A Comprehensive Survey on Trust Issue and Its Deployed Models in Computing Environment

A Comprehensive Survey on Trust Issue and Its Deployed Models in Computing Environment

Shivani Jaswal (Chandigarh University, India) and Gurpreet Singh (Chandigarh University, India)
Copyright: © 2019 |Pages: 13
DOI: 10.4018/978-1-5225-8176-5.ch005
OnDemand PDF Download:
List Price: $37.50
10% Discount:-$3.75


Cloud computing is growing with a giant pace in today's world. The speed with which it is growing, the same speed is taken over by the insecure data transfer over the cloud. There are many security issues that are underlying in cloud computing. This chapter presents how a trust is built between any user and a cloud service provider. Various techniques have been adopted to calculate the value of trust and further how it can be strength. This chapter has also explained various trust models based on the necessities of a user. This chapter has also thrown some light over the concept of TTP, i.e., Trusted Third Party which further helps in maintaining trust over the cloud environment.
Chapter Preview

Trust In Cloud Computing

Security is considered as one of the most important field that needs to be handled in the emerging area of cloud computing. If security is not handled as per requirement, then there are high chances of failing of cloud computing environment as it involves management of personal sensitive information in a public network. The security which is provided by service a provider becomes an important factor to protect the network and its resources so as to fulfil the feature of vigorous and trustworthiness.

For the proper administration of cloud system and its services to take place, trust management models the trust based on various elements and entities. Several leading research groups both in academia and the industry are working in the area of trust management in cloud computing (Kumar et al, 2012).

Complete Chapter List

Search this Book: