Analyzing trust concerns in public clouds using finite state automata

The perquisites of cloud computing as utility computing over conventional computing are quite evident yet not all users have come to fully embrace this new computing paradigm. The major concern regarding cloud computing is that of the associated security risks. Security risks keep users doubting whether to migrate to the cloud hence triggering trust concerns. Cloud service providers are tasked with the burden of proving to users that they are able to live up to the challenge. Many solutions have been suggested to mitigate cloud security challenges but trust concerns have always lurked in the background. This paper proposes the use of a conceptual finite state automaton to partition the various instances of cloud data into states and transitions. The security concerns of each state and transitions are henceforth analyzed with respect to trust concerns which arise under those respective instances. Since a finite state automaton is scalable, new emerging trust concerns can be addressed by integrating the security concerns they emanate from into new instances of states or transitions hence the flexibility of the proposed approach.

[1]  Saad T. Alharbi,et al.  Trust and Acceptance of Cloud Computing: A Revised UTAUT Model , 2014, 2014 International Conference on Computational Science and Computational Intelligence.

[2]  Kaiqi Xiong Resource Optimization and Security for Cloud Services , 2014 .

[3]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[4]  Kaiqi Xiong Resource Optimization and Security for Cloud Services: Xiong/Resource Optimization and Security for Cloud Services , 2014 .

[5]  Yingjie Yang,et al.  A Hybrid Trust Service Architecture for Cloud Computing , 2013, 2013 International Conference on Computer Sciences and Applications.

[6]  Prashant Pandey,et al.  Cloud computing , 2010, ICWET.

[7]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[8]  Prachi,et al.  Cloud Computing Security: Amazon Web Service , 2015, 2015 Fifth International Conference on Advanced Computing & Communication Technologies.

[9]  J. Lewis,et al.  Trust as a Social Reality , 1985 .

[10]  Erik M. van Raaij,et al.  The acceptance and use of a virtual learning environment in China , 2008, Comput. Educ..

[11]  Richard Lackes,et al.  Refuse to Walk on Clouds: Why Firms Still do Not Use Cloud Computing -- An Empirical Study of Barriers and Enhancers , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[12]  Raghu Yeluri,et al.  Cloud Computing Basics , 2014 .

[13]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[14]  Vivek Kumar Sehgal,et al.  Establishing trust in cloud computing security with the help of inter-clouds , 2014, 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies.

[15]  Rajeev Agrawal,et al.  Trust in cloud computing , 2015, SoutheastCon 2015.

[16]  Jim Suderman Contexts for trust in cloud-based services: An historical perspective , 2015, 2015 Digital Heritage.