Effective third party auditing in cloud computing

11Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing is the next phase in the Internet's evolution, providing the means through which computing power, computing infrastructure, applications, business processes can be delivered to businesses and individual as a service wherever and whenever they need. Businesses who use cloud service providers (CSP) tend to have service level agreements (SLA) that act as contract and define the level of expected service from the CSP, including availability, performance and security. Recent research suggests the use of third party auditors (TPA) as a mean to monitor CSPs. This paper shows how CSP may deceit the SLA to reduce their cost and become more competitive, while avoiding detection by TPAs. The paper presents a crowdsourced TPA model to monitor the CSPs and consequently detect any deception. © 2014 IEEE.

Cite

CITATION STYLE

APA

Hussain, M., & Al-Mourad, M. B. (2014). Effective third party auditing in cloud computing. In Proceedings - 2014 IEEE 28th International Conference on Advanced Information Networking and Applications Workshops, IEEE WAINA 2014 (pp. 91–95). IEEE Computer Society. https://doi.org/10.1109/WAINA.2014.158

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free