Skip to main content

Secure Outlook View of Trustworthiness and Attacks in Cloud Computing

  • Conference paper
  • First Online:
  • 856 Accesses

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 98))

Abstract

Cloud computing has turned into an inexorably famous venture model where the assets are accessible on-request to the clients. It encourages in getting to the substance over the web autonomously with no reference to the fundamental facilitating framework. As of now, various kinds of trust model are led against the different cloud administrations and resources, which focus on their accessibility, administration level understandings, and execution. This paper displays a top to bottom investigation of the different sorts of the trust prediction model and attacks proposed for the cloud computing condition and groups them dependent on the Evidence based, Hardware based, Service Level Agreements (SLA) based and Secure Cloud based Trust. Furthermore, it gives a survey analysis of the vulnerabilities used in resource based attacks about the cutting edge arrangements introduced in the writing to avert, distinguish, or manage every sort of trustworthiness in the cloud computing environment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Shahzad, A., Litchfield, A.: Virtualization technology: cross-VM cache side channel attacks make it vulnerable. In: Australasian Conference on Information Systems 2015, Adelaide, South Australia, pp. 1–14 (2015)

    Google Scholar 

  2. Cayirci, E., De Oliveira, A.S.: Modelling trust and risk for cloud services. J. Cloud Comput. Adv. Syst. Appl. 7(14), 1–16 (2018)

    Google Scholar 

  3. Plummer, D.C., Bittman, T.J., Austin, T., Cearley, D.W., Smith, D.M.: Cloud computing: defining and describing an emerging phenomenon. In: Gartner Research, pp. 1–9 (2009)

    Google Scholar 

  4. El Kassabi, H.T., Serhani, M.A., Dssouli, R., Benatallah, B.: A multi-dimensional trust model for processing big data over competing clouds. IEEE Access 6, 39989–40007 (2018)

    Article  Google Scholar 

  5. Al-Aqrabi,H., Hill, R.: A scalable model for secure multiparty authentication, a distributed, parallel, and cluster computing (2019)

    Google Scholar 

  6. Jaiganesh, M., Kumar, A.: Fuzzy ART based User behaviour trust in cloud computing. In: Seventh International Conference on artificial Intelligence and Evolutionary Algorithms in Engineering Systems, Advances in Soft computing, vol. 324, pp 341–348 (2014)

    Google Scholar 

  7. Chase, J., Niyato, D., Wang, P.: A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Trans. Depend. Secure Comput. 16(4), 565–579 (2019)

    Article  Google Scholar 

  8. Lim, J., Yu, H., Gil, J.M.: Detecting sybil attacks in cloud computing environments based on fail-stop signature. Symmetry 9, 35 (2017)

    Article  Google Scholar 

  9. Karthiban, K., Smys, S.: Privacy preserving approaches in cloud computing. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC) 19 January 2018, pp. 462–467). IEEE (2018)

    Google Scholar 

  10. Challagidad, P.S., Reshmi, V.S., Birje, M.N.: Reputation based trust model in cloud computing. Internet Things Cloud Comput. 5(5–1), 5–12 (2017)

    Google Scholar 

  11. Fan, W., Yang, S., Pei, J.: A novel two-stage model for cloud service trustworthiness evaluation. Exp. Syst. 31(2), 136–153 (2014)

    Article  Google Scholar 

  12. Reese, G.: Cloud Application Architectures: Building Applications and Infrastructure in the Cloud. O’Reilly Media Publications, Boston (2009)

    Google Scholar 

  13. Kumawat, S., Tomar, D.: Sla-aware trust model for cloud service deployment. Int. J. Comput. Appl. 90(10) (2014)

    Google Scholar 

  14. Sridhar, S., Smys, S.: A survey on cloud security issues and challenges with possible measures. In: International Conference on Inventive Research in Engineering and Technology, VOL. 4 (2016)

    Google Scholar 

  15. Wang, Y., Wen, J., Wang, X., Tao, B., Zhou, W.: A cloud service trust evaluation model based on combining weights and gray correlation analysis. Secur. Commun. Netw. 2019, 11 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Mercy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mercy, S., Nagaraja, R., Jaiganesh, M. (2020). Secure Outlook View of Trustworthiness and Attacks in Cloud Computing. In: Smys, S., Bestak, R., Rocha, Á. (eds) Inventive Computation Technologies. ICICIT 2019. Lecture Notes in Networks and Systems, vol 98. Springer, Cham. https://doi.org/10.1007/978-3-030-33846-6_86

Download citation

Publish with us

Policies and ethics