{"title":"云计算中的安全问题和信任管理","authors":"Shimpy Harbajanka, Preeti Saxena","doi":"10.1145/2909067.2909068","DOIUrl":null,"url":null,"abstract":"Cloud computing is the growing technology. It offers many services. The cloud service provider facilitates on demand services therefore the data on the hosting server increases significantly and so the data access. To reduce the maintenance cost of data management and for protecting data loss, data outsourcing technique are adopted. To manage the trust of end user the cryptographic techniques are popular. During data access, data may be loss or may be attacked by the intruder so a trust management system needs to be developed. Existing trust management system relies only on customer feedback. A need is identified that should also consider other parameters for establishing trust. A system proposed that implements the trust management system for cloud computing, that assures secure data access through trustworthy cloud service provider. Here, the trust evaluation method is proposed in which weighted trust factor is calculated considering multiple attributes. The trust factor helps users to identify trustworthy cloud service provider through which they can use cloud services.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Security Issues and Trust Management in Cloud Computing\",\"authors\":\"Shimpy Harbajanka, Preeti Saxena\",\"doi\":\"10.1145/2909067.2909068\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is the growing technology. It offers many services. The cloud service provider facilitates on demand services therefore the data on the hosting server increases significantly and so the data access. To reduce the maintenance cost of data management and for protecting data loss, data outsourcing technique are adopted. To manage the trust of end user the cryptographic techniques are popular. During data access, data may be loss or may be attacked by the intruder so a trust management system needs to be developed. Existing trust management system relies only on customer feedback. A need is identified that should also consider other parameters for establishing trust. A system proposed that implements the trust management system for cloud computing, that assures secure data access through trustworthy cloud service provider. Here, the trust evaluation method is proposed in which weighted trust factor is calculated considering multiple attributes. The trust factor helps users to identify trustworthy cloud service provider through which they can use cloud services.\",\"PeriodicalId\":371590,\"journal\":{\"name\":\"Women In Research\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-03-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Women In Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2909067.2909068\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Women In Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2909067.2909068","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Issues and Trust Management in Cloud Computing
Cloud computing is the growing technology. It offers many services. The cloud service provider facilitates on demand services therefore the data on the hosting server increases significantly and so the data access. To reduce the maintenance cost of data management and for protecting data loss, data outsourcing technique are adopted. To manage the trust of end user the cryptographic techniques are popular. During data access, data may be loss or may be attacked by the intruder so a trust management system needs to be developed. Existing trust management system relies only on customer feedback. A need is identified that should also consider other parameters for establishing trust. A system proposed that implements the trust management system for cloud computing, that assures secure data access through trustworthy cloud service provider. Here, the trust evaluation method is proposed in which weighted trust factor is calculated considering multiple attributes. The trust factor helps users to identify trustworthy cloud service provider through which they can use cloud services.