A Faith Organization Scheme Model for Cloud

  • Authors

    • A Vijaya Kumar
    • K Hemanth Kumar
    • J Tajudeen
    • C Suresh
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15388
  • Security, public verifiability, dynamic update, arbitration, fairness, data privacy
  • IT Industries are rapidly migrating their businesses to the cloud architecture. The exponential change is because of elasticity and low-cost services offered by the cloud. The High-performance services offered at low price attract customers to run their businesses on cloud. Other side of the coin Faith on data privacy offered by the cloud is a key issue for every customer. Although the CSP ensure about the privacy and security of the user’s data, but the customer reliability on cloud is still low. This paper briefed the necessity of faith organization scheme, it overviewed various recent works done in this area. The comparative analysis enables us the scope to focus on the lacking of Faith organization on cloud. This paper focuses on various existing techniques "provable data possession" and "evidences of hopelessness" which are used to control this problem to some extent. They will generate static report records and because of this poor reality strong mentor. In addition, threat models in some unspecified time in the future of these plans frequently accept a genuine owner and offer thoughtfulness regarding an untrustworthy cloud task. We proposed a Faith organization scheme to keep customer data safe. This work explains proposed model of faith organization and discuss various open issues in the relative area.

     

  • References

    1. [1] Ali, A., Ahmed, M., Khan, A., Ilyas, M., & Razzaq, M. S. (2017, May). A trust management system model for cloud. In Networks, Computers and Communications (ISNCC), 2017 International Symposium on (pp. 1-6). IEEE.

      [2] S. A. Almulla and C. Y. Yeun, “Cloud computing security management,†in Engineering Systems Management and Its Applications (ICESMA), 2010 Second International Conference on. IEEE, 2010, (pp. 1-7).

      [3] J. A. Colquitt, B. A. Scott, and J. A. LePine, “Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance.†Journal of applied psychology, vol. 92, no. 4, p. 909, 2007.

      [4] X. L. 0003 and J. Du, “Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing,†IET Information Security, vol. 7, no. 1, pp. 39–50, 2013

      [5] Shaikh, Rizwana, and M. Sasikumar. "Trust model for measuring security strength of cloud computing service." Procedia Computer Science 45 (2015): 380-389.

      [6] Tupakula, Udaya, and Vijay Varadharajan. "Trust Enhanced Cloud Security for Healthcare Services." Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on. IEEE, 2014.

      [7] R. C. Mayer, J. H. Davis, and F. D. Schoorman, “An integrative model of organizational trust,†Academy of management review, vol. 20, no. 3, pp. 709–734, 1995.

      [8] H. Mahajan and N. Giri, “Threats to cloud computing security,†in VESIT, International Technological Conference-2014 (I-TechCON), 2014.

      [9] Wang, Yubiao, et al. "Cloud service evaluation model based on trust and privacy-aware." Optik-International Journal for Light and Electron Optics 134 (2017): 269-279.

      [10] T.-S. Chou, “Security threats on cloud computing vulnerabilities,†International Journal of Computer Science & Information Technology, vol. 5, no. 3, p. 79, 2013.

      [11] Kumar, A. Vijaya, et al. "Enhancement of security in cloud computing with secure multi-party computation." International Journal of Engineering & Technology 7.1.1 (2017): 339-341.

      [12] Kumar, A. Vijaya, and L. SS Reddy. "A critical review on application of secure multi party computation protocols in cloud environment." International Journal of Engineering & Technology 7.2.7 (2018): 363-366.

      [13] Clustering algorithms: Available from: https://web.stanford.edu/ class/ cs345a/ slides/12 clustering.pdf, last accessed 2015/2/5.

      [14] Huang,J.and Nicol D, A Formal-Semantics-Based Calculus of Trust in Internet Computing, IEEE ,14(5), pp.38-46(2010).

      [15] Benabied, Saddek, Abdelhamid Zitone, and Mahieddine Djoudi. "A cloud security framework based on trust model and mobile agent." Cloud Technologies and Applications (CloudTech), 2015 International Conference on. IEEE, 2015.

      [16] Flavio Corradini, Francesco De Angelis, Fabrizio Ippoliti and Fausto Marcantoni, A Survey of Trust management models for cloud computing in 5th International Conference on Cloud Computing and Services Science, Lisbon, Portugal, pp.155-162 (2015)

      [17] A. Josang, R., Ismail and C. Boyd (2007), A survey provision, Decision Support Systems., 4 (2), pp. 618-644. (2007)

  • Downloads

  • How to Cite

    Vijaya Kumar, A., Hemanth Kumar, K., Tajudeen, J., & Suresh, C. (2018). A Faith Organization Scheme Model for Cloud. International Journal of Engineering & Technology, 7(2.32), 139-142. https://doi.org/10.14419/ijet.v7i2.32.15388