• DocumentCode
    3692673
  • Title

    Configuring trust model for cloud computing: Decision exploration using fuzzy reasoning

  • Author

    Manash Sarkar;Soumya Banerjee;Valentina E. Balas

  • Author_Institution
    Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Ranchi, India
  • fYear
    2015
  • Firstpage
    219
  • Lastpage
    223
  • Abstract
    The concept of cloud computing enhances the on-demand network access expediently to share a pool of configurable resources. The major advantage of cloud computing has been accomplished by business organizations through the use of shared services, service-oriented architecture and virtualizations. Cloud computing is deployed by the third-party or web-based providers. Therefore, security component would be considered all the layers of the cloud architecture. In this paper, a secured and trusted cloud system is proposed. Security could be embedded in middleware architecture of the cloud system. Threats related to the cloud security are dynamic in nature and recurrently changing the types of attacks encountered over time. Therefore, a computationally intelligent and adaptive decision mechanism based on fuzzy rules is introduced to take a proper decision according to the contextual variables. Fuzzy decision maker identify the anomalies and sustain the trust of the cloud computing.
  • Keywords
    "Cloud computing","Security","Yttrium","Mathematical model","Computer architecture","Computational modeling","Privacy"
  • Publisher
    ieee
  • Conference_Titel
    Intelligent Engineering Systems (INES), 2015 IEEE 19th International Conference on
  • Type

    conf

  • DOI
    10.1109/INES.2015.7329710
  • Filename
    7329710