Trust Management Techniques, Models and Attacks in Cloud

  • Birje* M
  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing is a technology that promises resilient and flexible computing resources to the growing business. Along with many benefits of Cloud computing, there are various complex problems such as security and privacy of data that exists on Cloud. Trust is one of the key obstacles in the adoption of Cloud by the growing market due to absence of any reliable and efficient trust evaluation mechanism. It is difficult task for Cloud consumers to choose trustworthy provider among various service providers who provide similar type of services. There is a need to have - proper techniques/methods to establish trust; proper trust based models to evaluate the trust; and awareness of various possible attacks to know the robustness of the models. Hence this paper discusses existing state of the art trust management techniques, models and attacks, to help research community interested in designing trust based schemes in Cloud environment.

Cite

CITATION STYLE

APA

Birje*, M. N., & Hallappanavar*, V. L. (2019). Trust Management Techniques, Models and Attacks in Cloud. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 2647–2655. https://doi.org/10.35940/ijrte.d7273.118419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free