{"title":"Hybrid Trust Management Model for Cloud Computing","authors":"Aya Salama A. Saleh, E. Hamed, M. Hashem","doi":"10.1109/ICCTA35431.2014.9521622","DOIUrl":null,"url":null,"abstract":"Trust has been a hotspot for adopting cloud computing. This paper proposes a hybrid model to build, evaluate and expose trust. It uses different techniques like sliding window technique to reach optimum processes for trust value delivery. Trust value is evaluated through integrated mechanisms from literature. Moreover, measuring trust included evaluating SLA violations side to side with consumer customized measures for validating trust. Caching module has been added to ensure optimization of querying trusted services. Moreover, service registry and novel personalized modules have been added for tracking both cloud providers and cloud consumers behaviors. Furthermore, a comparison between literature’s trust models and proposed model has been presented. It discusses criterion for building and evaluating trust. Finally, security analysis is presented to substitute different techniques against known security attacks.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTA35431.2014.9521622","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Trust has been a hotspot for adopting cloud computing. This paper proposes a hybrid model to build, evaluate and expose trust. It uses different techniques like sliding window technique to reach optimum processes for trust value delivery. Trust value is evaluated through integrated mechanisms from literature. Moreover, measuring trust included evaluating SLA violations side to side with consumer customized measures for validating trust. Caching module has been added to ensure optimization of querying trusted services. Moreover, service registry and novel personalized modules have been added for tracking both cloud providers and cloud consumers behaviors. Furthermore, a comparison between literature’s trust models and proposed model has been presented. It discusses criterion for building and evaluating trust. Finally, security analysis is presented to substitute different techniques against known security attacks.