User behavior and trust evaluation in cloud computing

4Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Cloud computing helps organizations to dynamically increase the resource needs as and when needed, without the need to purchase them. Security is a basic concern in cloud computing, and threats can occur both internally and externally. Users can access the cloud infrastructure for software, operating system and network infrastructure provided by the Cloud Service Providers (CSP). Evaluating the user behavior in the cloud computing infrastructure is becoming more and more important for both Cloud Users (CSs) as well as Cloud Service Providers The CSPs must ensure the safety of users accessing the cloud. Since user authentication alone is not enough to ensure the safety of users, user behavior trust plays a critical role in ensuring the authenticity of the user as well as safety. In this paper, we present the importance of user behavior in modeling trust, associated evaluation principles and comparison between different trust models.

Cite

CITATION STYLE

APA

Alruwaythi, M., Kambampaty, K., & Nygard, K. E. (2019). User behavior and trust evaluation in cloud computing. In Proceedings of 34th International Conference on Computers and Their Applications, CATA 2019 (pp. 378–386). The International Society for Computers and Their Applications (ISCA). https://doi.org/10.29007/q5bd

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free