ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Trust Based Approach for Security and User Confidence in Pervasive Computing Systems

Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.6, No. 2)

Publication Date:

Authors : ; ;

Page : 108-115

Keywords : Resource Allocation; SaaS; PaaS; IaaS; Load Balancing;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing has turned into a piece of the focused market today. Numerous associations make utilization of cloud administrations. As the cloud computing administrations is developing and picking up prominence, the dread about the use of cloud administrations is as yet an open issue. Different issues are distinguished in the writing; one of which is security. Security hazards in the territory of cloud computing has pulled in consideration since its start. New conventions and instruments are dependably sought after to improve the safety effort by a cloud computing administration. Different cloud computing specialist co-ops are accessible with their administrations in the cloud condition. These administrations have different determinations, highlights and techniques for accomplishing security. Strategies received by different suppliers to accomplish security are of fluctuating nature. A cloud client may choose an administration in view of his prerequisite and level of security gave by the administration. To break down a specific administration in view of its different security properties is a test. Measure of security and believing a cloud benefit is a test. A trust display measures the security quality and figures confide in esteem. Trust esteem is a measure of different parts of security like validation, approval and so forth that are vital for estimating security. Trust esteem speaks to different parameters that are critical measurements along which security of cloud administrations can be estimated. These parameters rely upon sub-parameters and functionalities that are quantifiable. Since this model depends on moderately static data, for example, sort of encryption calculation utilized, this trust demonstrate gives static esteems. Cloud benefit particulars and highlights are removed to compute the security of an administration as far as static parameters and named as static trust.

Last modified: 2018-02-26 22:57:07