Full Paper View

A Comparative Analysis of Trust Models in Cloud Computing

U.Kaur 1 , M. Mahajan2 , D. Singh3

1 I.K. Gujral Punjab Technical University, Jalandhar, Punjab, India.
2 Department of Computer Science & Engineering, CGC, Landran, Punjab, India.
3 Department of Computer Science & Engineering, CCET, Punjab, India.

Section:Review Paper, Product Type: Journal
Vol.6 , Issue.2 , pp.19-23, Apr-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrnsc/v6i2.1923


Online published on Apr 30, 2018


Copyright © U.Kaur, M. Mahajan, D. Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

Citation :
IEEE Style Citation: U.Kaur, M. Mahajan, D. Singh, “A Comparative Analysis of Trust Models in Cloud Computing”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.19-23, 2018.

MLA Style Citation: U.Kaur, M. Mahajan, D. Singh "A Comparative Analysis of Trust Models in Cloud Computing." International Journal of Scientific Research in Network Security and Communication 6.2 (2018): 19-23.

APA Style Citation: U.Kaur, M. Mahajan, D. Singh, (2018). A Comparative Analysis of Trust Models in Cloud Computing. International Journal of Scientific Research in Network Security and Communication, 6(2), 19-23.

47 Views    44 Downloads    19 Downloads
  
  

Abstract :
Today cloud computing plays a vital role in the industry of internet applications; it covers a vast area of services which are directly or indirectly related to the online data sources. Trust models are playing a very crucial job in cloud computing sector and today trust is the only thing which is the biggest challenge to cloud-based technologies. There are lots of trust models techniques are available in the area of cloud computing to increase the levels of trust in between users and service providers. This survey briefly analyzed the factors and working aspects of cloud-based Trust models and it also compares the factors of different types of Trust models, which are calculating trust values using so many different types of parameters such as data integrity, service availability and data turnaround efficiency.

Key-Words / Index Term :
cloud computing, data reliability, trust models, trust management, authentication, cloud security

References :
[1] M. Sato, “Personal data in the cloud: A global Survey of Consumer attitudes”, Fujitsu Limited, Japan, 2010.
[2] M. K. Goyal, A. Aggarwal, “QoS based trust management model for Cloud IaaS.” In the proceedings of the 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC), India, pp. 843-847, 2012 .
[3] P. D. Manuel, M. I. Barr, S. T. Selvi, “A novel trust management system for cloud computing - IaaS providers”, JCMCC-Journal of Combinatorial Mathematics and Combinatorial Computing, Vol. 79, Issue.3, 2011.
[4] P. Manuel, “A trust model of cloud computing based on Quality of Service”, Annals of Operations Research, Vol.233, Issue.1, pp. 281-292, 2015.
[5] M. Alhamad, T. Dillon, “SLA-Based Trust Model for Cloud Computing”, In the proceedings of the 13th International Conference on Network-Based Information Systems, Japan , pp. 321-324, 2010.
[6] E. D. Canedo, R. T. Junior, “File Exchange in a Private Cloud supported by a Trust Model” , In the proceedings of the 2012 International conference on Cyber-Enabled Distributed Computing and Knowledge Discovery , China, pp. 89-96, 2012.
[7] S.Ahmad, B. Ahmad, S. M. Saqib, R. M. Khattak, “Trust model: Cloud’s provider and cloud’s user”, International Journal of Advanced Science and Technology, Vol.44, pp. 69-80, 2012.
[8] X. Wu, R. Zhang, B. Zeng, S. Zhou, “A trust evaluation model for cloud computing”, Procedia Computer Science, Vol.17, pp.1170-1177, 2013.
[9] A. Gholami, M. G. Arani, “A trust model based on quality of service in cloud computing environment”, International Journal of Database Theory and Application, Vol. 8, Issue.5, pp.161-170, 2015.
[10] F. J. Krautheim, D. S. Phatak, A. T. Sherman, “Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Computing”, In the proceedings of the International Conference on Trust and Trustworthy Computing, Germany, pp. 211–227,2010.
[11] Z. Yang, L. Qiao, “A collaborative trust model of firewall-through based on Cloud Computing”, In the proceedings of the 2010 14th international conference on Computer supported cooperative work in design , China ,pp. 329-334, 2010.
[12] S. Ries, J. Kangasharju, “ A Classification of Trust System”, In the proceedings of the OTM Confederated International Conferences “ On the Move to Meaningful Internet systems”, France, pp. 894-903, 2006.
[13] A. Gholami, M. G. Arani, “A trust model for resource selection in cloud computing environment”, In the proceedings of the 2nd In Knowledge-Based Engineering and Innovation (KBEI), Iran, pp. 144-151, 2015.
[14] F. Messina, G. Pappalardo, “A trust-based approach for a competitive cloud/grid computing scenario”, In the proceedings of the 6th International Symposium on Intelligent Distributed Computing, Italy, pp. 129-138, 2013.
[15] Z. Chen, W. Yao, “Security and trust model for data disaster-recovery service on the cloud”, In In the proceedings of the International Conference on Trustworthy Computing and Services, China, pp. 140-147,2012.
[16] A. Chandrasekar, K. Chandrasekar, “ QoS Monitoring and Dynamic Trust Establishment in the Cloud”, In the proceedings of the International Conference on Grid and Pervasive Computing, China, pp. 289-301, 2012.
[17] R. K. Ko, P. Jagadpramana, “Towards achieving accountability, auditability and trust in cloud computing”, In the proceedings of the International Conference on Advances in Computing and Communications , India pp. 432-444 , 2011.
[18] D. J. Kim, D. L. Ferrin, H. R. Rao, “A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents”, Decision Support Systems, Vol. 44, Issue. 2, pp. 544-564, 2008.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  editor@isroset.org or view contact page for more details.

Go to Navigation