Evaluating Trust and Selecting Cloud Database Services
International Journal of Mobile Computing and Application |
© 2017 by SSRG - IJMCA Journal |
Volume 4 Issue 3 |
Year of Publication : 2017 |
Authors : Yoman Warrick |
How to Cite?
Yoman Warrick, "Evaluating Trust and Selecting Cloud Database Services," SSRG International Journal of Mobile Computing and Application, vol. 4, no. 3, pp. 11-15, 2017. Crossref, https://doi.org/10.14445/23939141/IJMCA-V4I6P103
Abstract:
In a cloud environment, third party measured benefit distribution cloud databases is the motivation for search of trust. Lack of trust performs to be a possible main reason for fear when outsourcing databases. Research prose appraisals designate that the architecture of cloud databases has a possible to moderate user suspicion. In this paper, the evaluating trust in cloud database services based on user particular comparative or through factors. Our study suggests a recognized trust mechanism in cloud databases where the user can choice his most trusted Cloud Service Provider.
Keywords:
Cloud Computing, Database as a Service, Cloud Trust.
References:
[1] W.P.E. Priyadarshani, G.N. Wikramanayake, and L.M. Batten, "Enhancement of user level controls in cloud databases", 30th National Information Technology Conference (NITC), Computer Society of Sri Lanka, Colombo, Sri Lanka, 2012, pp. 46–53.
[2] A.A. Friedman, and D.M. West, "Privacy and security in cloud computing", Center for Technology Innovation at Brookings, 2010.
[3] S.S.E. Thorpe, "Modeling a trust cloud context", 3rd workshop on Ph.D. students in information and knowledge management, ACM New York, USA, 2010, pp. 95–98.
[4] M.S. Blumenthal, "Is Security Lost in the Clouds?", Communications and Strategies,2011, 81(1), pp. 69– 86.
[5] V.A. Talasila and Peruri, A Secure Privacy Preserving Storage Architecture of Cloud Database, International Journal of Computer Science Engineering and Technology (IJCSET), 2011, 1(9), pp. 587-595.
[6] M.A. Alzain, and E. Pardede, "Using Multi Shares for Ensuring Privacy in Database-as-a-Service", 44th Hawaii International Conference on System Sciences (HICSS),2011, pp. 1–9.
[7] A. Bessani, M. Correia, B. Quaresma, F. Andr´e, and P. Sousa, "DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds", 6th Conference on Computer Systems, 2011, 31–46.
[8] S. Johnston, Cloud Computing and Privacy, Retrieved from www.circleid.com/posts/89163, 2008.
[9] K.D. Bowers, A. Juels, and A. Oprea, "HAIL: a high availability and integrity layer for cloud storage", 16th ACM Conference on Computer and Communications Security, ACM New York, USA, 2009, pp. 187–198.
[10] N. Santos, K.P. Gummadi, and R. Rodrigues, "Towards trusted cloud computing", Conference on Hot topics in cloud computing", Article 3, USENIX Association Berkeley, CA, USA, 2009.
[11] J. Namjoshi, and A. Gupte, ―Service oriented architecture for cloud based travel reservation software as a service, In Cloud Computing,CLOUD'09. IEEE International Conference on IEEE, 2009, pp. 147-150.
[12] D. Molnar, and S. Schechter, "Self-Hosting vs. Cloud Hosting: Accounting for the security impact of Hosting in the Cloud", Proceedings of the Ninth Workshop on the Economics of Information Security (WEIS), 2010.
[13] R.L. Grossman, Y. Gu, M. Sabala, and W. Zhang, ―Compute and storage clouds using wide area high performance networks, Future Generation Computer Systems, 2009, 25(2), pp. 179-183.
[14] Costa, C. Ana, and K. Bijlsma-Frankema, "Trust and Control Interrelations New Perspectives on the Trust—Control Nexus", Group & Organization Management, 2007, 32(4), pp. 392-406.
[15] Lund, M. Soldal, B. Solhaug, and K. Stølen , "Evolution in Relation to Risk and Trust Management.", IEEE Computer, 2010, 43(5), pp. 49-55.