Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








56,054 Hits in 3.9 sec

Trust Management in the World of Cloud Computing. Past Trends and Some New Directions

Mahreen Saleem, M.R Warsi, Saiful Islam, Areesha Anjum, Nadia Siddiquii
2021 Scalable Computing : Practice and Experience  
Lastly, we proposed a Machine Learning backed Rich model based solution for trust verification in Cloud Computing.  ...  We proposed an approach for verifying whether the right software is running for the correct services in a trusted manner by analyzing features generated from the output cloud processed data.  ...  In the centralized trust propagation scheme a centralized entity, like the cloud, is responsible for acting as a datastore of trust information for all network entities.  ... 
doi:10.12694/scpe.v22i4.1952 fatcat:s2yz7ihudbdqnjkjml5yorbvim

Multilevel Central Trust Management Approach for Task Scheduling on IoT-Based Mobile Cloud Computing

Abid Ali, Muhammad Munawar Iqbal, Harun Jamil, Habib Akbar, Ammar Muthanna, Meryem Ammi, Maha M. Althobaiti
2021 Sensors  
With the benefits of mobile cloud computing, the centralized data distribution method is a positive approach.  ...  This research article proposes a multilevel trust enhancement approach for efficient task scheduling in mobile cloud environments.  ...  Acknowledgments: We deeply acknowledge Taif University for supporting this research through Taif University Researchers Supporting Project Number (TURSP-2020/328), Taif University, Taif, Saudi Arabia.  ... 
doi:10.3390/s22010108 pmid:35009649 pmcid:PMC8747413 fatcat:w2yc7bd2zvbmjgpi7ktrqhdj64

Multileveled Central Trust Management Approach using Fog Computing

Ayesha Irshad, Syed Zohaib Hassan, Ayesha Aslam, Kalsoom Ayaz, Jamaluddin Mir, Muhammad Awais Bawazir
2021 Journal of Management Practices Humanities and Social Sciences  
Although both edge and fog computing can bring computing processes to such locations where data is created by eliminating the need for central storage, this approach gives rise to unprecedented issues  ...  that do not exist in centralized architecture like cloud computing.  ...  Conclusion We introduced a model for centralized multilayered trust management aimed at fog computation.  ... 
doi:10.33152/jmphss-5.6.8 fatcat:edcpszlgefdftfxajosuhz64py

A Trust-Evaluation Metric for Cloud applications

Mohammed Alhamad, Tharam Dillon, Elizabeth Chang
2011 International Journal of Machine Learning and Computing  
It then uses the sugeno fuzzy-inference approach for developing an overall measure of trust value of the cloud providers. It is not easy to evaluate the cloud metrics for a general domain.  ...  So, in this paper, we will use an e-learning application as the main example when we collect the data and apply the fuzzy model to evaluate the trust for cloud computing.  ...  The proposed methodology will present a novel metrics of trust for cloud computing providers.  ... 
doi:10.7763/ijmlc.2011.v1.62 fatcat:6oj4lmi7evhidmj4jcpeujbrci

Secure Access Control Model for Cloud Computing Environment with Fuzzy Max Interval Trust Values

Aakib Jawed Khan, Shabana Mehfuz
2020 International Journal of Advanced Computer Science and Applications  
Cloud computing needs service provider with reliable communication for increasing the user trust.  ...  Analysis of evaluation parameters values shows that proposed model of fuzzy max interval trust is better as compared to other existing Domain Partition Trust Model (DPTM), for identification of malicious  ...  procedures for Building faith in Cloud Computing.  ... 
doi:10.14569/ijacsa.2020.0110867 fatcat:2lkwnuxyrfbtjgnqdpl5yoqghm

SLA-Based Trust Model for Cloud Computing

Mohammed Alhamad, Tharam Dillon, Elizabeth Chang
2010 2010 13th International Conference on Network-Based Information Systems  
We integrate our previous work "conceptual SLA framework for cloud computing" with the proposed trust management model to present a new solution of defining the reliable criteria for the selection process  ...  In this paper, we present a trust model to evaluate cloud services in order to help cloud users select the most reliable resources.  ...  Fig 1 . 1 SLA-Based Trust Model for Cloud Computing.  ... 
doi:10.1109/nbis.2010.67 dblp:conf/nbis/AlhamadDC10 fatcat:twidfpdbujfsphbjlnhklsd55y

A survey of trust computation models for service management in internet of things systems

Jia Guo, Ing-Ray Chen, Jeffrey J.P. Tsai
2017 Computer Communications  
Our approach is to classify existing trust computation models for service management in IoT systems based on five essential design dimensions for a trust computation model: trust composition, trust propagation  ...  In this paper we survey trust computation models for Internet of things (IoT) systems for the purpose of service management, i.e., whether or not to select an IoT device as a service provider.  ...  For centralized trust computation, a single cloud server will not scale.  ... 
doi:10.1016/j.comcom.2016.10.012 fatcat:4yf6olgmf5fzjafpsw7w2v6yqm

Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions

Wenjuan Li, Jiyi Wu, Jian Cao, Nan Chen, Qifei Zhang, Rajkumar Buyya
2021 Journal of Cloud Computing: Advances, Systems and Applications  
This paper carries out a comprehensive survey on blockchain-based trust approaches in cloud computing systems.  ...  The traditional cloud trust model usually adopts a centralized architecture, which causes large management overhead, network congestion and even single point of failure.  ...  Phases, taxonomy and review of Blockchain-based trust approaches In this section, we provides a comprehensive review on the blockchain-based trust approaches for credible interactions in cloud computing  ... 
doi:10.1186/s13677-021-00247-5 fatcat:ncwagc2rhzgrxfrc4u3kabel4i

Trust as a facilitator in cloud computing: a survey

Sheikh Habib, Sascha Hauke, Sebastian Ries, Max Mühlhäuser
2012 Journal of Cloud Computing: Advances, Systems and Applications  
for trust and reputation models (or systems) to support the consumers in establishing trust on Cloud providers.  ...  This paper provides a landscape and discusses incentives and hindrances to adopt Cloud computing from Cloud consumers' perspective.  ...  Acknowledgements This work is supported by Center for Advanced Security Research Darmstadt (CASED).  ... 
doi:10.1186/2192-113x-1-19 fatcat:pgnqlqjq7rgetn3mwppipg5ere

Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing

Jie Yuan, Erxia Li, Chaoqun Kang, Fangyuan Chang, Xiaoyong Li
2019 Information  
This new network architecture model can deliver services directly from the cloud to the very edge of the network while providing the best efficiency in mobile networks.  ...  Mobile edge computing (MEC) effectively integrates wireless network and Internet technologies and adds computing, storage, and processing functions to the edge of cellular networks.  ...  Acknowledgments: The authors would like to convey their heartfelt gratitude to the reviewers and the Editor for the valuable suggestions and important comments, which greatly helped them to improve the  ... 
doi:10.3390/info10080259 fatcat:zu5n2i3enjczxbbkhr2x3ptg54

Towards Analyzing Data Security Risks in Cloud Computing Environments [chapter]

Amit Sangroya, Saurabh Kumar, Jaideep Dhok, Vasudeva Varma
2010 Communications in Computer and Information Science  
We also propose a risk analysis approach that can be used by a prospective cloud service for analyzing the data security risks before putting his confidential data into a cloud computing environment.  ...  There is a growing trend of using cloud environments for ever growing storage and data processing needs.  ...  [7] have build a trust model in a distributed computing paradigm.  ... 
doi:10.1007/978-3-642-12035-0_25 fatcat:puz37ho4tfeipop3ievybibbeu

A High-Reliability Trust Management System in Cloud Computing [chapter]

Salah T. Alshammari, Aiiad Albeshri, Khalid Alsubhi
2021 Prime Archives in Symmetry  
I would like to thank my parents who made all of this possible, for their endless love, support and patience. They have been always there for me whenever I needed them.  ...  All praises to Allah and His blessing for the completion of this work. I thank God for all the opportunities, trials and strength that have been showered on me to finish writing this manuscript.  ...  In this research, we propose a design that allows a trust model to be integrated with a cloud storage system that uses a cryptographic T-RBAC approach.  ... 
doi:10.37247/pasym.1.2021.14 fatcat:vl4naxpccrdyvpxdlec5epygma

Cross-tenant trust models in cloud computing

Bo Tang, Ravi Sandhu
2013 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)  
Considering the on-demand self-service feature intrinsic to cloud computing, we propose a formal cross-tenant trust model (CTTM) and its role-based extension (RB-CTTM) integrating various types of trust  ...  As cloud computing evolves we anticipate there will be increased need for tenants to collaborate across tenant boundaries.  ...  While these approaches are suitable for specific aspects of cloud computing, there remains need for a general model of cross-tenant access control.  ... 
doi:10.1109/iri.2013.6642463 dblp:conf/iri/TangS13 fatcat:ihasent7enei7g4v4z3m5ufmoa

Trust management of services in cloud environments

Talal H. Noor, Quan Z. Sheng, Sherali Zeadally, Jian Yu
2013 ACM Computing Surveys  
We present a generic analytical framework that assesses existing trust management research prototypes in cloud computing and relevant areas using a set of assessment criteria.  ...  Open research issues for trust management in cloud environments are also discussed.  ...  We express our gratitude to the anonymous reviewers for their comments and suggestions which have greatly helped us to improve the content, quality, organization, and presentation of this work.  ... 
doi:10.1145/2522968.2522980 fatcat:tyajkolhxfb6fpeidafgjdcxkm

Modeling and simulation as a cloud service: A survey

Erdal Cayirci
2013 2013 Winter Simulations Conference (WSC)  
MSaaS is a model for provisioning modelling and simulation (M&S) services on demand from a cloud service provider (CSP), which keeps the underlying infrastructure, platform and software requirements/details  ...  Virtualization and cloud computing have already been used as infrastructure and platform both for military and civilian modelling and simulation (M&S) (Cayirci 2011).  ...  In cloud computing, the term "federation" is used not only for federating models but also for infrastructure or platforms, and therefore a federation may also mean a cloud service that integrates various  ... 
doi:10.1109/wsc.2013.6721436 dblp:conf/wsc/Cayirci13 fatcat:bqlqprl6ozf2xb3l6mj5pwivju
« Previous Showing results 1 — 15 out of 56,054 results