Cloud computing helps organizations to dynamically increase the resource needs as and when needed, without the need to purchase them. Security is a basic concern in cloud computing, and threats can occur both internally and externally. Users can access the cloud infrastructure for software, operating system and network infrastructure provided by the Cloud Service Providers (CSP). Evaluating the user behavior in the cloud computing infrastructure is becoming more and more important for both Cloud Users (CSs) as well as Cloud Service Providers The CSPs must ensure the safety of users accessing the cloud. Since user authentication alone is not enough to ensure the safety of users, user behavior trust plays a critical role in ensuring the authenticity of the user as well as safety. In this paper, we present the importance of user behavior in modeling trust, associated evaluation principles and comparison between different trust models.
CITATION STYLE
Alruwaythi, M., Kambampaty, K., & Nygard, K. E. (2019). User behavior and trust evaluation in cloud computing. In Proceedings of 34th International Conference on Computers and Their Applications, CATA 2019 (pp. 378–386). The International Society for Computers and Their Applications (ISCA). https://doi.org/10.29007/q5bd
Mendeley helps you to discover research relevant for your work.