Reference Hub1
Trust Relationship Establishment Among Multiple Cloud Service Provider

Trust Relationship Establishment Among Multiple Cloud Service Provider

Abhishek Majumder, Samir Nath, Arpita Bhattacharjee, Ranjita Choudhury
Copyright: © 2018 |Pages: 34
ISBN13: 9781522530381|ISBN10: 152253038X|EISBN13: 9781522530398
DOI: 10.4018/978-1-5225-3038-1.ch014
Cite Chapter Cite Chapter

MLA

Majumder, Abhishek, et al. "Trust Relationship Establishment Among Multiple Cloud Service Provider." Cloud Computing Technologies for Green Enterprises, edited by Kashif Munir, IGI Global, 2018, pp. 351-384. https://doi.org/10.4018/978-1-5225-3038-1.ch014

APA

Majumder, A., Nath, S., Bhattacharjee, A., & Choudhury, R. (2018). Trust Relationship Establishment Among Multiple Cloud Service Provider. In K. Munir (Ed.), Cloud Computing Technologies for Green Enterprises (pp. 351-384). IGI Global. https://doi.org/10.4018/978-1-5225-3038-1.ch014

Chicago

Majumder, Abhishek, et al. "Trust Relationship Establishment Among Multiple Cloud Service Provider." In Cloud Computing Technologies for Green Enterprises, edited by Kashif Munir, 351-384. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-3038-1.ch014

Export Reference

Mendeley
Favorite

Abstract

Trust relationships among multiple Cloud Service Providers is a concept in which multiple cloud service providers from multiple distributed Identity Provider can access resources of each other, only if they are trusted with their Identity Provider. In this chapter a scheme has been proposed to enhance the security of data in a multi-cloud environment by improving trust relationships among multiple clouds. The scheme is also designed to overcome interoperability problem between different clouds. In the proposed scheme concept of proxy is used. Client organization tries to communicate with multiple cloud service providers through proxy. Client organization send resource request to cloud service providers. On receiving the resource request the cloud service provider collect the authentication confirmation from proxy. Then it sends the reply and data to requested client organization. Numerical analysis and comparative study of the proposed scheme with some of the existing scheme has been carried out.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.