User Level Trust Evaluation in Cloud Computing

  • Bendale Y
  • Shah S
N/ACitations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

The cloud computing is a hot research area, because of its good features such as low investment, easy maintenance, flexibility, fast deployment and reliable service. At the same time, cloud computing can also reduce operating costs. The issue of trust is one of the biggest obstacles for usage of cloud computing. Today, one of the most important factors for the success of cloud computing is to build trust and security. Trust in cloud computing has a lot of issues like control, prevention, ownership and security.In this paper we have addressed the issue of trust in cloud computing. In cloud computing, users directly use and operate the software and operating system, and even basic programming environment and network infrastructure. So the impact and destruction for the software and hardware cloud resources in cloud computing are worse than the current internet users. Therefore, it is necessary to evaluate user's trustworthiness. So for evaluating the user level trustworthiness,we have defined policy based user level trust is evaluated. The User is categorized into different categories based on the user level trust value, number of policies violated and number of warnings received. This trust evaluation helps us to monitor the abnormal behavior of the user. Depending upon the user behavior, cloud service provider can restrict the user from accessing the cloud resources and also the user can be blacklisted.

Cite

CITATION STYLE

APA

Bendale, Y., & Shah, S. (2013). User Level Trust Evaluation in Cloud Computing. International Journal of Computer Applications, 69(24), 31–35. https://doi.org/10.5120/12122-8376

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free