Skip to main content

SVM—A Way to Measure the Trust Ability of a Cloud Service Based on Rank

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 500))

Abstract

Trust management is one of the most serious and demanding issues facing by cloud computing. In spite of having some surprising qualities, such as virtualization potential, highly optimized storage capacity, multi-tenancy features, and 24-7 service availability, cloud technology still faces security and authenticity issues, which have created an obstacle for adapting cloud computing as a widespread technology. Threat is a qualitative factor rather than its quantitative approach. Trust is also a quality factor, which can be more useful when trust can be established and proven quantitatively. Previously, cloud users had to show blind faith towards cloud service providers and vendors. Today, the importance of cloud auditing has increased. This paper focuses on the establishment of trust and measuring the quality of service for SaaS cloud service model, by using some measurement indices and with the help of some known parameters.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Purohit GN, Jaiswal M, Pandey S (2012) Challenges involved in implementation of ERP on demand solution: cloud computing. Int J Comput Sci Issues 9(4):481–489

    Google Scholar 

  2. Sen S, Dey S, Roy D (2014) Design of quantifiable real-life security matrix for cloud computing. Int J Eng Sci Res Technol (IJESRT, India) 3(5):19–28

    Google Scholar 

  3. Bhise A, Phursule R (2017) Developing secure cloud storage system by integrating trust and cryptographic algorithms with role based access control. Int J Comput Appl, Found Comput Sci (New York, USA) 168(10):18–23. https://doi.org/10.1007/978-981-10-1678-3_13

  4. Blomqvist K (1997) The many faces of trust, Scandanavian journal of management. Sci Direct (Netherland) 3(13):271–286. https://doi.org/10.1016/s0956-5221(97)84644-1

    Article  Google Scholar 

  5. Li W et al (2012) Research on trust management strategies in cloud computing environment. J Comput Inf Syst (Zhongshan University, China) 4(4):1757–1767. https://doi.org/10.1016/j.kijoms.2016.06.002

  6. Chiregi M, Navimipour N (2016) Trusted services identification in the cloud environment using the topological metrics. Karbala Int J Mod Sci (Elsevier, Karbala, Iraq) 2(4):203–210. https://doi.org/10.1016/j.kijoms.2016.06.002

    Article  Google Scholar 

  7. Garg S, Versteeg S, Buyya R (2011) SMICloud: a framework for comparing and ranking cloud services. In: 4th IEEE international conference on utility and cloud computing, Washington DC, USA, December 2011, pp 210–218

    Google Scholar 

  8. Hogan M et al NIST cloud computing standard roadmap V 10.0, NIST whitepaper 500-291, July 2011, Dept of Commerce, USA

    Google Scholar 

  9. Mathur Mohit (2012) KLSI. Cloud computing black book, 1st edn. Wiley Publication, India

    Google Scholar 

  10. Tirodkar S et al (2014) Improved 3-dimensional security in cloud computing. Int J Comput Trends Technol (Seventh Sense Research Group, India) 5(9):242–247. https://doi.org/10.14445/22312803/ijctt-v9p145

  11. Dey S, Sen S Four dimensional security and vulnerability matrix for cloud (4-SVM). In: International conference of research in intelligent and computing in engineering, March 2017. Gopeswar, India, pp 165–169. https://doi.org/10.15439/2017r41

  12. Chou T (2013) Security threats on cloud computing vulnerabilities. Int J Comput Sci Inf Technol (AIRCC, Chennai, India) 5(3):79–88. https://doi.org/10.5121/ijcsit.2013.5306

  13. Singh U, Joshi C, Gaud N (2016) Information security assessment by quantifying risk level of network vulnerabilities. Int J Comput Appl; Found Comput Sci (New York, USA) 156(2):37–44. https://doi.org/10.5120/ijca20169123

  14. Huang J, Nicol DM (2013) Trust mechanisms for cloud computing. J Cloud Comput 2(1):1–14

    Google Scholar 

  15. Garsoux M (2013) COBIT5: ISACAs new framework for IT Governance, Risk, Security and Auditing. Whitepaper published by ISACA

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sharmistha Dey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dey, S., Solanki, V.K., Sen, S.K. (2019). SVM—A Way to Measure the Trust Ability of a Cloud Service Based on Rank. In: Kumar, A., Mozar, S. (eds) ICCCE 2018. ICCCE 2018. Lecture Notes in Electrical Engineering, vol 500. Springer, Singapore. https://doi.org/10.1007/978-981-13-0212-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0212-1_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0211-4

  • Online ISBN: 978-981-13-0212-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics