trust enhancement
Recently Published Documents


TOTAL DOCUMENTS

14
(FIVE YEARS 2)

H-INDEX

3
(FIVE YEARS 1)

2018 ◽  
Vol 75 (5) ◽  
pp. 2761-2788
Author(s):  
Tianshu Wang ◽  
Kongfa Hu ◽  
Xichen Yang ◽  
Gongxuan Zhang ◽  
Yongli Wang

2017 ◽  
Vol 33 (4) ◽  
pp. 2437-2449 ◽  
Author(s):  
Chao Huang ◽  
Mengying Liu ◽  
Huiqun Gong ◽  
Feifei Xu
Keyword(s):  

2017 ◽  
Vol 10 (13) ◽  
pp. 481
Author(s):  
Shalabh Negi ◽  
Jayanthi R

Management of trust is one of the most challenging parts in cloud computing. Cloud service’s features such as distributed, dynamic and nontransparentintroduces several challenges for availability, privacy, and security. A method is proposed to have trust as a service between cloud serviceprovider and customer by creating a cloud armor. This proposed methodology is used to make cloud server end and customer end system secure ofany intrusion to their privacy. In this methodology, we will have a user usage pattern log as ever user has its own unique way of using his/her system;hence, in case if any odd user pattern is being encountered it will automatically block the system and simultaneously shoots a message as well as a callto the user notifying him/her about this unauthorized access. This log is set a various small pattern log, for example, keylog, preferable website visited,and time of accessing the system. Further, we have secured these logs using Rivest-Shamir-Adleman algorithm with very large key size.


Author(s):  
Xu Yang ◽  
Ting-Ting Lee ◽  
Joseph K. Liu ◽  
Xinyi Huang

Sign in / Sign up

Export Citation Format

Share Document