SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. 1 (May – Jun. 2015), PP 66-70
www.iosrjournals.org
DOI: 10.9790/0661-17316670 www.iosrjournals.org 66 | Page
Analyzing and Surveying Trust In Cloud Computing
Environment
Kavita Rathi1,
Sudesh Kumari2.
Assistant Professor, CSE Department,
Deenbandhu Chhotu Ram University of Science & Technology, Murthal.
Student, M.Tech(CSE),
Deenbandhu Chhotu Ram University of Science & Technology, Murthal.
Abstract: Cloud computing is the most discussed research area now-a-days which helps to provide elasticity
and flexibility in using the computing resources and services to fulfill the requirement of current businesses.
Besides many advantages offered by cloud computing, it deals with many obstacles in the path of its growth,
that are security issues, data privacy issues and distrust on cloud service providers (CSP). Trust is found to be
an essential element for achieving security and confidence in the use of distributed computing. Various issues
like data control, ownership, data integrity and security can be considered as important parameters of trust.
This paper addresses the existing trust models for trust establishment in cloud services and also tries to find out
the shortcomings of these models.
Keywords- Trust, Issues of Trust, Trust Models, User Based Trust Models.
I. Introduction
Cloud Computing is a model for enabling ubiquitous, convenient, on-demand network access to shared
pool of configurable computing resources (network, server, storage, application and services) that can rapidly
provisioned and released with minimum management effort or service provider interaction[1]-[3]. It comes up
with several advantages in distributed computing environments and operates on a virtualized and “pay-as-you-
go” economic model [4], it also brings various challenges in its adoption. Trust is found to be one of the major
challenges in the adoption of cloud computing as distrust prevents the consumers from its wide use and distrust
comes out most because consumers do not have a direct control over their data lying on the cloud. This is the
reason why evaluation of trust is critical. Trust has many dimensions, multiple faces and is also
multidisciplinary and hence it is very difficult to give a proper definition to it. This paper is organized in the
sections as described. The first section presents the theory for the need of trust in the cloud services, followed by
the sections focusing on trust issues and existing trust models along with their shortcomings in trust
establishment.
II. Need Of Trust
Trust is a social problem, not a purely technical issue [5]. Trust is viewed as a measurable belief that
utilizes experience to make trustworthy decisions [6]. The cloud service users (CSU) always have to keep trust
on the cloud service providers (CSP) and the CSPs have to keep trust on the CSUs for a healthy establishment of
cloud services. In the cloud computing scenarios the CSUs give all their digital resources in the hands of the
CSPs and the CSPs hold direct control over almost all the security factors. This is the reason why a CSP has to
confer a proper level of trust to the cloud service users. The component of trust is an essential element in the
wide use and implementation of cloud services. The relationship of trust is established between the two parties
which are stated as trustor and trustee. The trustor is the person or entity who holds confidence, belief,
reliability, integrity and ability, etc. of another person or thing which is the object of trust, i.e. the trustee [7]. As
per the previous study, following trust characteristics are found:-
 Trustor and Trustee[8]
The trust relation is formed by the trustor that is the trusting party and the trustee that is the party which
is to be trusted. The development of trust is based on the ability of the trustee to act in the best interest of the
trustor and degree of trust that the trustor places on the trustee [8].
 Susceptible to attack
Trust is found to be important in the computing environments where there are more possibilities of risk,
data losses, vulnerabilities and uncertainty. Due to this reason trust is important in cloud computing
environments. A trustor depends on the trustee for not exploiting and misusing his vulnerabilities.
Analyzing And Surveying Trust In Cloud Computing Environment
DOI: 10.9790/0661-17316670 www.iosrjournals.org 67 | Page
 Produced actions[8]
Trust between the trustor and trustee leads to various behavioral changes in the actions of the CSUs.
Trust allows the CSUs to take risk and allow their private data to be shared on the cloud. It may also allow the
CSUs to continue the use of services of the cloud on a regular basis.
 Subjective Nature
Trust is subjective and every individual or enterprise has their own opinions towards the follow up of
any technology. Hence there are different requirements of every CSU to judge the trust level of a particular
CSP.
III. Trust Issues
There are many aspects of trust in the cloud computing environment based on the CSPs view and the
CSUs view. Trust is very important for building relationships between CSUs and CSPs. There are several issues
of trust which are categorized by considering following factors:-
 How can trust be defined and evaluated in the cloud computing scenarios.
 How malicious information can be handled in temporary and dynamic cloud relationships.
 How to consider and provide different security levels according to trust degree [6].
 How to manage trust degree change with temporary and dynamic relationships [6].
As per the researchers Ankush Dhiman, Mauli Joshi, Wayne A. Jansen, several trust issues are found, a few are
stated below:-
1. Access by Insiders: All the data of the CSUs is stored to the data centers of the CSPs and then the storing
and processing of data depends purely on the service providers. The employees of the service providers could
see and process the data as they want and there is always high risk of data access by insiders. They could make
changes or modifications to the data. Denial of service attack, and creation of 20 account and instance to each
account launched a Virtual machine for each and again process continued, to set the resource beyond the limit
are some special cases of the malicious insider attack[3]. It is one of the examples of such attacks studied in the
Amazon Elastic Compute Cloud (EC2)[3].
2. Nesting of Services: This issue includes the use of two or more CSPs. This means that a software as a service
provider uses the services of platform as a service provider and platform as a service provider uses another
infrastructure as a service provider. In this way, there are multiple levels of hiring and renting the services in a
cloud. Liability and performance guarantees are the serious issues that come into account with the composite
cloud services [1][3]. An example of such type is LinkUp which is an online storage service which leaded to the
loss of access to the significant data of its 20,000 customers [1][3]. It happened because another company
named Nirvanix hosted the data for LinkUp and another company named Savvis hosted the application and
database for Nirvanix [1][3]. In these situations there is no provider to take responsibility for losses of data and
hence this becomes one of the major issues of establishing trust on third party distributers of the cloud services.
3. Degree of Exposure: This issue deals with the level of visibility provided by the CSPs to the CSUs. The
detailed network and system, network and storage level monitoring should be implemented for gaining visibility
into the security controls and processes employed by the CSP along with their performance over time [3].
4. Risk: Assessing and managing risk in systems using cloud services is again a challenge to be taken.
Sometimes consumers are ready to take risk if the control over processes and equipment is towards their end.
But in case of cloud services the scenario changes as the control varies. The trust is based on the amount of
direct control that any organization is capable of applying on the CSP’s with regard to the security employed for
the protection of services [3]. Verifying the correct functioning of the system along with the security controls is
an important aspect of establishing trust in the cloud services [3]. Risk management and assessment must be
detailed and should be done properly in a cloud based implementation.
IV. Trust Models In Cloud
Trust is the most complex relationship among entities, because it is subjective and difficult to be
evaluated [9]. Trust models are considered as a methodology that helps to evaluate trust on the CSP’s or the
third party distributers that are providing the cloud services. Trust models in Cloud computing are very diverse
in a way that each model supports different features and evaluates Cloud services on the basis of different
parameters and requirements [10].
Analyzing And Surveying Trust In Cloud Computing Environment
DOI: 10.9790/0661-17316670 www.iosrjournals.org 68 | Page
Figure 1[11] states the various trust models that have been proposed based on the functionality of their
evaluation criteria among different levels of services provided by the cloud computing environments.
Figure1 [11]. Trust Models in Cloud Computing
Abbreviations used in Figure1 denote the following:-
SLA: Service Level Agreement
TVEM: Trusted Virtual Environment Module
PLT: Prepositional Logic Terms
There are various trust models that can be seen in the diagram stated above. Out of these this paper
focuses on the study of user behavior based trust models as basically when we think of trust it is only about the
consumer trusting the CSP but it is equally important to judge the user for its trustworthiness for using the cloud
services. In cloud computing, due to users directly use and operate the software and operating system, so the
impact and destruction for the software and hardware cloud resources are worse than the current internet users
who use it to share resources [12]. This makes it important to check the user for its reliability to provide access
to the use of cloud resources and also keep track of the fact that the feedback comes out from correct and
authenticated group of CSUs. Trust is found to be two way which deals with trust from both the CSUs on CSPs
and vice versa.
Some of the reasons that lead to distrust in the use of cloud services are:-
 Risk of data leaks.
 Security risks of stored data location.
 Risk of data to be investigated.
 Interruptions in cloud services.
 Risk of data damage.
 Risk of collapse of the CSP.
These reasons focus on the trust of the CSU on the CSP. Though the consumers trust the CSPs for their
work, it does not ensure the safety of data as the consumer may also be malicious. It is very important to detect
such kind of CSUs and not allow them to use the cloud services. They could make fake identifications and be in
the cloud and put some malicious data to the cloud which could lead to the blockage of various cloud services to
other CSUs. The possible reasons leading to user behavior mistrust are [14]:-
 Destructive behavior by individuals towards their business counterparts or commercial competitors or some
persons.
 Damage to the cloud resources consisting of software services, platform services, infrastructure and
hardware services by the errors caused by users or in configurations.
 Detection of malicious code or software in the cloud.
Analyzing And Surveying Trust In Cloud Computing Environment
DOI: 10.9790/0661-17316670 www.iosrjournals.org 69 | Page
 Errors in the authentication and identification of users.
Whatever is the reason of mistrust in CSU, there must be proper monitoring by the CSP on the
behavior of CSUs so that it could be ensured that the cloud services are only used by the trustworthy users.
Cloud computing model brings some new security threats such as resource sharing, fate sharing, and data lock in
[13]. These risks are sources of concern for users and prevent them from using cloud computing [13]. Due to
these kinds of risks, the CSPs have to keep concern for the CSUs to provide them with a trustworthy cloud
environment. Several researchers have given many elements of trust that are useful in identifying the CSUs’
trust in the use of cloud services. As formulated in [13]-[16], following trust elements of CSUs are compiled as
given below:-
 Location of stored data: In the cloud environments, data can be stored anywhere and the CSUs are not
aware of the physical location of data which is a concern of trust.
 Data to be investigated: The data is shared and stored at different locations hence it becomes very difficult
to convince the CSUs against any unnecessary action to be taken on their data by anyone.
 Sharing of data: How the data is distributed over the cloud and how it is protected is a major concern for
the CSUs.
 Availability of Services: The cloud services must be available to the CSUs whenever they want and they
must be available round the clock.
 Long-term Viability: CSUs want their data to be available and viable to them for long and hence they want
that the CSP must not go down and nothing wrong should happen to their data. Ideally, cloud computing
provider should never go broke or get acquired by a larger company. But user must be assured about the
data will remain available even after such an event [13].”
 Compliance regulation and audit: Compliance includes correspondence of the appearance of the
constitute specifications, standards and Law [6]. These laws, rules and regulations for security and privacy
differ from location to location [6]. Each country, state, local bodies have their own rules and regulation. So
the compliance is one of the most important issues in cloud computing [6].
 Back up of data and Recovery: A CSP must have the techniques to recover data losses in case of any
disaster or any other circumstance that may lead to loss of data.
 Access privileges to the Users: CSPs must have a proper mechanism to assign the access privileges to
different kinds of users in the cloud data center and access control of data must be civilized and
authenticated.
 Governance: The cloud resources are spread and shared all over the globe and hence it is very important to
decide the protocols and governing body of the CSPs is working independent of the political conditions of a
particular country.
 Transparency: The CSP should display the relevant information about its policies and conditions for using
the cloud services and these should be transparent to the CSUs through a proper design of its web interface
and graphics. Also the CSPs must communicate with the CSUs through video conferencing or other
communication media while assigning the resources to a CSU. The transparent way of customer dealing by
a CSP will help the CSP to gain more user confidence and trust.
These are some of the major trust elements that are useful for the CSUs to evaluate trust of the CSPs.
The CSPs that provide more information about all these elements are found to be trustworthy and their services
are considered to be used by more CSUs. Only the trust of the CSP is not enough but the trust of the CSU is
equally important for a healthy cloud computing environment. From [12] and [14] the basic principles for
evaluation of user trust are found to be as stated below:-
 Effect of Expired User: The user that is not using the cloud for a long time and is very old is not
considered for evaluating trust of the user behavior.
Analyzing And Surveying Trust In Cloud Computing Environment
DOI: 10.9790/0661-17316670 www.iosrjournals.org 70 | Page
 Evaluation of trust based on records: The recent records of behavior of user in using cloud services are
considered to be more fruitful as compared to the older records. If the user is accessing its own domain and
has a behavior which is predictable is considered less useful and important in evaluating the trust of user.
On the other hand, if the user has a unpredictable and unusual access to cloud resources, this record makes
more influence in evaluating the user trust.
 Repetitive access to cloud resources by user: If the user accesses the cloud resources less frequently then
it is difficult to evaluate its behavior, while more user access gives more significant results to predict its
behavior whether user is trustworthy or not.
 Actions based on analysis: There must be proper strategies to punish the non-trustful behaviors. On
analyzing the behavior of users whether found to be trustful the a trust value assigned is higher and user is
found to be trustworthy to continue with the cloud services and if the trust value is found lower than some
standard value defined then the user has to be discontinued from the cloud services and also must be
blocked for future.
The models in [13],[14],[15],[16] are found to be missing transparency as a trust element and also they
are basically theory based which do not provide some parameters to calculate the trust values for the user trust
evaluation. The model in [14] is policy based and evaluates the user behavior based on the login of the users and
its response become slower when registered users increase in number. Another limitation is found to be the fact
that if user access is less and not repetitive then the result shown is not representative and stable.
V. Conclusion And Future Work
This paper gives an overview of the various trust issues and trust models. The main focus is on the
users’ trust based models which describe the importance of trustworthy users as well as trustworthy CSPs for a
healthy cloud computing environment. The main trust elements are found as data backup and recovery, storage
location of data, availability of services and transparency. Most of the models are found to be ignoring
transparency and regular updates to users regarding any changes towards CSPs’ end as elements of user trust.
Most models that exist, focus on the trustworthiness of the cloud service providers and less work is done
towards the evaluation of checking out the trustworthiness of the user who is using the cloud services. Lot of
research is possible in this direction in future.
References
[1]. Ankush Dhiman, Mauli Joshi, “Analysis of Performance for Data Center under for Private Cloud through Cloud Computing”,
International Journal of Engineering and Computer Science(IIECS) issn:2319-7242, vol.3 Issue 6, Page. 6422-6431, June 2014.
[2]. Hong Cai, Ning Wang, Ming Jun Zhou, “A Transparent Approach of Enabling SaaS Multi-tenancy in the Cloud”, IEEE 6th World
Congress on Services, 2010.
[3]. Wayne A. Jansen, NIST, “Cloud Hooks: Security and Privacy Issues in Cloud Computing”, Proceedings of the 44th
Hawaii
International Conference on System Sciences, 2011.
[4]. Michael Armbrust, Armando Fox, et al., “A view of Cloud Computing”, Communications of the ACM, vol. 53, April 2010.
[5]. Kai Hwang, Deyi Li, “Trusted Cloud Computing with Secure Resources and Data Coloring”, IEEE Internet Computing, 2010.
[6]. Dawei Sun, Guiran Chang, Lina Sun, Xingwei Wang, “Surveying and Analyzing Security, Privacy and Trust Issues in Cloud
Computing Environments”, Advanced in Control Engineering and Information Science, Procedia Engineering 15, page. 2852-2856,
2011.
[7]. Yashashree Bendale, Seema Shah, “Feasibility of User Level Trust in Cloud Computing”, UACEE International Journal of
Computer Science and its Applications, vol.2 : issue2[ISSN 2250-3765].
[8]. Felix Meixner, Ricardo Buettner, “Trust as an Integral Part for Success of Cloud Computing”, ICIW 2012: The Seventh
International Conference on Internet and Web Applications and Services, 2012.
[9]. Qiang Guo, Dawei Sun, Guiran Chang, Lina Sun, Xingwei Wang, “Modeling and Evaluation of Trust in Cloud Computing
Environments”, 3rd International Conference on Advanced Computer Control (ICACC), 2011.
[10]. Xiaoyong Li, Junping Du, “Adaptive and Attribute based Trust model for service-level agreement guarantee in cloud computing”,
IET Information Security, 2012.
[11]. Ayesha Kanwal, Rahat Masood, Um E Ghazia, Muhammad Awais Shibli and Abdul Ghafoor Abbasi, “Assessment Criteria for
Trust Models in Cloud Computing”, IEEE International Conference on Green Computing and Communications and IEEE Internet
of Things and IEEE Cyber, Physical and Social Computing, 2013.
[12]. Tian Li-qin, LIN Chuang, Ni Yang, “Evaluation of User Behavior Trust in Cloud Computing”, 2010 International Conference on
Computer Application and System Modeling (ICCASM 2010).
[13]. Ahmad Rashidi and Naser Movahhedinia, “A model for User Trust in Cloud Computing”, International Journal on Cloud
Computing: Services and Architecture (IJCCSA), Vol. 2, No.2, April 2012.
[14]. Yashashree Bendale, Seema Shah, “User Level Trust Evaluation in Cloud Computing”, International Journal of Computer
Applications, Vol. 69-No.24, May 2013.
[15]. Shakeel Ahmad, Basir Ahmad, Sheikh Muhammad Saqib and Rashid Muhammad Khattak, “Trust Model: Cloud’s Provider and
Cloud’s User”, International Journal of Advanced Science and Technology, Vol. 44, July 2012.
[16]. EY Building trust in the Cloud, Insights on governance, risk and compliance, June 2014.

More Related Content

What's hot

Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
Cloud computing technology security and trust challenges
Cloud computing technology security and trust challengesCloud computing technology security and trust challenges
Cloud computing technology security and trust challengesijsptm
 
Certification Authority Monitored Multilevel and Stateful Policy Based Author...
Certification Authority Monitored Multilevel and Stateful Policy Based Author...Certification Authority Monitored Multilevel and Stateful Policy Based Author...
Certification Authority Monitored Multilevel and Stateful Policy Based Author...CSCJournals
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...IRJET Journal
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Publishing House
 
A study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in cloudA study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in cloudeSAT Journals
 
A study on security responsibilities and adoption in
A study on security responsibilities and adoption inA study on security responsibilities and adoption in
A study on security responsibilities and adoption ineSAT Publishing House
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Journals
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Publishing House
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...IJCSIS Research Publications
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
 

What's hot (18)

Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
Cloud computing technology security and trust challenges
Cloud computing technology security and trust challengesCloud computing technology security and trust challenges
Cloud computing technology security and trust challenges
 
Certification Authority Monitored Multilevel and Stateful Policy Based Author...
Certification Authority Monitored Multilevel and Stateful Policy Based Author...Certification Authority Monitored Multilevel and Stateful Policy Based Author...
Certification Authority Monitored Multilevel and Stateful Policy Based Author...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
A study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in cloudA study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in cloud
 
A study on security responsibilities and adoption in
A study on security responsibilities and adoption inA study on security responsibilities and adoption in
A study on security responsibilities and adoption in
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
Gw3312111217
Gw3312111217Gw3312111217
Gw3312111217
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
 

Viewers also liked

Cloud Computing Outages - Analysis of Key Outages 2009 - 2012
Cloud Computing Outages - Analysis of Key Outages 2009 - 2012 Cloud Computing Outages - Analysis of Key Outages 2009 - 2012
Cloud Computing Outages - Analysis of Key Outages 2009 - 2012 Rajesh Prabhakar
 
Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?ITpreneurs
 
Dcpl cloud computing amazon fail
Dcpl cloud computing amazon failDcpl cloud computing amazon fail
Dcpl cloud computing amazon failchris tonjes
 
European Utility Week 2015: Next Generation Outage Management
European Utility Week 2015: Next Generation Outage ManagementEuropean Utility Week 2015: Next Generation Outage Management
European Utility Week 2015: Next Generation Outage ManagementOMNETRIC
 
DC architectures future proof
DC architectures future proofDC architectures future proof
DC architectures future proofGuido Frabotti
 
(SEC404) Incident Response in the Cloud | AWS re:Invent 2014
(SEC404) Incident Response in the Cloud | AWS re:Invent 2014(SEC404) Incident Response in the Cloud | AWS re:Invent 2014
(SEC404) Incident Response in the Cloud | AWS re:Invent 2014Amazon Web Services
 
Successful Outage Management Lessons Learned From Global Generation Leaders
Successful Outage Management   Lessons Learned From Global Generation LeadersSuccessful Outage Management   Lessons Learned From Global Generation Leaders
Successful Outage Management Lessons Learned From Global Generation LeadersTedLemmers
 
The Inevitable Cloud Outage
The Inevitable Cloud OutageThe Inevitable Cloud Outage
The Inevitable Cloud OutageNewvewm
 
Avoiding Cloud Outage
Avoiding Cloud OutageAvoiding Cloud Outage
Avoiding Cloud OutageNati Shalom
 
26 Time Management Hacks I Wish I'd Known at 20
26 Time Management Hacks I Wish I'd Known at 2026 Time Management Hacks I Wish I'd Known at 20
26 Time Management Hacks I Wish I'd Known at 20Étienne Garbugli
 

Viewers also liked (12)

Cloud Computing Outages - Analysis of Key Outages 2009 - 2012
Cloud Computing Outages - Analysis of Key Outages 2009 - 2012 Cloud Computing Outages - Analysis of Key Outages 2009 - 2012
Cloud Computing Outages - Analysis of Key Outages 2009 - 2012
 
Henry
HenryHenry
Henry
 
Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?
 
Dcpl cloud computing amazon fail
Dcpl cloud computing amazon failDcpl cloud computing amazon fail
Dcpl cloud computing amazon fail
 
Cloud malfunction up11
Cloud malfunction up11Cloud malfunction up11
Cloud malfunction up11
 
European Utility Week 2015: Next Generation Outage Management
European Utility Week 2015: Next Generation Outage ManagementEuropean Utility Week 2015: Next Generation Outage Management
European Utility Week 2015: Next Generation Outage Management
 
DC architectures future proof
DC architectures future proofDC architectures future proof
DC architectures future proof
 
(SEC404) Incident Response in the Cloud | AWS re:Invent 2014
(SEC404) Incident Response in the Cloud | AWS re:Invent 2014(SEC404) Incident Response in the Cloud | AWS re:Invent 2014
(SEC404) Incident Response in the Cloud | AWS re:Invent 2014
 
Successful Outage Management Lessons Learned From Global Generation Leaders
Successful Outage Management   Lessons Learned From Global Generation LeadersSuccessful Outage Management   Lessons Learned From Global Generation Leaders
Successful Outage Management Lessons Learned From Global Generation Leaders
 
The Inevitable Cloud Outage
The Inevitable Cloud OutageThe Inevitable Cloud Outage
The Inevitable Cloud Outage
 
Avoiding Cloud Outage
Avoiding Cloud OutageAvoiding Cloud Outage
Avoiding Cloud Outage
 
26 Time Management Hacks I Wish I'd Known at 20
26 Time Management Hacks I Wish I'd Known at 2026 Time Management Hacks I Wish I'd Known at 20
26 Time Management Hacks I Wish I'd Known at 20
 

Similar to Analyzing and Surveying Trust In Cloud Computing Environment

SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service ProvidersSelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers1crore projects
 
SELECTING TRUSTWORTHY CLIENTS IN THE CLOUD
SELECTING TRUSTWORTHY CLIENTS IN THE CLOUDSELECTING TRUSTWORTHY CLIENTS IN THE CLOUD
SELECTING TRUSTWORTHY CLIENTS IN THE CLOUDijccsa
 
Cloud Armor: A Conclusion Work on Trust Management System
Cloud Armor: A Conclusion Work on Trust Management SystemCloud Armor: A Conclusion Work on Trust Management System
Cloud Armor: A Conclusion Work on Trust Management SystemIJAEMSJORNAL
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
Cloud computing risk assesment report
Cloud computing risk assesment reportCloud computing risk assesment report
Cloud computing risk assesment reportAhmad El Tawil
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentIRJET Journal
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
 
Preferences Based Customized Trust Model for Assessment of Cloud Services
Preferences Based Customized Trust Model for Assessment of Cloud ServicesPreferences Based Customized Trust Model for Assessment of Cloud Services
Preferences Based Customized Trust Model for Assessment of Cloud ServicesIJECEIAES
 
A framework assuring decentralized accountability
A framework assuring decentralized accountabilityA framework assuring decentralized accountability
A framework assuring decentralized accountabilityeSAT Publishing House
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...IJERA Editor
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET-  	  Improvement of Security and Trustworthiness in Cloud Computing usi...IRJET-  	  Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...IRJET Journal
 
Cloud implementation security challenges
Cloud implementation security challengesCloud implementation security challenges
Cloud implementation security challengesbornresearcher
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...SafeNet
 
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewSecurity Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewEswar Publications
 

Similar to Analyzing and Surveying Trust In Cloud Computing Environment (20)

SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service ProvidersSelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
 
SELECTING TRUSTWORTHY CLIENTS IN THE CLOUD
SELECTING TRUSTWORTHY CLIENTS IN THE CLOUDSELECTING TRUSTWORTHY CLIENTS IN THE CLOUD
SELECTING TRUSTWORTHY CLIENTS IN THE CLOUD
 
Cloud Armor: A Conclusion Work on Trust Management System
Cloud Armor: A Conclusion Work on Trust Management SystemCloud Armor: A Conclusion Work on Trust Management System
Cloud Armor: A Conclusion Work on Trust Management System
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Cloud computing risk assesment report
Cloud computing risk assesment reportCloud computing risk assesment report
Cloud computing risk assesment report
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud Environment
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
 
Preferences Based Customized Trust Model for Assessment of Cloud Services
Preferences Based Customized Trust Model for Assessment of Cloud ServicesPreferences Based Customized Trust Model for Assessment of Cloud Services
Preferences Based Customized Trust Model for Assessment of Cloud Services
 
A framework assuring decentralized accountability
A framework assuring decentralized accountabilityA framework assuring decentralized accountability
A framework assuring decentralized accountability
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET-  	  Improvement of Security and Trustworthiness in Cloud Computing usi...IRJET-  	  Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
 
Cloud implementation security challenges
Cloud implementation security challengesCloud implementation security challenges
Cloud implementation security challenges
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
 
Cc unit 4 updated version
Cc unit 4 updated versionCc unit 4 updated version
Cc unit 4 updated version
 
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewSecurity Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A Review
 

More from iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Recently uploaded

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 

Recently uploaded (20)

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 

Analyzing and Surveying Trust In Cloud Computing Environment

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. 1 (May – Jun. 2015), PP 66-70 www.iosrjournals.org DOI: 10.9790/0661-17316670 www.iosrjournals.org 66 | Page Analyzing and Surveying Trust In Cloud Computing Environment Kavita Rathi1, Sudesh Kumari2. Assistant Professor, CSE Department, Deenbandhu Chhotu Ram University of Science & Technology, Murthal. Student, M.Tech(CSE), Deenbandhu Chhotu Ram University of Science & Technology, Murthal. Abstract: Cloud computing is the most discussed research area now-a-days which helps to provide elasticity and flexibility in using the computing resources and services to fulfill the requirement of current businesses. Besides many advantages offered by cloud computing, it deals with many obstacles in the path of its growth, that are security issues, data privacy issues and distrust on cloud service providers (CSP). Trust is found to be an essential element for achieving security and confidence in the use of distributed computing. Various issues like data control, ownership, data integrity and security can be considered as important parameters of trust. This paper addresses the existing trust models for trust establishment in cloud services and also tries to find out the shortcomings of these models. Keywords- Trust, Issues of Trust, Trust Models, User Based Trust Models. I. Introduction Cloud Computing is a model for enabling ubiquitous, convenient, on-demand network access to shared pool of configurable computing resources (network, server, storage, application and services) that can rapidly provisioned and released with minimum management effort or service provider interaction[1]-[3]. It comes up with several advantages in distributed computing environments and operates on a virtualized and “pay-as-you- go” economic model [4], it also brings various challenges in its adoption. Trust is found to be one of the major challenges in the adoption of cloud computing as distrust prevents the consumers from its wide use and distrust comes out most because consumers do not have a direct control over their data lying on the cloud. This is the reason why evaluation of trust is critical. Trust has many dimensions, multiple faces and is also multidisciplinary and hence it is very difficult to give a proper definition to it. This paper is organized in the sections as described. The first section presents the theory for the need of trust in the cloud services, followed by the sections focusing on trust issues and existing trust models along with their shortcomings in trust establishment. II. Need Of Trust Trust is a social problem, not a purely technical issue [5]. Trust is viewed as a measurable belief that utilizes experience to make trustworthy decisions [6]. The cloud service users (CSU) always have to keep trust on the cloud service providers (CSP) and the CSPs have to keep trust on the CSUs for a healthy establishment of cloud services. In the cloud computing scenarios the CSUs give all their digital resources in the hands of the CSPs and the CSPs hold direct control over almost all the security factors. This is the reason why a CSP has to confer a proper level of trust to the cloud service users. The component of trust is an essential element in the wide use and implementation of cloud services. The relationship of trust is established between the two parties which are stated as trustor and trustee. The trustor is the person or entity who holds confidence, belief, reliability, integrity and ability, etc. of another person or thing which is the object of trust, i.e. the trustee [7]. As per the previous study, following trust characteristics are found:-  Trustor and Trustee[8] The trust relation is formed by the trustor that is the trusting party and the trustee that is the party which is to be trusted. The development of trust is based on the ability of the trustee to act in the best interest of the trustor and degree of trust that the trustor places on the trustee [8].  Susceptible to attack Trust is found to be important in the computing environments where there are more possibilities of risk, data losses, vulnerabilities and uncertainty. Due to this reason trust is important in cloud computing environments. A trustor depends on the trustee for not exploiting and misusing his vulnerabilities.
  • 2. Analyzing And Surveying Trust In Cloud Computing Environment DOI: 10.9790/0661-17316670 www.iosrjournals.org 67 | Page  Produced actions[8] Trust between the trustor and trustee leads to various behavioral changes in the actions of the CSUs. Trust allows the CSUs to take risk and allow their private data to be shared on the cloud. It may also allow the CSUs to continue the use of services of the cloud on a regular basis.  Subjective Nature Trust is subjective and every individual or enterprise has their own opinions towards the follow up of any technology. Hence there are different requirements of every CSU to judge the trust level of a particular CSP. III. Trust Issues There are many aspects of trust in the cloud computing environment based on the CSPs view and the CSUs view. Trust is very important for building relationships between CSUs and CSPs. There are several issues of trust which are categorized by considering following factors:-  How can trust be defined and evaluated in the cloud computing scenarios.  How malicious information can be handled in temporary and dynamic cloud relationships.  How to consider and provide different security levels according to trust degree [6].  How to manage trust degree change with temporary and dynamic relationships [6]. As per the researchers Ankush Dhiman, Mauli Joshi, Wayne A. Jansen, several trust issues are found, a few are stated below:- 1. Access by Insiders: All the data of the CSUs is stored to the data centers of the CSPs and then the storing and processing of data depends purely on the service providers. The employees of the service providers could see and process the data as they want and there is always high risk of data access by insiders. They could make changes or modifications to the data. Denial of service attack, and creation of 20 account and instance to each account launched a Virtual machine for each and again process continued, to set the resource beyond the limit are some special cases of the malicious insider attack[3]. It is one of the examples of such attacks studied in the Amazon Elastic Compute Cloud (EC2)[3]. 2. Nesting of Services: This issue includes the use of two or more CSPs. This means that a software as a service provider uses the services of platform as a service provider and platform as a service provider uses another infrastructure as a service provider. In this way, there are multiple levels of hiring and renting the services in a cloud. Liability and performance guarantees are the serious issues that come into account with the composite cloud services [1][3]. An example of such type is LinkUp which is an online storage service which leaded to the loss of access to the significant data of its 20,000 customers [1][3]. It happened because another company named Nirvanix hosted the data for LinkUp and another company named Savvis hosted the application and database for Nirvanix [1][3]. In these situations there is no provider to take responsibility for losses of data and hence this becomes one of the major issues of establishing trust on third party distributers of the cloud services. 3. Degree of Exposure: This issue deals with the level of visibility provided by the CSPs to the CSUs. The detailed network and system, network and storage level monitoring should be implemented for gaining visibility into the security controls and processes employed by the CSP along with their performance over time [3]. 4. Risk: Assessing and managing risk in systems using cloud services is again a challenge to be taken. Sometimes consumers are ready to take risk if the control over processes and equipment is towards their end. But in case of cloud services the scenario changes as the control varies. The trust is based on the amount of direct control that any organization is capable of applying on the CSP’s with regard to the security employed for the protection of services [3]. Verifying the correct functioning of the system along with the security controls is an important aspect of establishing trust in the cloud services [3]. Risk management and assessment must be detailed and should be done properly in a cloud based implementation. IV. Trust Models In Cloud Trust is the most complex relationship among entities, because it is subjective and difficult to be evaluated [9]. Trust models are considered as a methodology that helps to evaluate trust on the CSP’s or the third party distributers that are providing the cloud services. Trust models in Cloud computing are very diverse in a way that each model supports different features and evaluates Cloud services on the basis of different parameters and requirements [10].
  • 3. Analyzing And Surveying Trust In Cloud Computing Environment DOI: 10.9790/0661-17316670 www.iosrjournals.org 68 | Page Figure 1[11] states the various trust models that have been proposed based on the functionality of their evaluation criteria among different levels of services provided by the cloud computing environments. Figure1 [11]. Trust Models in Cloud Computing Abbreviations used in Figure1 denote the following:- SLA: Service Level Agreement TVEM: Trusted Virtual Environment Module PLT: Prepositional Logic Terms There are various trust models that can be seen in the diagram stated above. Out of these this paper focuses on the study of user behavior based trust models as basically when we think of trust it is only about the consumer trusting the CSP but it is equally important to judge the user for its trustworthiness for using the cloud services. In cloud computing, due to users directly use and operate the software and operating system, so the impact and destruction for the software and hardware cloud resources are worse than the current internet users who use it to share resources [12]. This makes it important to check the user for its reliability to provide access to the use of cloud resources and also keep track of the fact that the feedback comes out from correct and authenticated group of CSUs. Trust is found to be two way which deals with trust from both the CSUs on CSPs and vice versa. Some of the reasons that lead to distrust in the use of cloud services are:-  Risk of data leaks.  Security risks of stored data location.  Risk of data to be investigated.  Interruptions in cloud services.  Risk of data damage.  Risk of collapse of the CSP. These reasons focus on the trust of the CSU on the CSP. Though the consumers trust the CSPs for their work, it does not ensure the safety of data as the consumer may also be malicious. It is very important to detect such kind of CSUs and not allow them to use the cloud services. They could make fake identifications and be in the cloud and put some malicious data to the cloud which could lead to the blockage of various cloud services to other CSUs. The possible reasons leading to user behavior mistrust are [14]:-  Destructive behavior by individuals towards their business counterparts or commercial competitors or some persons.  Damage to the cloud resources consisting of software services, platform services, infrastructure and hardware services by the errors caused by users or in configurations.  Detection of malicious code or software in the cloud.
  • 4. Analyzing And Surveying Trust In Cloud Computing Environment DOI: 10.9790/0661-17316670 www.iosrjournals.org 69 | Page  Errors in the authentication and identification of users. Whatever is the reason of mistrust in CSU, there must be proper monitoring by the CSP on the behavior of CSUs so that it could be ensured that the cloud services are only used by the trustworthy users. Cloud computing model brings some new security threats such as resource sharing, fate sharing, and data lock in [13]. These risks are sources of concern for users and prevent them from using cloud computing [13]. Due to these kinds of risks, the CSPs have to keep concern for the CSUs to provide them with a trustworthy cloud environment. Several researchers have given many elements of trust that are useful in identifying the CSUs’ trust in the use of cloud services. As formulated in [13]-[16], following trust elements of CSUs are compiled as given below:-  Location of stored data: In the cloud environments, data can be stored anywhere and the CSUs are not aware of the physical location of data which is a concern of trust.  Data to be investigated: The data is shared and stored at different locations hence it becomes very difficult to convince the CSUs against any unnecessary action to be taken on their data by anyone.  Sharing of data: How the data is distributed over the cloud and how it is protected is a major concern for the CSUs.  Availability of Services: The cloud services must be available to the CSUs whenever they want and they must be available round the clock.  Long-term Viability: CSUs want their data to be available and viable to them for long and hence they want that the CSP must not go down and nothing wrong should happen to their data. Ideally, cloud computing provider should never go broke or get acquired by a larger company. But user must be assured about the data will remain available even after such an event [13].”  Compliance regulation and audit: Compliance includes correspondence of the appearance of the constitute specifications, standards and Law [6]. These laws, rules and regulations for security and privacy differ from location to location [6]. Each country, state, local bodies have their own rules and regulation. So the compliance is one of the most important issues in cloud computing [6].  Back up of data and Recovery: A CSP must have the techniques to recover data losses in case of any disaster or any other circumstance that may lead to loss of data.  Access privileges to the Users: CSPs must have a proper mechanism to assign the access privileges to different kinds of users in the cloud data center and access control of data must be civilized and authenticated.  Governance: The cloud resources are spread and shared all over the globe and hence it is very important to decide the protocols and governing body of the CSPs is working independent of the political conditions of a particular country.  Transparency: The CSP should display the relevant information about its policies and conditions for using the cloud services and these should be transparent to the CSUs through a proper design of its web interface and graphics. Also the CSPs must communicate with the CSUs through video conferencing or other communication media while assigning the resources to a CSU. The transparent way of customer dealing by a CSP will help the CSP to gain more user confidence and trust. These are some of the major trust elements that are useful for the CSUs to evaluate trust of the CSPs. The CSPs that provide more information about all these elements are found to be trustworthy and their services are considered to be used by more CSUs. Only the trust of the CSP is not enough but the trust of the CSU is equally important for a healthy cloud computing environment. From [12] and [14] the basic principles for evaluation of user trust are found to be as stated below:-  Effect of Expired User: The user that is not using the cloud for a long time and is very old is not considered for evaluating trust of the user behavior.
  • 5. Analyzing And Surveying Trust In Cloud Computing Environment DOI: 10.9790/0661-17316670 www.iosrjournals.org 70 | Page  Evaluation of trust based on records: The recent records of behavior of user in using cloud services are considered to be more fruitful as compared to the older records. If the user is accessing its own domain and has a behavior which is predictable is considered less useful and important in evaluating the trust of user. On the other hand, if the user has a unpredictable and unusual access to cloud resources, this record makes more influence in evaluating the user trust.  Repetitive access to cloud resources by user: If the user accesses the cloud resources less frequently then it is difficult to evaluate its behavior, while more user access gives more significant results to predict its behavior whether user is trustworthy or not.  Actions based on analysis: There must be proper strategies to punish the non-trustful behaviors. On analyzing the behavior of users whether found to be trustful the a trust value assigned is higher and user is found to be trustworthy to continue with the cloud services and if the trust value is found lower than some standard value defined then the user has to be discontinued from the cloud services and also must be blocked for future. The models in [13],[14],[15],[16] are found to be missing transparency as a trust element and also they are basically theory based which do not provide some parameters to calculate the trust values for the user trust evaluation. The model in [14] is policy based and evaluates the user behavior based on the login of the users and its response become slower when registered users increase in number. Another limitation is found to be the fact that if user access is less and not repetitive then the result shown is not representative and stable. V. Conclusion And Future Work This paper gives an overview of the various trust issues and trust models. The main focus is on the users’ trust based models which describe the importance of trustworthy users as well as trustworthy CSPs for a healthy cloud computing environment. The main trust elements are found as data backup and recovery, storage location of data, availability of services and transparency. Most of the models are found to be ignoring transparency and regular updates to users regarding any changes towards CSPs’ end as elements of user trust. Most models that exist, focus on the trustworthiness of the cloud service providers and less work is done towards the evaluation of checking out the trustworthiness of the user who is using the cloud services. Lot of research is possible in this direction in future. References [1]. Ankush Dhiman, Mauli Joshi, “Analysis of Performance for Data Center under for Private Cloud through Cloud Computing”, International Journal of Engineering and Computer Science(IIECS) issn:2319-7242, vol.3 Issue 6, Page. 6422-6431, June 2014. [2]. Hong Cai, Ning Wang, Ming Jun Zhou, “A Transparent Approach of Enabling SaaS Multi-tenancy in the Cloud”, IEEE 6th World Congress on Services, 2010. [3]. Wayne A. Jansen, NIST, “Cloud Hooks: Security and Privacy Issues in Cloud Computing”, Proceedings of the 44th Hawaii International Conference on System Sciences, 2011. [4]. Michael Armbrust, Armando Fox, et al., “A view of Cloud Computing”, Communications of the ACM, vol. 53, April 2010. [5]. Kai Hwang, Deyi Li, “Trusted Cloud Computing with Secure Resources and Data Coloring”, IEEE Internet Computing, 2010. [6]. Dawei Sun, Guiran Chang, Lina Sun, Xingwei Wang, “Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments”, Advanced in Control Engineering and Information Science, Procedia Engineering 15, page. 2852-2856, 2011. [7]. Yashashree Bendale, Seema Shah, “Feasibility of User Level Trust in Cloud Computing”, UACEE International Journal of Computer Science and its Applications, vol.2 : issue2[ISSN 2250-3765]. [8]. Felix Meixner, Ricardo Buettner, “Trust as an Integral Part for Success of Cloud Computing”, ICIW 2012: The Seventh International Conference on Internet and Web Applications and Services, 2012. [9]. Qiang Guo, Dawei Sun, Guiran Chang, Lina Sun, Xingwei Wang, “Modeling and Evaluation of Trust in Cloud Computing Environments”, 3rd International Conference on Advanced Computer Control (ICACC), 2011. [10]. Xiaoyong Li, Junping Du, “Adaptive and Attribute based Trust model for service-level agreement guarantee in cloud computing”, IET Information Security, 2012. [11]. Ayesha Kanwal, Rahat Masood, Um E Ghazia, Muhammad Awais Shibli and Abdul Ghafoor Abbasi, “Assessment Criteria for Trust Models in Cloud Computing”, IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, 2013. [12]. Tian Li-qin, LIN Chuang, Ni Yang, “Evaluation of User Behavior Trust in Cloud Computing”, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010). [13]. Ahmad Rashidi and Naser Movahhedinia, “A model for User Trust in Cloud Computing”, International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol. 2, No.2, April 2012. [14]. Yashashree Bendale, Seema Shah, “User Level Trust Evaluation in Cloud Computing”, International Journal of Computer Applications, Vol. 69-No.24, May 2013. [15]. Shakeel Ahmad, Basir Ahmad, Sheikh Muhammad Saqib and Rashid Muhammad Khattak, “Trust Model: Cloud’s Provider and Cloud’s User”, International Journal of Advanced Science and Technology, Vol. 44, July 2012. [16]. EY Building trust in the Cloud, Insights on governance, risk and compliance, June 2014.