Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Introduction of Trust in Cloud Computing

Category: Computer Sciences Paper Type: Academic Writing Reference: APA Words: 2000

Cloud computing offers a network of interlinked computer and device systems that can be quickly controlled with minimum efforts in management. Usually, the practice is performed over the internet.  With various computing services, it provides a wide range of opportunities to the enterprises. In the current competitive environment, the elasticity, the service dynamism, and choices offered by this technology that is quite scalable, these are too efficient to be ignored by the enterprises.

However, such opportunities don’t come alone. They rain down with a shower of challenges as well. In this article, the meaning of trust together with its establishment in it are discussed. Furthermore, the challenges faced with their solutions are also confronted in this article [1]

Cloud computing opens a new door for the enterprises by offering various computing opportunities and services. The environment today is indeed quite competitive. So, when this efficient technology offers several choices, dynamism, and elasticity, enterprises cannot help but turn to it. However, opportunities never come alone, they have challenges in the pocket as well [2].

A new package of challenges has been offered by cloud computing in the form of different trust scenarios. For many enterprises, putting trust in cloud computing has become a significant concern. No, enterprises don't doubt the service providers of the cloud. They question the capabilities of the cloud. Still, such challenges don't depend entirely on the technology. The lack of consumer confidence also emerges from the smudgy security assurances, loss of data, and less transparency.

To close the gap between the cloud computing and the consumers, it is necessary to understand the trust problems first [3].

The meaning of trust of Trust in Cloud Computing

Trust is the strength of confidence and faith in something. The spirit seeks the results that are expected to be produced by something. It is the belief in the expertise and talent of others to care for the person and develop satiable effects. The trust of individuals lessens if a system concerning the skill provides insufficient data.

Consumers don’t need only the claims and assurances. They require the efficient results produced by the services for their benefits [4].

Control of Trust in Cloud Computing

For trust, power is quite a significant issue. If consumers don't have proper control over their assets, their confidence in the system will decrease. A usual example of control can be observed when individuals get the case from the ATM. They are assured that they will get the exact amount that they need. In other terms, they are controlling the money. The same opposite can be said when they are depositing. After all, they don't know just what will happen to their cash once they have collected it.

Similarly, if consumers have more control over the information delivered to the cloud, their trust in the cloud will increase [5].


                                                                         

Source: [6]

Figure 1: Cloud Computing

Ownership of Trust in Cloud Computing

The variation of trust can also be observed relying on the purchase of assets that concern the data. For example, if an employer is trusting a service with the credit more, his trust will lessen when he has to believe it with the credit card of his employee as well. After all, it is his objective to preserve the confidence of an employee [7].

Similarly, firms or enterprises when consigning the information to the cloud, it represents not only the enterprise's interest but also the clients'. It will create a relationship with twofold and faces. First of all, the enterprise to trust the cloud service provider for itself. Second, it must assure that the clients have almost the same reasons for believing the same service [4].

Prevention of Trust in Cloud Computing

For the establishment of trust, contractual relationships are mostly used. If the service is not offered according to the expectations, the firm will be compensated in a healthy environment of business. Similarly, the providers of cloud use the SLAs or service-level agreements to increase the trust of consumers. However, this might not be able to help in the case of cloud computing.

When it comes to trusting cloud computing, it is more like restricting a violation of trust rather than guaranteeing compensation in case of a breach. For many firms and enterprises, losing the data cannot be repaired. The extent of money cannot compensate for the precious information. The money can never improve Even the reputation. Therefore, the model of cloud computing should concentrate on preventing the failure rather than compensating [8].

Security of Trust in Cloud Computing

Guard plays the primary role in resisting a failure and nurturing trust in the methodologies of cloud computing. Notably, the protection of practical nature and environment must be provided by the providers of cloud service. After all, it allows them to perform actions and functions for various clients and provide individual services for several clients as well.

When it comes to virtualization, the main issues concerning the security are access control, data leakage, and persistent client-data security, and identity management, hindrance of attacks that concern the cross-VM side-channel, and VM protection or virtual machine protection.

Whether the security risks are enormous or small, their presence threatens the trust of consumers. Therefore, it is essential to prepare and eliminate such risks rather than losing the confidence of consumers [1].

Trust challenges of Trust in Cloud Computing

Say that there is a company named SoftCom, it handles digital images concerning the healthcare. These digital images are significant and confidential as well. Such vital data cannot be risked. The firm decides to use the public provided of cloud named CloudX. From the company, what would be the challenges?

                                                                                        

Source: [9]

Figure 2: Cloud computing challenges

Frail control of Trust in Cloud Computing

Soft Com finds that once the images leave the boundary, they don't have much control over these images anymore. Even the processes are not under their control so they cannot manipulate these images anymore. The company doesn't know who is accessing the data and which party is handling it.

In the cloud computing, this risks of losing the information, its integrity, and its availability are quite threatening when it comes to the trust. Virtually, cloud computing requires the users to loosen their grip when it comes to storing the data.

The degree of losing the control over the processes and the data depend on the model of cloud service. Typically, enterprises have only partial control over the information which their find quite dangerous and alarming. After all, the data is precious and losing it cannot be afforded [10].

Lack of confidentiality of Trust in Cloud Computing

Consumers think that a cloud is more threatening than a system in-house. However, improved secrecy in CloudX can help in covering the issue. The data in the cloud is not stored in a single device or a single location. It is actually processed and stored across the whole layer that is virtual. When it comes to the confidentiality, there are two issues. The first one involves the physical presence and location of processing and storage sites. The second is the secure identity or profiles of these locations or sites.

For the trust, an enterprise should know where and how the data is being processed. The security threats concerning the sites and quite high. After all, a company is accountable for the personal data of its clients [11].

                                                                                              

Source: [12]

Figure 2:  Cloud computing security challenges

How to solve these issues?

Since the data of Soft Com is significant, it is essential for CloudX to:

Notify SoftCom whenever someone accesses the data and the information that confidential.

The data must be not be copied from the images unauthorized. To copy the data, it must the need the permission of SoftCom first.

Destroy any residue that is not needed anymore. This way the confidentiality of the company will remain safe.

The company will also require additional assurances like of Trust in Cloud Computing

All applications must be reliable and must hold the data properly without damaging it at all. The processes must be trustworthy as well.

The knowledge about physical location must also be spread to the company. This way it will know where the information is being stored.

The security properties must be appropriately applied to the enterprise as well.

Sure, it will be daunting for the providers of cloud service. However, it is necessary for them if they want to actively build the consumer base [13].

Conclusion of Trust in Cloud Computing

Cloud computing delivers many new and efficient opportunities to enterprises. However, the risks and challenges threatening the trust of consumers are also present. For the service providers of the cloud to keep delivering successfully, they need to make sure that the enterprises have full control over the data. Some gaps are missing from the approach adopted by the cloud computing. Filling out these gaps requires the efforts. However, they ensure an efficient return from the consumers as well.

The security and safety of data are critical. Most of the enterprises don't tolerate when it comes to these factors. That is why it is essential to focus on such points and build the trust of consumers. To develop the confidence, only the quality is not necessary. The security, confidentiality, and control are also important. With some more efforts, CloudX computing can secure a secure room in the functioning of enterprises [14].

References of Trust in Cloud Computing

[1]

S. Nepal and M. Pathan, Security, Privacy and Trust in Cloud Systems, Springer Science & Business Media, 2013.

[2]

M. A. Ahmad Ali, A. Khan, M. Ilyas and M. S. Razzaq, "A Trust Management System Model for Cloud," IEEE, 2017.

[3]

S. Srinivasan, Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments, IGI Global, 2014.

[4]

S. S. Kirkman, "A Data Movement Policy Framework for Improving Trust in the Cloud Using Smart Contracts and Blockchains," IEEE International Conference on Cloud Engineering, pp. 270-273, 2018.

[5]

P. Manuel, "A trust model of cloud computing based on Quality of Service," Annals of Operations Research, 2013.

[6]

Teoriasdadenny.com, "Imposing Architecture Cloud Computing," 2018. [Online]. Available: http://teoriasdadenny.com/imposing-architecture-cloud-computing/.

[7]

M. K. Tripathi and V. K. Sehga, "Establishing Trst in Cloud Computing Security with the Help of Inter-Clouds," IEEE, pp. 1749-1752, 2014.

[8]

H. Krcmar, R. R. and B. Rumpe, Trusted Cloud Computing, Springer, 2014.

[9]

M. Carroll, A. V. D. Merwe and P. Kotze, "ecure cloud computing: Benefits, risks and controls," In Information Security South Africa (ISSA), pp. 1-9, 2011.

[10]

T. Erl, R. Cope and A. Naserpour, Cloud Computing Design Patterns, Prentice Hall, 2015.

[11]

L.-q. Tian, C. Lin and Y. Ni, "Evaluation of user behavior trust in cloud computing," In Computer Application and System Modeling (ICCASM), 2010 International Conference on, vol. 7, pp. V7-567, 2010.

[12]

M. Alghali, N. H. M. Alwi and R. Ismail, "Towards an Efficient Privacy in Cloud Based E-Learning," Data Mining and Information Technology, pp. 40-45, 2014.

[13]

A. Barsoum and A. Hasan, "Enabling dynamic data and indirect mutual trust for cloud computing storage systems.," IEEE transactions on parallel and distributed systems, vol. 24, no. 12, pp. 2375-2385, 2013.

[14]

T. H. Noor, Q. Z. Sheng and A. Bouguettaya, Trust Management in Cloud Services, Springer, 2014.

[15]

M. ALOUANE and H. E. BAKKALI, "Security, Privacy and Trust in Cloud Computing: A Comparative Study," IEEE, 2015.

[16]

A. S. Horvath and R. Agrawal, "Trust in Cloud Computing A User’s Perspective," IEEE, 2015.

[17]

E. F. Rawashdeh, I. I. Abuqaddom and A. A. Hudaib, "Trust Models for Services in Cloud Environment: A Survey," IEEE, pp. 175-180, 2018.

[18]

Y. Ruan and A. Durresi, "A Trust Management Framework for Cloud Computing Platforms," IEEE computer society, pp. 1146-1152, 2017.

[19]

Dawson, Maurice, Eltayeb, Mohamed, Omar and Marwan, Security Solutions for Hyperconnectivity and the Internet of Things, IGI Global, 2016.

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Rated Expert

ONLINE

Top Rated Expert

1869 Orders Completed

ECFX Market

ONLINE

Ecfx Market

63 Orders Completed

Assignments Hut

ONLINE

Assignments Hut

1428 Orders Completed