Academia.eduAcademia.edu

Outline

Analyzing Privacy Issues in Cloud Computing Using Trust Model

2019

https://doi.org/10.1007/978-981-13-1217-5_102

Abstract

In the ever-increasing usage of Internet, a new paradigm of pervasive and ubiquitous cloud computing has evolved for providing computing delivery services. This has infused an increased interest amongst researchers and industry/user due to its ease in scalability and provisioning of computing resources on demand. It has caused concerns amongst its users on security, privacy, and trust-related issues. Therefore, it is essential to address these concerns, especially the privacy issues. In this paper, privacy issues concerning the cloud user are analyzed using trust model for taking effective measures in protecting the privacy of cloud users.

References (19)

  1. Justice and fundamental rights, https://ec.europa.eu/info/strategy/justice-and-fundamental- rights_en
  2. S. Ahmad, B. Ahmad, S.M. Saqib, R.M. Khattak, Trust model: Clouds provider and clouds user. Int. J. Adv. Sci. Technol. 44, 69-80 (2012)
  3. T. Beth, M. Borcherding, B. Klein, Valuation of trust in open networks, in Computer Security ESORICS, vol. 94 (1994), pp. 1-18
  4. R. Buyya, J. Broberg, A.M. Goscinski. Cloud Computing: principles and paradigms, vol. 87 (Wiley, 2010)
  5. E.D. Canedo, R.T. de_Sousa Junior, R. de_Oliveira Albuquerque, F.L.L. de Mendonça, File exchange in a private cloud supported by a trust model, in 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) (IEEE, 2012), pp. 89-96
  6. S.P.P.S, Commission. Personal privacy in an information society: the report of the Privacy Protection Study Commission, vol. 1. The Commission: for sale by the Supt. of Docs., US Govt. Print. Off., 1977
  7. Organisation for Economic Co-operation and Development. Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. OECD, 1981
  8. S.K. Garg, S. Versteeg, R. Buyya, A framework for ranking of cloud computing services. Future Gener. Comput. Syst. 29(4), 1012-1023 (2013)
  9. M.K. Goyal, A. Aggarwal, P. Gupta, P. Kumar, Qos based trust management model for cloud IaaS, in 2012 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC) (IEEE, 2012), pp. 843-847
  10. W. House, Consumer data privacy in a networked world: a framework for protecting privacy and promoting innovation in the global digital economy. Feb 2012
  11. W. Jansen, T. Grance, Sp 800-144, Guidelines on Security and Privacy in Public Cloud Com- puting (National Institute of Standards & Technology, Gaithersburg, MD, 2011)
  12. A. Josang, R. Ismail, The beta reputation system, in Proceedings of the 15th Bled Electronic Commerce Conference, vol. 5 (2002), pp. 2502-2511
  13. X. Li, M. R. Lyu, J. Liu, A trust model based routing protocol for secure ad hoc networks, in 2004 Proceedings of 2004 IEEE Conference on Aerospace, vol. 2 (IEEE, 2004), pp. 1286-1295
  14. S.P. Marsh, Formalising Trust as a Computational Concept (1994)
  15. M.K. Naseer, S. Jabbar, I. Zafar, A novel trust model for selection of cloud service provider, in2014 World Symposium on Computer Applications & Research (WSCAR) (IEEE, 2014), pp. 1-6
  16. S. Pearson, Privacy, security and trust in cloud computing, in Privacy and Security for Cloud Computing (Springer, 2013), pp. 3-42
  17. J. Ruiter, M. Warnier, Privacy regulations for cloud computing: compliance and implementa- tion in theory and practice, in Computers, privacy and data protection: an element of choice (Springer, 2011), pp. 361-376
  18. Z. Shen, L. Li, F. Yan, and X. Wu. Cloud computing system based on trusted computing plat- form. In 2010 International Conference on Intelligent Computation Technology and Automation (ICICTA), vol. 1 (IEEE, 2010), pp. 942-945
  19. Z. Yang, L. Qiao, C. Liu, C. Yang, G. Wan, A collaborative trust model of firewall-through based on cloud computing, in 2010 14th international conference on Computer supported cooperative work in design (CSCWD) (IEEE, 2010), pp. 329-334