Analyzing and Surveying Trust In Cloud ComputingEnvironment
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Cloud computing is the most discussed research area now-a-days which helps to provide elasticityand flexibility in using the computing resources and services to fulfill the requirement of current businesses.Besides many advantages offered by cloud computing, it deals with many obstacles in the path of its growth,that are security issues, data privacy issues and distrust on cloud service providers (CSP). Trust is found to bean essential element for achieving security and confidence in the use of distributed computing. Various issueslike data control, ownership, data integrity and security can be considered as important parameters of trust.This paper addresses the existing trust models for trust establishment in cloud services and also tries to find outthe shortcomings of these models
Authors and Affiliations
Kavita Rathi , Sudesh Kumari
A Review on Semantic Approach using Nearest Neighbor Search
Abstract: Information retrieval (IR) of acquiring information sources relevant to an information sources from a group or unit. Ontology in IR field is used to represent an official domain description in addition a semant...
Penetration Testing for Android Smartphones
One major challenge faced by Android users today is the security of the operating system especially during setup. The use of smartphones for communication, social networking, mobile banking and payment systems ha...
Creating a Bicycle Design Approach Model Based on FashionStyles
Abstract: The authors created a Bicycle Design Approach Model Based on Fashion Styles as a means ofsupporting idea generation for product development that takes into account customer sensibilities, and theeffectiveness o...
RFID based protection to newborns in the hospitals
Abstract: Many hospitals, these days depend on the Information Technology (IT) to achieve perfection in the health services and operation management. The said dependency is because of the ability of emerging techno...
Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography
Abstract: This study combines classic and modern cryptographic algorithms so that the data security of information more awake authenticity. Caesar cipher is the oldest classical cryptography which uses a symmetric key me...