A Trust Based Approach for Security and User Confidence in Pervasive Computing Systems

Authors

  • S. Sivakumar  Ph.D Research Scholar, Sree Saraswathi Thiyagaraja College Pollachi, Tamil Nadu, India
  • V. Anuratha  Head, PG Department of Computer Science Sree Saraswathi Thiyagaraja College, Pollachi, Tamil Nadu, India

Keywords:

Resource Allocation, SaaS, PaaS, IaaS, Load Balancing

Abstract

Cloud computing has turned into a piece of the focused market today. Numerous associations make utilization of cloud administrations. As the cloud computing administrations is developing and picking up prominence, the dread about the use of cloud administrations is as yet an open issue. Different issues are distinguished in the writing; one of which is security. Security hazards in the territory of cloud computing has pulled in consideration since its start. New conventions and instruments are dependably sought after to improve the safety effort by a cloud computing administration. Different cloud computing specialist co-ops are accessible with their administrations in the cloud condition. These administrations have different determinations, highlights and techniques for accomplishing security. Strategies received by different suppliers to accomplish security are of fluctuating nature. A cloud client may choose an administration in view of his prerequisite and level of security gave by the administration. To break down a specific administration in view of its different security properties is a test. Measure of security and believing a cloud benefit is a test. A trust display measures the security quality and figures confide in esteem. Trust esteem is a measure of different parts of security like validation, approval and so forth that are vital for estimating security. Trust esteem speaks to different parameters that are critical measurements along which security of cloud administrations can be estimated. These parameters rely upon sub-parameters and functionalities that are quantifiable. Since this model depends on moderately static data, for example, sort of encryption calculation utilized, this trust demonstrate gives static esteems. Cloud benefit particulars and highlights are removed to compute the security of an administration as far as static parameters and named as static trust.

References

  1. Abdul rahman and A. Almutairi, "A Cloud Access Control Architecture for Cloud Computing", 9(2), 2012.
  2. ACM. Fong, Baoyao Zhou, Hui S.C., Hong G.Y. and The Anh Do, "Web Content Recommender System based on Consumer Behavior Modeling", IEEE Transactions on Consumer Electronics, 57(2), 2011.
  3. Anuj Sehgal, "Introduction to OpenStack", 6th International Conference on Autonomous Infrastructure, Management and Security, 2012.
  4. Arshad J, Townend P and Jie Xu, "Quantification of Security for compute Intensive Workloads in Clouds", 15th International Conference on Parallel and Cloud Systems, School of Computation, Pp. 478-486, 2009.
  5. Artur A, Kondo D and Anderson D P, "Exploiting Non-Dedicated Resources for Cloud Computing", IEEE Network Operations and Management Symposium, PP. 341-348, 2012.
  6. At&T Cloud Architect, Downloaded from http://cloudarchitect.att.com/Home.
  7. Awang, N.F.B, "Trusted Computing - Opportunities & Risks", 5th International Conference on Collaborative Computing: Networking, Applications and Work sharing, Pp.1-5, 2009.
  8. Barsoum, A. and HASAN A, "Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems",IEEE Transactions on Parallel and Cloud Systems, 2012.
  9. J Basu and V Callaghan, "Towards A trust based Approach to Security and User Confidence in pervasive computing Systems", The IEE International Workshop on Intelligent Environments, Pp. 223 – 229, 2005.
  10. Azzedine Boukerche, Yonglin Ren, "A trust-based security system for ubiquitous and pervasive computing environments", Commputer communications, 2008.
  11. B. Johnson and YanzhenQu, "A Holistic Model for Making cloud Migration Decision", IEEE International Symposium on Parallel and Cloud Processing with Applications, 2012.
  12. Carl Almond, "A Practical Guide to Cloud Computing Security" http://www.avanade.com/Documents/Research%20anad%20Insights/practicalguidetocloudcomputingsecurity 574834.pdf, August 2009.
  13. Chunxiao Li, Anand Raghunathan and Niraj K. Jha, "A Trusted Virtual Machine in an Un-trusted Management Environment" IEEE Transaction on Service Computing, 5(4), Pp. 1-12, 2011.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
S. Sivakumar, V. Anuratha, " A Trust Based Approach for Security and User Confidence in Pervasive Computing Systems, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 4, pp.480-488, March-April-2018.