Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Resolving problem of Trust context in Cloud Computing

Author : Shakti Arora 1 Surjeet Dalal 2

Date of Publication :29th January 2018

Abstract: Trust is the biggest concern in the services provided by cloud computing. Data is completely outsourced and processed on the remote machines. Data owner could be as ingle user or organization that owns the outsourced data. Risk increases due to unknown locations and machines storing and processing the data, No physical control and no information about the processing entities decreases the confidence of data owner in cloud computing. Issues like data distribution, data access, and data management over vulnerable paths lack mechanism in the favour of the data owner.There is no such mechanism which allows the data owner to sense & control the privacy of data. The threat also increases when data is replicated at a number of machines. We are trying to improve the trust by launching improved integrity algorithms. That will increase the confidence of data owner on the cloud with the inclusion of the external entity, which is providing the assurance of security auditing and preventing the unauthorized use of data. Our experimental results are derived from the comparison of possible existing solutions.

Reference :

    1. P. Mell, "What's Special about Cloud Security?," IT Professional, vol. 14, pp. 6-8, 2012.
    2. S. Sakr, et al., "A Survey of Large Scale Data Management Approaches in Cloud [3].Environments," Communications Surveys & Tutorials, IEEE, pp. 1-26, 2011.
    3. Zhang, et al., "Cloud Computing Research and Development Trend," 2010, pp. 93-97
    4. H. Chang and E. Choi, "Challenges and Security in Cloud Computing," Communication andNetworking,pp.214-217,2010.
    5. A. Gupta, "Cloud computing growing interest and related concerns," in 20I0 2nd International Conference on Computer Technology and Development (ICCTD 2010) 2010, pp.462-465.
    6. S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 34, pp. 1-11, 2011.
    7. F. J. Krautheim, "Private virtual infrastructure for cloud computing," in Proceedings of the 2009 conference on Hot topics in cloud computing, USENIX Association, 2009, pp. 5-5.
    8. X. Y. Li, et al., "A trusted computing environment model in cloud architecture," in Ninth International Conference on machine Learning and Cybernetics, Qingdao, 2010, pp. 2843-2848.
    9. H. Chen, et al., "TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing," Security Protocols XVI, pp. 107-114, 2011.
    10. Kashif, et al., "Distriuted Trust for IAAS Cloud," in 20I5 12th international conference (IBCAST)IEEE 978-1-47099-6369
    11. Jingwei Li, et al., “secure auditing and deduplicating data in cloud”in IEEE transaction 00180- 93409c0-2015.
    12. F. Vahya , et.al,”Security challenges in cloud storagre” in “6th international conference on cloud computing technology and science”@IEEE 2014.
    13. Ganzales et.al , “Cloud-Trust-:- A security assessment model for infrastructure as service(Iaas) clouds” in IEEE transaction. DOI 10.11091/TCC.2015.2415794.
    14. Jiawei Yaun et al, “Public Integrity auditing for dynamic data sharing with multi user modification”in IEEE transaction on information forensic and security , Volume-10, n0-8 aug-2015
    15. Sawan u. Bhagal , “A survey for secure communication of data and third party authentication”in IEEE sponsored 2nd international conference on electronic communication System(ICECS-2015)

Recent Article