  
Maryam Ehsan ◽  
Ahmed Jamal Ikram ◽  
...  

<div>In the span of a decade, innovations in cloud computing have led to a new understanding of computing to be used as a utility. Majority of cloud service providers are making the service better and competitive for end-user. Aside from the number of services introduced by these providers, users are feeling uneasy and are unaware of consequences while switching from one service to another. Internal architecture of the cloud makes it difficult for end-users to understand. To overcome this issue a new concept of multi-cloud has been introduced. In multi-cloud technology, we can use multiple clouds from different vendors without platform complexity. Hence summarized, Multi-cloud is the usage of autonomous cloud platforms with one interface which may clue to different administrative and implementation domains. This paper reviews the literature of recently presented solutions and architectures for multi-cloud platforms.</div>


2020 ◽  
Vol 8 (5) ◽  
pp. 4124-4232

Picking up public cloud service providers is now becoming a harder task in an enterprise organization. This paper will help in reducing more hesitation to choose a public cloud service provider. This paper is highlighting computation, storage, and infrastructure is important to service features that have an impact when choosing cloud service providers. Compare these three (AWS, Microsoft Azure, GCP) CSPs concerning service, price, advantages, and highlight significant service features. Studies discuss the primary reason to choose a CSP that normally enhance features, familiarity with the brand, suitable for organization and security parameters considered when choosing CSP. Amazon Web Services proved its leadership by maintaining about 33% share in the market throughout for several quarters irrespective of the market size increased by a factor of 3. Microsoft has shown prominent performance in SaaS. Since 2008, after introducing PaaS in the form of Google App Engine, Google is continuously enhancing its cloud computing services of Google Cloud Platform.


Author(s):  
Gayatri Pandi ◽  
Saurabh Shah ◽  
K.H Wandra

Gathering and scrutinizing the different types of logs are the vital steps in the forensic domain. Logs are commonly gathered by the cloud service providers or by some third party layers governed by the cloud service providers. Security of the logs is a crucial issue as the logs can be tampered accidentally or intentionally by an employee in the cloud service provider’s organization or by the forensic investigator, thus maligning the evidence in case a cyber-crime, is committed through the cloud service provider’s infrastructure. The malicious attacker can also conspire with the cloud service provider or the forensic investigator to erase or malign the logs that are generated for one’s own criminal activity. To address such issues, a method is recommended which verifies the tampering of the virtual instance logs, Verification process confirms that the confidentiality and integrity of the logs remains intact. The log integrity is proved by log chains which are created in the implemented system and by the potential electronic evidence of past logs which are posted by the cloud service provider. The proposed system aids in performing the reasonable verifications that the cloud service provider or the forensic investigator is not tampering the logs. The novelty of the research conducted in this paper is a technique which applies the cuckoo filter, to the forensic logs which is supportive in proving the integrity of the evidences at a faster pace in comparison to the other filters.


Sign in / Sign up

Export Citation Format

Share Document