Brief Study to Explore Trust and Security Challenges in Cloud Computing

Cloud Computing is an online strategy for dynamic allocation of services by reducing the usage of hardware and software resources. Existing models of cloud computing include different components: end-user computers, contact networks, access control frameworks, and software infrastructures. The data and the cloud infrastructure must be protected from any known and unknown attacks on all cloud platforms to achieve comprehensive cloud security. Trust issues arise from uncertainty about certain actions that can be defined through the concept of fuzzy belief. Trust is faith in quality provided by the cloud service provider and third-party agent on consumers and vice-versa where quality can be considered in terms of functionality, security, privacy, data safety, and reliability on cloud resources. Although the members of a social network have a strong level of trust, this trust may not be adequate in certain cases and becomes an obstacle in the successful implementation of cloud services. For example, a storage facility where users are vulnerable to missing, infected, or corrupted data, while providers are at risk of unknown data being hosted from their network. The relationship between two business partners decays more rapidly relative to the trust of users in the social network of the cloud. This paper aims to address the trust issues in existing cloud paradigms and highlights the existing flaws which will be resolved in the future course of action.

[1]  Haibin Zhu,et al.  A Cooperative Intrusion Detection Model for Cloud Computing Networks , 2014 .

[2]  Moutaz Haddara,et al.  The Future of ERP Systems: look backward before moving forward , 2012, CENTERIS 2012.

[3]  Kyle Chard,et al.  Social Cloud: Cloud Computing in Social Networks , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[4]  Javier López,et al.  A framework for enabling trust requirements in social cloud applications , 2013, Requirements Engineering.

[5]  Christian Haas,et al.  Foundations of Trust: Contextualising Trust in Social Clouds , 2012, 2012 Second International Conference on Cloud and Green Computing.

[6]  Tejaswi Avula,et al.  Efficient Use of Cloud Computing in Medical Science , 2012 .

[7]  Rajni Patil,et al.  Scaling in Cloud Computing , 2013 .

[8]  M. R. Warsi,et al.  Trust Management Issues in Cloud Computing Ecosystems , 2019, Social Science Research Network.

[9]  Marjan Kuchaki Rafsanjani,et al.  A survey on security challenges in cloud computing: issues, threats, and solutions , 2020, The Journal of Supercomputing.

[10]  Gary Garrison,et al.  Success factors for deploying cloud computing , 2012, CACM.

[11]  Jia Guo,et al.  A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..

[12]  Monika Khurana,et al.  Green cloud computing: The need of the hour , 2013 .

[13]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[14]  Xiao Chen,et al.  A Cloud-Based Trust Management Framework for Vehicular Social Networks , 2017, IEEE Access.

[15]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[16]  Arjan Durresi,et al.  A trust management framework for clouds , 2019, Comput. Commun..

[17]  Elhadj Benkhelifa,et al.  A systematic literature review of data governance and cloud data governance , 2018, Personal and Ubiquitous Computing.

[18]  Chuang-Chun Liu,et al.  The Financial Performance of Cloud Computing , 2013 .

[19]  Qing Li,et al.  Guest editorial: special issue on trust, privacy, and security in crowdsourcing computing , 2020, World Wide Web.

[20]  Ying Wang,et al.  Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud , 2017, IEEE Transactions on Big Data.

[21]  Anshu Parashar,et al.  Secure User Data in Cloud Computing Using Encryption Algorithms , 2013 .

[22]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[23]  Trevor Wood-Harper,et al.  A Framework Strategy to Overcome Trust Issues on Cloud Computing Adoption in Higher Education , 2020 .

[24]  Charu Gandhi,et al.  Capability Based Outsourced Data Access Control with Assured File Deletion and Efficient Revocation with Trust Factor in Cloud Computing , 2020, Int. J. Cloud Appl. Comput..

[25]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.