CFP last date
20 May 2024
Reseach Article

Trust Model for Dependable File Exchange in Cloud Computing

by El-Sayed M. Towfek El-kenawy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 49
Year of Publication: 2018
Authors: El-Sayed M. Towfek El-kenawy
10.5120/ijca2018917305

El-Sayed M. Towfek El-kenawy . Trust Model for Dependable File Exchange in Cloud Computing. International Journal of Computer Applications. 180, 49 ( Jun 2018), 22-27. DOI=10.5120/ijca2018917305

@article{ 10.5120/ijca2018917305,
author = { El-Sayed M. Towfek El-kenawy },
title = { Trust Model for Dependable File Exchange in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2018 },
volume = { 180 },
number = { 49 },
month = { Jun },
year = { 2018 },
issn = { 0975-8887 },
pages = { 22-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number49/29569-2018917305/ },
doi = { 10.5120/ijca2018917305 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:04:01.970934+05:30
%A El-Sayed M. Towfek El-kenawy
%T Trust Model for Dependable File Exchange in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 49
%P 22-27
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing has ended up being a suitable decision for giving registering and storing assets particularly for little and medium estimated organizations lately. The "pay per use" expense model, on interest processing, substantial scale stockpiling asset with simple access and liberating clients from overseeing and keeping up assets are among the essential variables that have settled on cloud an alluring decision for such administrations. The issue of low trust on distributed computing is an obstruction, one of the significant snag to its pervasive organization, especially if there should arise an occurrence of basic information storage on the suppliers datacenter. This paper displays a model for trust in cloud computing. Representing vital components which shape the clients trust and a method for assessing every component's significance

References
  1. Minqi Thou, Rong Zhang, Dadan Zeng, and Veining Qian, "Serkikin the cloud computing 11'. era: a survey." Software Engineering Institute. Universal Communication. Symposium (IUCS), 4th International. IEEE Shanghai. pp. 40-46. China. 9784-4244-7821-7 (2010).
  2. Xue ling and Zhang lian.jun, "A Brief Survey on the Security Model of Cloud Corn ♦ 2010 Ninth International Symposium on Disaibuted Computing and Applications to- Engineering and Science (DCA BES). Hong Kong IEEE. pp. 475- 478. Aug 2010. 11l
  3. P. Melt and T. Grance, "Draft nist working definition of cloud computing - v15," 21. Aug 7 'Elli. 2009. "
  4. T. Dillon, Chen Wu, and E. Chang, "Cloud Computing: Issues and Challenges," 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 27-13. Australia, 2010. ,eksiv
  5. Xian-Yong Li, Li-Tao Zhou. Yong Shl, and MI Guo. Trusted Computing Environment J, Model in Cloud Architecture," Proceedings of the Ninth International Conference on Machine/8.1 Learning and Cybernetics, 978•1-4244-6526-2. Qingdao. pp. 11-14. China. July 2010.
  6. A. Marinos and G. Briscoe, "Community cloud computing." in First International Conference Cloud Computing. CloudC.om, volume 5931 of Lecture Notes in Computer Science. pp. 472- ,-, 484. Springer (2009).
  7. HTakabi. 1 B. D. Joshi, and G. Ahn, "SecurityaitntiMeytelallenges in Cl .6.1 Enviriannien, ts," IEEE Security d Privacy, vol. 8, no 6,.pp...24-31, Noik/Dec. 2010, /1/2" 1-00819.1109/MSP.2010.186.
  8. Masted Computing Platform," Intelligent Computation Technology and Automation (ICICTA), IEEE International Conference on Volume: 1, pp. 942-945. China. 2010.
  9. lluan-Chung Li, Po.11uei Ilan& 1 iann-M in Yang, and Shiang-Jiun Chen, "Analysts \<(4,_ '410._ cloud- Based Security Vulnerability Assessment," 2010 IEEE 7th International Con Clilusinas Engineering (ICEBE), pp. 490.494, 2010.
  10. C Popovic and Z. Ilocenski, "Cloud computing security issues andchallenges," M1PRO, 2010 Proceedings of the 33rd International Convention, pp. 344-349. 24.28 May 2010 URL: hup:theeexploreleeenrg/stampistamp.jsp?tp=&arnumber=Scrt317&isournbern5533310.
  11. S. Uppoor, M. Flourlk-and A. Bilas, "Cloud-based synchronization of distributed file system International Conference, pp. 1-4. 2010. WORKSHOP, hierarchies," Cluster Computing Workshops and Posters (CLUSTER ')
  12. Qintaong Wei, Bharadwaj Veeravalli. Bozhao Gong. Lineang Zeng• and Dan Fen,, "C.DRM: A Cost-Effective Dynamic Replication Management Stheme for Cloud Storage Cluster," 2009 IEEE International Conference on Cluster Computing (CLUSTER), pp. 188-196, 2010.
  13. S. P. Marsh,"Fommlising Trust as a Computational Concept", Ph.D. Thesis, University of Stirling, 1994.
  14. T. Beth, M. Borcherding, and B. Klein, "Valuation of oust in open networks," In ESORICS 94. Brighton, UK, November 1994.
  15. A. Josang and R. Ismail, "The Beta Reputation System," In Proceedings of the 15th Bled Electronic Commerce Conference, pp. 17-19. June 2002.
  16. A. Abdul-Rahman and S. Hallos, "A distributed trust model," In Proceedings of the 1997 New Security Paradigms Workshop, pp. 48-60, 1998.
  17. Zhidong Shen, Li Li, Fei Yan, and Xiaoping Wu, "Cloud Computing System Based on Trusted Computing Pladorm." Intelligent Computation Technology and Automation (1CICTA), IEEE International Conference on Volume: I, pp. 942-945. China. 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Service Trust Cloud Computing File system Integrity Reputation Security and Trust