Inspection of Trust Based Cloud Using Security and Capacity Management at an IaaS Level
نویسندگان
چکیده
منابع مشابه
A Novel Trust Management System for Cloud Computing - IaaS Providers
Trust is one of the most important means to improve the reliability of computing resources provided in cloud environment and it plays an important role in commercial cloud environments. Trust is the estimation of capability of a cloud resource in completing a task based on reputation, identity, behavior, and availability in the context of distributed environment. It helps customer in the select...
متن کاملA Holistic Trust Management Leasing Algorithm for IaaS Cloud
Trust is an important factor, in the exchange of services among multiple parties for example in cloud environment a large number of users interact in the form of resource provider and resource consumers. The resource consumer requests for computation service from the resource provider which provide service to the resource consumer. In this paper we proposed a trust management architecture that ...
متن کاملSecurity checklist for IaaS cloud deployments
In this article, we provide a cloud-security checklist for IaaS cloud deployments. The elements of the checklist are established by surveying the related literature on cloud-threat models and various security recommendations. We define the elements of the list on a level of abstraction that helps keep the size of the list manageable while preserving the lists practical applicability.
متن کاملRole-Centric Circle-of-Trust in Multi-tenant Cloud IaaS
Currently, collaboration is a major challenge in adopting cloud Infrastructure-as-a-Service (IaaS). Enterprise work-flow intrinsically mandates collaboration across its tenant boundaries as well as with associated organizations’ tenants in the cloud. In this paper, we investigate a Circle-of-Trust approach where tenants establish trust within a circle of tenants for the purpose of collaboration...
متن کاملTrust-Based Security Level Evaluation Using Bayesian Belief Networks
Security is not merely about technical solutions and patching vulnerabilities. Security is about trade-offs and adhering to realistic security needs, employed to support core business processes. Also, modern systems are subject to a highly competitive market, often demanding rapid development cycles, short life-time, short time-to-market, and small budgets. Security evaluation standards, such a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2018
ISSN: 1877-0509
DOI: 10.1016/j.procs.2018.05.044