Assessment Criteria for Trust Models in Cloud Computing

Cloud computing is an emerging technology that provides elastic and flexible computing resources to the existing capabilities of business world. Besides several benefits of Cloud computing, there are still many challenging issues such as security and privacy of data stored on Cloud and lack of trust on Cloud service providers. Trust is one of the major barriers in the growth and adoption of Cloud by the IT industry due to absence of any reliable and efficient trust evaluation mechanism. Various trust management models have been proposed, but there exists no criteria to evaluate the effectiveness of these models in Cloud computing. In this regard, we have proposed an assessment criterion for the evaluation of trust models, containing the essential features that are mandatory for trust establishment in Cloud environment. We have also presented a detailed analysis of existing trust models and analyzed them with respect to our proposed assessment criteria. The assessment and analysis of trust models helps the customers to select the most appropriate and reliable model in accordance with their preferences and requirements.

[1]  Quan Z. Sheng,et al.  Trust as a Service: A Framework for Trust Management in Cloud Environments , 2011, WISE.

[2]  Dhananjay S. Phatak,et al.  Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing , 2010, TRUST.

[3]  Siani Pearson,et al.  Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[4]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[5]  Muttukrishnan Rajarajan,et al.  Trust Model for Optimized Cloud Services , 2012, IFIPTM.

[6]  Max Mühlhäuser,et al.  Trust as a facilitator in cloud computing: a survey , 2012, Journal of Cloud Computing: Advances, Systems and Applications.

[7]  Gui-Sheng Chen,et al.  A method for trust management in cloud computing: Data coloring by cloud watermarking , 2011, Int. J. Autom. Comput..

[8]  Khaled M. Khan,et al.  Establishing Trust in Cloud Computing , 2010, IT Professional.

[9]  He Xu,et al.  A Novel Weighted Trust Model based on Cloud , 2011 .

[10]  Yang Xiang,et al.  Trust Ticket Deployment: A Notion of a Data Owner's Trust in Cloud Computing , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[11]  Osman Ghazali,et al.  A trust computing mechanism for cloud computing , 2011, Proceedings of ITU Kaleidoscope 2011: The Fully Networked Human? - Innovations for Future Networks and Services (K-2011).

[12]  Xi He,et al.  Cloud Computing: a Perspective Study , 2010, New Generation Computing.

[13]  Chang Liu,et al.  A collaborative trust model of firewall-through based on Cloud Computing , 2010, The 2010 14th International Conference on Computer Supported Cooperative Work in Design.

[14]  Lea Kutvonen,et al.  Trust Management Survey , 2005, iTrust.

[15]  Guiran Chang,et al.  A Trust Management Model to Enhance Security of Cloud Computing Environments , 2011, 2011 Second International Conference on Networking and Distributed Computing.

[16]  Liu Chen,et al.  Notice of RetractionA Subjective Trust Model Based on Two-Dimensional Measurement , 2009, 2009 International Conference on Computer Engineering and Technology.

[17]  Samuel Paul Kaluvuri,et al.  Ensuring trust in service consumption through security certification , 2011, QASBA '11.

[18]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[19]  Lingdi Ping,et al.  Research on Trust Management Strategies in Cloud Computing Environment , 2012 .

[20]  Lingdi Ping,et al.  Trust Model to Enhance Security and Interoperability of Cloud Environment , 2009, CloudCom.

[21]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[22]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[23]  Tharam S. Dillon,et al.  SLA-Based Trust Model for Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.

[24]  Ian Lumb,et al.  A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[25]  J. H. P. Eloff,et al.  TRUST MODEL EVALUATION CRITERIA : A DETAILED ANALYSIS OF TRUST EVALUATION 1 , 2006 .

[26]  Woongsup Kim,et al.  A Trust Evaluation Model for QoS Guarantee in Cloud Systems , 2010 .

[27]  Shubhashis Sengupta,et al.  Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.

[28]  F. John Krautheim,et al.  Private Virtual Infrastructure for Cloud Computing , 2009, HotCloud.

[29]  Kai Hwang,et al.  Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[30]  Max Mühlhäuser,et al.  Towards a Trust Management System for Cloud Computing , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[31]  Andrew P. Martin,et al.  Trust in the Cloud , 2011, Inf. Secur. Tech. Rep..

[32]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[33]  Max Mühlhäuser,et al.  Cloud Computing Landscape and Research Challenges Regarding Trust and Reputation , 2010, 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing.

[34]  Jemal H. Abawajy,et al.  Establishing Trust in Hybrid Cloud Computing Environments , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[35]  Hiroyuki Sato,et al.  A Cloud Trust Model in a Security Aware Cloud , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.