A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Trust Management in the World of Cloud Computing. Past Trends and Some New Directions
2021
Scalable Computing : Practice and Experience
Lastly, we proposed a Machine Learning backed Rich model based solution for trust verification in Cloud Computing. ...
We proposed an approach for verifying whether the right software is running for the correct services in a trusted manner by analyzing features generated from the output cloud processed data. ...
In the centralized trust propagation scheme a centralized entity, like the cloud, is responsible for acting as a datastore of trust information for all network entities. ...
doi:10.12694/scpe.v22i4.1952
fatcat:s2yz7ihudbdqnjkjml5yorbvim
Multilevel Central Trust Management Approach for Task Scheduling on IoT-Based Mobile Cloud Computing
2021
Sensors
With the benefits of mobile cloud computing, the centralized data distribution method is a positive approach. ...
This research article proposes a multilevel trust enhancement approach for efficient task scheduling in mobile cloud environments. ...
Acknowledgments: We deeply acknowledge Taif University for supporting this research through Taif University Researchers Supporting Project Number (TURSP-2020/328), Taif University, Taif, Saudi Arabia. ...
doi:10.3390/s22010108
pmid:35009649
pmcid:PMC8747413
fatcat:w2yc7bd2zvbmjgpi7ktrqhdj64
Multileveled Central Trust Management Approach using Fog Computing
2021
Journal of Management Practices Humanities and Social Sciences
Although both edge and fog computing can bring computing processes to such locations where data is created by eliminating the need for central storage, this approach gives rise to unprecedented issues ...
that do not exist in centralized architecture like cloud computing. ...
Conclusion We introduced a model for centralized multilayered trust management aimed at fog computation. ...
doi:10.33152/jmphss-5.6.8
fatcat:edcpszlgefdftfxajosuhz64py
A Trust-Evaluation Metric for Cloud applications
2011
International Journal of Machine Learning and Computing
It then uses the sugeno fuzzy-inference approach for developing an overall measure of trust value of the cloud providers. It is not easy to evaluate the cloud metrics for a general domain. ...
So, in this paper, we will use an e-learning application as the main example when we collect the data and apply the fuzzy model to evaluate the trust for cloud computing. ...
The proposed methodology will present a novel metrics of trust for cloud computing providers. ...
doi:10.7763/ijmlc.2011.v1.62
fatcat:6oj4lmi7evhidmj4jcpeujbrci
Secure Access Control Model for Cloud Computing Environment with Fuzzy Max Interval Trust Values
2020
International Journal of Advanced Computer Science and Applications
Cloud computing needs service provider with reliable communication for increasing the user trust. ...
Analysis of evaluation parameters values shows that proposed model of fuzzy max interval trust is better as compared to other existing Domain Partition Trust Model (DPTM), for identification of malicious ...
procedures for Building faith in Cloud Computing. ...
doi:10.14569/ijacsa.2020.0110867
fatcat:2lkwnuxyrfbtjgnqdpl5yoqghm
SLA-Based Trust Model for Cloud Computing
2010
2010 13th International Conference on Network-Based Information Systems
We integrate our previous work "conceptual SLA framework for cloud computing" with the proposed trust management model to present a new solution of defining the reliable criteria for the selection process ...
In this paper, we present a trust model to evaluate cloud services in order to help cloud users select the most reliable resources. ...
Fig 1 . 1 SLA-Based Trust Model for Cloud Computing. ...
doi:10.1109/nbis.2010.67
dblp:conf/nbis/AlhamadDC10
fatcat:twidfpdbujfsphbjlnhklsd55y
A survey of trust computation models for service management in internet of things systems
2017
Computer Communications
Our approach is to classify existing trust computation models for service management in IoT systems based on five essential design dimensions for a trust computation model: trust composition, trust propagation ...
In this paper we survey trust computation models for Internet of things (IoT) systems for the purpose of service management, i.e., whether or not to select an IoT device as a service provider. ...
For centralized trust computation, a single cloud server will not scale. ...
doi:10.1016/j.comcom.2016.10.012
fatcat:4yf6olgmf5fzjafpsw7w2v6yqm
Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions
2021
Journal of Cloud Computing: Advances, Systems and Applications
This paper carries out a comprehensive survey on blockchain-based trust approaches in cloud computing systems. ...
The traditional cloud trust model usually adopts a centralized architecture, which causes large management overhead, network congestion and even single point of failure. ...
Phases, taxonomy and review of Blockchain-based trust approaches In this section, we provides a comprehensive review on the blockchain-based trust approaches for credible interactions in cloud computing ...
doi:10.1186/s13677-021-00247-5
fatcat:ncwagc2rhzgrxfrc4u3kabel4i
Trust as a facilitator in cloud computing: a survey
2012
Journal of Cloud Computing: Advances, Systems and Applications
for trust and reputation models (or systems) to support the consumers in establishing trust on Cloud providers. ...
This paper provides a landscape and discusses incentives and hindrances to adopt Cloud computing from Cloud consumers' perspective. ...
Acknowledgements This work is supported by Center for Advanced Security Research Darmstadt (CASED). ...
doi:10.1186/2192-113x-1-19
fatcat:pgnqlqjq7rgetn3mwppipg5ere
Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing
2019
Information
This new network architecture model can deliver services directly from the cloud to the very edge of the network while providing the best efficiency in mobile networks. ...
Mobile edge computing (MEC) effectively integrates wireless network and Internet technologies and adds computing, storage, and processing functions to the edge of cellular networks. ...
Acknowledgments: The authors would like to convey their heartfelt gratitude to the reviewers and the Editor for the valuable suggestions and important comments, which greatly helped them to improve the ...
doi:10.3390/info10080259
fatcat:zu5n2i3enjczxbbkhr2x3ptg54
Towards Analyzing Data Security Risks in Cloud Computing Environments
[chapter]
2010
Communications in Computer and Information Science
We also propose a risk analysis approach that can be used by a prospective cloud service for analyzing the data security risks before putting his confidential data into a cloud computing environment. ...
There is a growing trend of using cloud environments for ever growing storage and data processing needs. ...
[7] have build a trust model in a distributed computing paradigm. ...
doi:10.1007/978-3-642-12035-0_25
fatcat:puz37ho4tfeipop3ievybibbeu
A High-Reliability Trust Management System in Cloud Computing
[chapter]
2021
Prime Archives in Symmetry
I would like to thank my parents who made all of this possible, for their endless love, support and patience. They have been always there for me whenever I needed them. ...
All praises to Allah and His blessing for the completion of this work. I thank God for all the opportunities, trials and strength that have been showered on me to finish writing this manuscript. ...
In this research, we propose a design that allows a trust model to be integrated with a cloud storage system that uses a cryptographic T-RBAC approach. ...
doi:10.37247/pasym.1.2021.14
fatcat:vl4naxpccrdyvpxdlec5epygma
Cross-tenant trust models in cloud computing
2013
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)
Considering the on-demand self-service feature intrinsic to cloud computing, we propose a formal cross-tenant trust model (CTTM) and its role-based extension (RB-CTTM) integrating various types of trust ...
As cloud computing evolves we anticipate there will be increased need for tenants to collaborate across tenant boundaries. ...
While these approaches are suitable for specific aspects of cloud computing, there remains need for a general model of cross-tenant access control. ...
doi:10.1109/iri.2013.6642463
dblp:conf/iri/TangS13
fatcat:ihasent7enei7g4v4z3m5ufmoa
Trust management of services in cloud environments
2013
ACM Computing Surveys
We present a generic analytical framework that assesses existing trust management research prototypes in cloud computing and relevant areas using a set of assessment criteria. ...
Open research issues for trust management in cloud environments are also discussed. ...
We express our gratitude to the anonymous reviewers for their comments and suggestions which have greatly helped us to improve the content, quality, organization, and presentation of this work. ...
doi:10.1145/2522968.2522980
fatcat:tyajkolhxfb6fpeidafgjdcxkm
Modeling and simulation as a cloud service: A survey
2013
2013 Winter Simulations Conference (WSC)
MSaaS is a model for provisioning modelling and simulation (M&S) services on demand from a cloud service provider (CSP), which keeps the underlying infrastructure, platform and software requirements/details ...
Virtualization and cloud computing have already been used as infrastructure and platform both for military and civilian modelling and simulation (M&S) (Cayirci 2011). ...
In cloud computing, the term "federation" is used not only for federating models but also for infrastructure or platforms, and therefore a federation may also mean a cloud service that integrates various ...
doi:10.1109/wsc.2013.6721436
dblp:conf/wsc/Cayirci13
fatcat:bqlqprl6ozf2xb3l6mj5pwivju
« Previous
Showing results 1 — 15 out of 56,054 results