Skip to main content
Erschienen in: Wireless Personal Communications 4/2021

06.09.2020

Trust Based Approach and Risk Management for IT Systems in Cloud Service Selection

verfasst von: Sreejith Gopalakrishnan, P. Alli

Erschienen in: Wireless Personal Communications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing, which is amidst the new approaching fields of computers. There is a boom of this technology at present which can be easily seen as every organization outsource for most resources. As everyday life is known as, ranging from business applications to commercial functions, from students to professionals, the Cloud is giving uncountable advantages to users. Organizations often have concerns about the migration and utilization of cloud computing due to the loss of control over their outsourced resources, and cloud computing is vulnerable to risks. As per financial aspects, persons move to the cloud area because of their works, but security and privacy for data remain to be questionable. Hiding information related to trade and business bargains is utmost important as it might give a substantial profit or loss as the critical information may go too wrong hands. This paper focuses on the risk management frameworks for cloud computing and to the comparison between them to determine the strengths and weakness of each techniques. The proposed system deployed trust evaluation model in different conditions to reduce the complex evaluation procedures, while a substantial improvement recorded with the consideration of risk assessment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abbadi, I. M., & Alwaneh, M. (2012). A framework for establishing trust in cloud. Elsevier Computers and Electrical Engineering, 3, 1073–1087.CrossRef Abbadi, I. M., & Alwaneh, M. (2012). A framework for establishing trust in cloud. Elsevier Computers and Electrical Engineering, 3, 1073–1087.CrossRef
2.
Zurück zum Zitat Aljazzaf, Z., Carpretz, A., & Perry, M. (2011). Trust bootstrapping services and service providers. In Proceedings of 9th annual international conference on privacy, security and trust, PST (no. 3, pp. 7–15). Aljazzaf, Z., Carpretz, A., & Perry, M. (2011). Trust bootstrapping services and service providers. In Proceedings of 9th annual international conference on privacy, security and trust, PST (no. 3, pp. 7–15).
3.
Zurück zum Zitat Amir, M. T., Rodziah, R., & Masrah, A. A. (2015). Towards a comprehensive security framework of cloud data storage based on multi-agent system architecture. Journal of Information Security, 10(1), 118–131. Amir, M. T., Rodziah, R., & Masrah, A. A. (2015). Towards a comprehensive security framework of cloud data storage based on multi-agent system architecture. Journal of Information Security, 10(1), 118–131.
4.
Zurück zum Zitat Jøsang, A. (2001). A logic for uncertain probabilities. International Journal of uncertainty, Fuzziness and Knowledge-Based Systems, 9(03), 279–311.MathSciNetCrossRef Jøsang, A. (2001). A logic for uncertain probabilities. International Journal of uncertainty, Fuzziness and Knowledge-Based Systems, 9(03), 279–311.MathSciNetCrossRef
5.
Zurück zum Zitat Chunsheng, Z., Hasen, N., Victor, C. L., & Laurence, T. Y. (2015). An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Transactions on Information Forensics and Security. Chunsheng, Z., Hasen, N., Victor, C. L., & Laurence, T. Y. (2015). An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Transactions on Information Forensics and Security.
6.
Zurück zum Zitat CSA. (2015). Cloud adoption practices and priorities survey report. Cloud Security Alliance, 39(1). CSA. (2015). Cloud adoption practices and priorities survey report. Cloud Security Alliance, 39(1).
7.
Zurück zum Zitat CSA. (2014). Cloud usage: Risks and opportunities report. Cloud Security Alliance. CSA. (2014). Cloud usage: Risks and opportunities report. Cloud Security Alliance.
8.
Zurück zum Zitat Daskalakis, C., Goldberg, P., & Papadimitriou, C. (2009). The complexity of computing Nash euilibrium. SIAM Journal on computing, 29(1), 195–259.CrossRef Daskalakis, C., Goldberg, P., & Papadimitriou, C. (2009). The complexity of computing Nash euilibrium. SIAM Journal on computing, 29(1), 195–259.CrossRef
10.
Zurück zum Zitat David, K. (1998). Choice under partial uncertainty. International Economic Review, 34, 297–308.MATH David, K. (1998). Choice under partial uncertainty. International Economic Review, 34, 297–308.MATH
11.
Zurück zum Zitat Malar, E., & Gauthaam, M. (2020). Wavelet analysis of EEG for the identification of alcoholics using probabilistic classifiers and neural networks. International Journal of Intelligence and Sustainable Computing, 1(1), 3.CrossRef Malar, E., & Gauthaam, M. (2020). Wavelet analysis of EEG for the identification of alcoholics using probabilistic classifiers and neural networks. International Journal of Intelligence and Sustainable Computing, 1(1), 3.CrossRef
12.
Zurück zum Zitat Bertino, E. (2014). A roadmap for privacy-enhanced secure data provenance. Journal of Intelligent Information Systems, 43(3), 481–501.CrossRef Bertino, E. (2014). A roadmap for privacy-enhanced secure data provenance. Journal of Intelligent Information Systems, 43(3), 481–501.CrossRef
13.
Zurück zum Zitat Gokulnath, K., & Rhymend, U. (2014). Fair-trust evaluation approach for cloud environment. Communications in Computer and Information Science, 2995, 81–91.CrossRef Gokulnath, K., & Rhymend, U. (2014). Fair-trust evaluation approach for cloud environment. Communications in Computer and Information Science, 2995, 81–91.CrossRef
14.
Zurück zum Zitat Imad, M. A., & Muntaha, A. (2012). A framework for establishing trust in the cloud. Computers and Electrical engineering', 14(2), 1073–1087. Imad, M. A., & Muntaha, A. (2012). A framework for establishing trust in the cloud. Computers and Electrical engineering', 14(2), 1073–1087.
15.
Zurück zum Zitat Ishmanov, K., & Kim, S. (2014). A secure trust establishment in wireless sensor networks. In International conference on electrical engineering and informatics (ICEEI) (pp. 154–162). Ishmanov, K., & Kim, S. (2014). A secure trust establishment in wireless sensor networks. In International conference on electrical engineering and informatics (ICEEI) (pp. 154–162).
16.
Zurück zum Zitat Josang, A., & Lo, P. (2004). Analyzing the relationship between risk and trust in trust management. Lecture Notes in Computer Science, 11(4), 135–145.CrossRef Josang, A., & Lo, P. (2004). Analyzing the relationship between risk and trust in trust management. Lecture Notes in Computer Science, 11(4), 135–145.CrossRef
17.
Zurück zum Zitat Kannan, G., & Prasant, M. (2012). Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Communications Surveys and Tutorials, 36(1), 279–298. Kannan, G., & Prasant, M. (2012). Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Communications Surveys and Tutorials, 36(1), 279–298.
18.
Zurück zum Zitat Lin, G., Wang, D., Bie, Y., & Lei, M. (2014). MTBAC: A mutual trust based access control model in Cloud computing. China Communications, 11(4), 154–162.CrossRef Lin, G., Wang, D., Bie, Y., & Lei, M. (2014). MTBAC: A mutual trust based access control model in Cloud computing. China Communications, 11(4), 154–162.CrossRef
19.
Zurück zum Zitat Ko, R., Jagadramana, P., Mowbray, M., Pearson, S., Kirchberg, M., & Liang, Q. (2011). Trust cloud: A frame for accountability and trust in cloud computing (pp. 4–9). Washington: World Congress on Services, IEEE. Ko, R., Jagadramana, P., Mowbray, M., Pearson, S., Kirchberg, M., & Liang, Q. (2011). Trust cloud: A frame for accountability and trust in cloud computing (pp. 4–9). Washington: World Congress on Services, IEEE.
20.
Zurück zum Zitat Krantz, S. (1999). Jensen's Inequality. In Handbook of complex variables (p. 118). Boston: Birkhauser. Krantz, S. (1999). Jensen's Inequality. In Handbook of complex variables (p. 118). Boston: Birkhauser.
21.
Zurück zum Zitat Selvaraj, J., & Mohammed, A. S. (2020). Mutation-based PSO techniques for optimal location and parameter settings of STATCOM under generator contingency. International Journal of Intelligence and Sustainable Computing, 1(1), 53.CrossRef Selvaraj, J., & Mohammed, A. S. (2020). Mutation-based PSO techniques for optimal location and parameter settings of STATCOM under generator contingency. International Journal of Intelligence and Sustainable Computing, 1(1), 53.CrossRef
22.
Zurück zum Zitat Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., & Leaf, D. (2011). NIST cloud computing reference architecture. NIST Special Publication (pp. 13–14), 500–292. Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., & Leaf, D. (2011). NIST cloud computing reference architecture. NIST Special Publication (pp. 13–14), 500–292.
Metadaten
Titel
Trust Based Approach and Risk Management for IT Systems in Cloud Service Selection
verfasst von
Sreejith Gopalakrishnan
P. Alli
Publikationsdatum
06.09.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07796-z

Weitere Artikel der Ausgabe 4/2021

Wireless Personal Communications 4/2021 Zur Ausgabe

Neuer Inhalt