CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

User Level Trust Evaluation in Cloud Computing

by Yashashree Bendale, Seema Shah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 24
Year of Publication: 2013
Authors: Yashashree Bendale, Seema Shah
10.5120/12122-8376

Yashashree Bendale, Seema Shah . User Level Trust Evaluation in Cloud Computing. International Journal of Computer Applications. 69, 24 ( May 2013), 31-35. DOI=10.5120/12122-8376

@article{ 10.5120/12122-8376,
author = { Yashashree Bendale, Seema Shah },
title = { User Level Trust Evaluation in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 24 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number24/12122-8376/ },
doi = { 10.5120/12122-8376 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:31:40.248434+05:30
%A Yashashree Bendale
%A Seema Shah
%T User Level Trust Evaluation in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 24
%P 31-35
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The cloud computing is a hot research area, because of its good features such as low investment, easy maintenance, flexibility, fast deployment and reliable service. At the same time, cloud computing can also reduce operating costs. The issue of trust is one of the biggest obstacles for usage of cloud computing. Today, one of the most important factors for the success of cloud computing is to build trust and security. Trust in cloud computing has a lot of issues like control, prevention, ownership and security. In this paper we have addressed the issue of trust in cloud computing. In cloud computing, users directly use and operate the software and operating system, and even basic programming environment and network infrastructure. So the impact and destruction for the software and hardware cloud resources in cloud computing are worse than the current internet users. Therefore, it is necessary to evaluate user's trustworthiness. So for evaluating the user level trustworthiness,we have defined policy based user level trust is evaluated. The User is categorized into different categories based on the user level trust value, number of policies violated and number of warnings received. This trust evaluation helps us to monitor the abnormal behavior of the user. Depending upon the user behavior, cloud service provider can restrict the user from accessing the cloud resources and also the user can be blacklisted.

References
  1. George Theodorakopoulos and John S. Baras "Trust Evaluation in AdHoc Networks" WiSE'04, October 1, 2004, Philadelphia, Pennsylvania, USA.
  2. Li Wen, Ping Lingdi, Lu Kuijun, Chen Xiaoping "Trust Model of Users' behavior in Trustworthy Internet" IEEE computer society 2009
  3. Qiang Guo, Dawei Sun, Guiran Chang, "Modeling and Evaluation of Trust in Cloud Computing Environments," 3rd International Conference on Advanced Computer Control (ICACC 2011)
  4. Khaled M. Khan and Qutaibah Malluhi "Establishing trust in cloud computing" IEEE october 2010.
  5. Tian Li-qin,LIN Chaung, "Evaluation of User Behavior Trust in Cloud Computing," International Conference on Computer Application and System Modeling, 2010
  6. Ni Yang, Tian Liqin ,Shen Xue-li " Behavior Trust Evaluation for Node in WSNs with Fuzzy-ANP Method", In the 2nd International Conference on Computer Engineering and Technology, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Trust User level Trust