TRUST EVALUATION & ENHANCEMENT: AN APPARATUS TO GET COMPETITIVE ADVANTAGE

Archana B Saxena, Dr. Meenu Dave

Abstract


The reparations offered by cloud computing, make it admired & accepted among enterprises and individuals.  This IT paradigm has seen a sharp rise in the last one and half decade.  At its infancy stage, this technology has changed every body's perception of storage, infrastructure, software installation, software support, and development.   The credit goes to the architecture of the technology which makes it possible to offer premium resources at economical prices, scalability of resources depending upon requirements and the most important financials are based on usage.  In this success & acceptance ride, technology also had its share of breakers Like security, Trust, Privacy. These hurdles are making current and future consumers hesitant about adopting the technology.  

Along with technology growth, last few years have witnessed a sharp rise in security lapse cases.  These incidences are raising questions about security & privacy of data and information and finally leaving marks on the "Trust" relation between service consumer and service provider.  In order to strengthen the relationship with service consumer,  it is the responsibility of the provider to endow consumers with secure enclosures to keep their data and information protected.  Standards and certifications are considered as best practices for providing security assurances in Information Technology.  The objective of the paper is to design a framework that can help the provider to overcome this un-trusty situation, by converting one of the hesitant factors "Trust" into competitive advantage component by attaining suggested certifications or adopting recommended standards. 


Full Text:

PDF

References


L. Qian, Z. Luo, Y. Du and L. Guo, "Cloud Computing: An Overview," in Conference on Cloud Computing, Beijing, China, 2009.

A. Lee-Post and R. Pakath, "Cloud Computing: A Comprehensive Introduction," in Security, Trust and Regulatory Aspects of Cloud Computing in business Environment, Texas, USA, IGI Global, 2014, pp. 1-23.

D. Vats and B. Kumar, "DIGITAL INDIA: AN INITIATIVE to TRANSFORM INDIA INTO A DIGITALLY EMPOWERED SOCIETY," International Journal of Science Technology and Management, pp. 543-547, 2017.

"Cloud computing crucial to Digital India, need safe practices’, say, experts," [Online]. Available: https://indianexpress.com/article/technology/tech-news-technology/cloud-computing-crucial-to-digital-india-need-safe-practices-4463667/. [Accessed 11th September 2018].

D. Marinescu, Cloud Computing Theory and Practice, NewYork, USA: Elsevier, 2017.

L. Wang, G. v. Laszewski, M. Kunze and J. Tao, "Cloud Computing: A Prospective Study," in Cloud Computing: Benefits, Risks, and Recommendations for Information Security, Berlin, Heidelberg, Springer, 2010, pp. 1-12.

Y. Jadeja and K. Modi, "Cloud Computing - Concepts, Architecture and Challenges," in ICCEET- International Conference on Computing, Electronics and Electrical Technologies, Kumaracoil, India, 2012.

K. Hashizume, D. G. Rosado, E. Fernández-Medina and E. B. Fernandez, "An analysis of security issues for cloud computing," Journal of Internet Services and Applications, pp. 4-7, 2013.

M. Ali, S. U. Khan, and A. V. Vasilakos, "Security in Cloud Computing: Opportunities and Challenges," Information Sciences, pp. 357-383, 2015.

A. Jagtap, A. Kamanache, Y. Sharma and S. Rathi, "Trust model for Cloud Computing," VJER- Vishwakarma Journal of Engineering Research, pp. 251-254, 2017.

P. Manuel, "A Trust Model of Cloud Computing Based on Quality of Services," Annals of Operation Research, pp. 1-12, 2013.

M. Alhamad, T. Dillon and E. Chang, "SLA-Based Trust Model for Cloud Computing," in International Conference on Network-Based Information System, Takayama, 2010.

W. Li and L. Ping, "Trust Model to Enhance Security and Interoperability of Cloud Environment," in First Internation Conference Cloud Com-2009, China, Beijing, 2009.

P. S. Hada, R. Singh, and M. M. Meghwal, "Security Agents: A mobile Agent-Based Trust Model for Cloud Computing," International Journal of Computer Applications, pp. 12-15, 2011.

H. Takabi, J. B. D. Joshi and G. J. Ahn, "Secure Cloud: Towards a Comprehensive Security Framework for Cloud Computing Environments," in 34th Annual IEEE Computer Software and Applications Conference Workshops, Seoul, South Korea, 2010.

G. Yimin, G. Yajun, P. Fei and G. Huidan, "The Intrinsic Relationship between Security Mechanisms and Trust Mechanisms," in International Conference on Applied Informatics and Communication, Heidelberg, 2011.

N. Lewis, "Federal-IT-budget-Look-for-security-cloud-spending-in-2018," 27 November 2018. [Online]. Available: https://searchitchannel.techtarget.com/feature/Federal-IT-budget-Look-for-security-cloud-spending-in-2018. [Accessed 27 November 2018].

"Data Breach In The Cloud – 2018 Trends That IT Pros Must Think," [Online]. Available: https://www.cloudcodes.com/blog/data-breach-in-the-cloud.html. [Accessed 27 November 2018].

"6 Top Cloud Security Threats in 2018," 13 Feburary 2018. [Online]. Available: https://www.tripwire.com/state-of-security/security-data-protection/cloud/top-cloud-security-threats/. [Accessed 27 November 2018].

D. M. Dawe and B. A. Saxena, "Loss of Trust at IAAS: Causing Factor and Mitigation Techniques," in International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN 2017), Gurgaon, Haryana, 2017.

B. S. Archana and D. Meenu, "IAAS service in Public Domain: Impact of Various Security Components on Trust," in International Conference on Information and Communication Technology for Sustainable Development ICT4SD 2018, GOA, INDIA, 2018.

C. Baudoin and R. Devlin, "Cloud Security Standards: What to Expect and what to Negotiate Version 2.0," Cloud Standards Customers Council, 2016.

"Cloud Service Level Agreement Standardisation Guidelines," CSIG Memebers, Brussels, 2014.

N. Robinson, L. Valeri, J. Cave, T. Starkey, H. Graux, S. Creese and P. Hopkins, "The Cloud: Understanding the Security, Privacy and Trust Challenges," Cambridge, United Kingdom, 2010.

S. Almulla and C.. Y. Yeun, "Cloud Computing Security Management," in 2nd Engineering Systems Management and Its Applications (ICESMA), Sharjah, United Arab Emirates, 2010.


Refbacks

  • There are currently no refbacks.