DocumentCode
3692673
Title
Configuring trust model for cloud computing: Decision exploration using fuzzy reasoning
Author
Manash Sarkar;Soumya Banerjee;Valentina E. Balas
Author_Institution
Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Ranchi, India
fYear
2015
Firstpage
219
Lastpage
223
Abstract
The concept of cloud computing enhances the on-demand network access expediently to share a pool of configurable resources. The major advantage of cloud computing has been accomplished by business organizations through the use of shared services, service-oriented architecture and virtualizations. Cloud computing is deployed by the third-party or web-based providers. Therefore, security component would be considered all the layers of the cloud architecture. In this paper, a secured and trusted cloud system is proposed. Security could be embedded in middleware architecture of the cloud system. Threats related to the cloud security are dynamic in nature and recurrently changing the types of attacks encountered over time. Therefore, a computationally intelligent and adaptive decision mechanism based on fuzzy rules is introduced to take a proper decision according to the contextual variables. Fuzzy decision maker identify the anomalies and sustain the trust of the cloud computing.
Keywords
"Cloud computing","Security","Yttrium","Mathematical model","Computer architecture","Computational modeling","Privacy"
Publisher
ieee
Conference_Titel
Intelligent Engineering Systems (INES), 2015 IEEE 19th International Conference on
Type
conf
DOI
10.1109/INES.2015.7329710
Filename
7329710
Link To Document