CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Trust based Cloud Brokerage Approach using Cryptographic and Weighed Technique

by Priyanka Pandey, Hitesh Kag
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 14
Year of Publication: 2019
Authors: Priyanka Pandey, Hitesh Kag
10.5120/ijca2019918903

Priyanka Pandey, Hitesh Kag . Trust based Cloud Brokerage Approach using Cryptographic and Weighed Technique. International Journal of Computer Applications. 178, 14 ( May 2019), 7-11. DOI=10.5120/ijca2019918903

@article{ 10.5120/ijca2019918903,
author = { Priyanka Pandey, Hitesh Kag },
title = { Trust based Cloud Brokerage Approach using Cryptographic and Weighed Technique },
journal = { International Journal of Computer Applications },
issue_date = { May 2019 },
volume = { 178 },
number = { 14 },
month = { May },
year = { 2019 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number14/30596-2019918903/ },
doi = { 10.5120/ijca2019918903 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:50:21.374028+05:30
%A Priyanka Pandey
%A Hitesh Kag
%T Trust based Cloud Brokerage Approach using Cryptographic and Weighed Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 14
%P 7-11
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is emerging as the future Internet technology due to its advantages such as sharing of IT resources, unlimited scalability and flexibility and high level of automation. Along the lines of rapid growth, the cloud computing technology also brings in concerns of security, trust and privacy of the applications and data that is hosted in the cloud environment. In this paper, we design and implemented trust based model of data during the brokerage. For preparing solution, in first step a cryptographic approach using the tiger hash and DES algorithm is provided which helps to preserve data on cloud securely. In addition to that, second step illustrate a new trust management concept using weighted trust technique. Our proposed approach is simplified yet efficient algorithm that can implemented for cloud brokerage application that strictly enforce the user trust that identified server rating. In this approach, we measure number of performance parameters which exemplify system availability in critical phase of the applications.

References
  1. Li, Xiaoyong, Huadong Ma, Feng Zhou, and Wenbin Yao, "T-broker: A trust-aware service brokering scheme for multiple cloud collaborative services", IEEE Transactions on Information Forensics and Security 10, no. 7 (2015), pp. 1402-1415.
  2. P. Mell and T. Grance, “Draft NIST Working Definition of Cloud Computing,” 2009; http://csrc.nist.gov/groups/SNS/cloud-computing/index.html.
  3. M. Armbrust et al., “Above the Clouds: A Berkeley View of Cloud Computing,” Univ. California, Berkeley, Tech. Rep. UCBEECS-2009-28, Feb2009.
  4. Torry Harries, “Cloud Computing”, available online at: http://www.thbs.com/downloads/Cloud-Computing-Overview.pdf
  5. Vaishali Jain, Akshita Sharma, “A Taxonomy on Cloud Computing”, International Journal of Emerging Technology and Advanced Engineering, Certified Journal, Volume 4, Issue 3, March 2014.
  6. Buyya, Rajkumar, and Karthik Sukumar. "Platforms for building and deploying applications for cloud computing." arXiv preprint arXiv: 1104.4379 (2011).
  7. BOX, B. "Cloud computing in telecommunications." Available online at: http://www.ramonmillan.com/documentos/bibliografia/CloudComputingInTelecomunications_Ericsson.pdf
  8. . S. Zhang, S. F. Zhang, X. B. Chen, and X. Z. Huo, “Cloud Computing Research and Development Trend,” In Proceedings of the 2010 Second International Conference on Future Networks (ICFN '10). IEEE Computer Society, Washington, DC, USA, pp. 93-970
  9. B. Grobauer, T. Walloschek, and E. Stöcker, “Understanding Cloud Computing Vulnerabilities”. 2011 IEEE Security and Privacy, pp. 50-57.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security Bursting Cloud Brokerage Data Encryption Standard Server Trust Tiger hash.