Trustworthy Service Provider Selection in Cloud Computing Environment

Author(s):  
Punam Bedi ◽  
Harmeet Kaur ◽  
Bhavna Gupta
2016 ◽  
Vol 6 (3) ◽  
pp. 15-31 ◽  
Author(s):  
Usha Divakarla ◽  
K. Chandrasekaran

Trust is the common factor of any network security. In cloud, trust is the major factor as this trust develops a relation between the user and resource of the service provider. To develop a strong trust there has to be a strong trust path between two entities. The model proposed builds a strong trust path between two important entities in cloud namely user and resources of the service provider. The trust path thus built strengthens the security of the resources as well as the authentication of the user. The implementation proved that trust model developed is more efficient in terms of computation time.


2019 ◽  
pp. 992-1013
Author(s):  
Shivani Jaswal ◽  
Manisha Malhotra

Cloud computing is a rising paradigm in today's world. In this, users can send his or her request to any CSP, i.e., cloud service provider, of their choice. In return, the CSP reverts him back with that particular service. Now, while communicating from various two locations, the data transferred is not passed through that much amount of security and privacy as expected. So, there are lots of parameters in the environment that are taken care of while sending, receiving or just passing data over the network. This chapter presents various security issues that are underlying in cloud computing. This chapter has illustrated various issues such as Trust, Encryption, Authenticity, Confidentiality and Multi Tenancy. Also, some of the proposed solutions have also been discussed later in the chapter.


Author(s):  
Shivani Jaswal ◽  
Manisha Malhotra

Cloud computing is a rising paradigm in today's world. In this, users can send his or her request to any CSP, i.e., cloud service provider, of their choice. In return, the CSP reverts him back with that particular service. Now, while communicating from various two locations, the data transferred is not passed through that much amount of security and privacy as expected. So, there are lots of parameters in the environment that are taken care of while sending, receiving or just passing data over the network. This chapter presents various security issues that are underlying in cloud computing. This chapter has illustrated various issues such as Trust, Encryption, Authenticity, Confidentiality and Multi Tenancy. Also, some of the proposed solutions have also been discussed later in the chapter.


Application portability in a cloud computing condition is characterized to be the exchange of utilization or its segments starting with one cloud administration then onto the next cloud administration of its specialized comparability. The application should be such transferred that it does not make any significant changes in the application code although recompilation or relinking may be allowed. Application portability can be performed by the customer only in case of IaaS and PaaS services because for SaaS the application code relies on the cloud service provider itself. The application artifacts and their dependencies play a major role in the target environment. Containers and their related infrastructure hold valuable importance for application portability. In this paper, we will elaborate on all the issues, challenges, scenarios, and approaches for application portability that rose to date. We will study all the facets of data and application portability such as its instruction, syntax, metadata, and policies. The evolution of automation tools and technologies has made the portability of applications easier as the manual processes were inefficient and error-prone.


2021 ◽  
Author(s):  
Rajagopal T. K. P. ◽  
Venkatesan M.

Abstract Cloud computing environment provides the information technology service and resources using in the Internet. It offers a variety of services such as IAAS (infrastructure as a service), SAAS (software as a service) and PAAS (platform as a service). The scenario of cloud computing environment mainly refers to both the cloud environment service provider and the cloud environment service user. Cloud environment service provider provides cloud environment resources and services to the cloud environment service provider. The cloud environment service provider should use its resources efficiently to make a profit, but the cloud environment challenging task for them is to maximize cloud environment resources. This article describes the energy saving approach by optimizing the use of hosts and minimizing the active host using migration techniques.


2019 ◽  
pp. 376-392
Author(s):  
Usha Divakarla ◽  
K. Chandrasekaran

Trust is the common factor of any network security. In cloud, trust is the major factor as this trust develops a relation between the user and resource of the service provider. To develop a strong trust there has to be a strong trust path between two entities. The model proposed builds a strong trust path between two important entities in cloud namely user and resources of the service provider. The trust path thus built strengthens the security of the resources as well as the authentication of the user. The implementation proved that trust model developed is more efficient in terms of computation time.


2012 ◽  
Vol 616-618 ◽  
pp. 2196-2199
Author(s):  
Yu Hu

The Trusted Virtual Environment Module (TVEM) is a new mechanism for rooting trust in a cloud computing environment. The TVEM helps solve the core security challenge of cloud computing by enabling parties to establish trust relationships in a cloud computing environment where an information owner creates and runs a virtual environment on a platform owned by a separate service provider. This paper detailed discusses the TVEM used in the cloud computing environment.


Sign in / Sign up

Export Citation Format

Share Document