Enhancement of Cloud Security and Strength of Service Using Trust Model

  • Pragati Prakash
  • Nidhi Ekka
  • Tanmay Kathane
  • Nishi YadavEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)


Cloud Computing involves delivering hosted services over the internet. These services are broadly classified into three categories: Software-as-a-service (SaaS), Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS). The abstracted power of hardware and software accessed over the Internet, created and disposed off efficiently, are dynamically scalable through a variety based on measurable usage. This paper deals with the classification of cloud layers and measures trust value for cloud service providers using fuzzy logic centroid method of defuzzification. We have used three parameters, reliability, availability and turn-around time for evaluating trust. With this trust value, the strength and security of cloud service are enhanced as compared to that in Trust Model for Measuring Security Strength of Cloud Computing Service [5]. The advantage of using this model is that it is more convenient and the trust is evaluated using lesser parameters.


Cloud computing Service provider Trust model Fuzzy logic Reliability Availability Turnaround time Cloud security Issues and challenges 


  1. 1.
    Hashizume, K., Rosado, D.G., Fernández-Medina, E., et al.: J. Internet Serv. Appl. 4, 5 (2013)CrossRefGoogle Scholar
  2. 2.
    Marinos, A., Briscoe, G.: Community cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. CloudCom 2009. Lecture Notes in Computer Science, vol. 5931. Springer, Berlin (2009)CrossRefGoogle Scholar
  3. 3.
    Bhadauria, R., Sanyal, S.: Survey on security issues in cloud computing and associated Mitigation techniques. Int. J. Comput. Appl. 47(18), 47–66 (2012)Google Scholar
  4. 4.
    Huang, J., Nicol, D.M.: J. Cloud Comput. 2, 9 (2013). Scholar
  5. 5.
    Shaikh, R., Mukundan, S.: Trust model for measuring security strength of cloud computing service. Procedia Comput. Sci. 45, 380–389 (2015). Scholar
  6. 6.
    Peng, Y., Zhao, W., Xie, F., Dai, Z., Gao, Y., Chen, D.: Secure cloud storage based on cryptographic techniques. J. China Univ. Posts Telecommun. 19, 182–189 (2012). Scholar
  7. 7.
    Goodarzi, K., Karimi, A.: Cloud computing security by integrating classical encryption. Procedia Comput. Sci. 42, 320–326 (2014). Scholar
  8. 8.
    Coviello Jr., A.W., Elias, H.D., Gelsinger, P., McAnif, R., EMC: Proof, not promises: creating the trusted cloud. EMC (2011).
  9. 9.
    Banirostam, H., Hedayati, A., Zadeh, A.K., Shamsinezhad, E.: A trust based approach for increasing security in cloud computing (2013)Google Scholar
  10. 10.
    Hussain, M., Abdulsalam, H.: SECaaS: security as a service for cloud-based applications (2011).
  11. 11.
  12. 12.
    Vaikunth Pai, N.: Cloud computing security issues and challenges. In: Recent Trends in Computing and Information Technology, pp. 167–174. Srinivas Institute of Management Studies, Karnataka (2014)Google Scholar
  13. 13.
  14. 14.
  15. 15.
    Columbus, L.: KPMG’s 2014 Cloud Computing Survey: Enterprises Quickly Moving Beyond Cost Reduction to Customer-Driven Results. 2014 Cloud Survey report-KPMG. KPMG International (2014)Google Scholar
  16. 16.
    Singh, J.: Study of Response Time in Cloud Computing, MECS, October 2014. Scholar
  17. 17.
  18. 18.
    Vishwanath, K.V., Nagappan, N.: Characterizing cloud computing hardware reliability.
  19. 19.
    Srinivasan, S.: Cloud Computing Basics. Springer, Berlin (2014). Scholar
  20. 20.
    Ritu, S.J.: A trust model in cloud computing based on fuzzy logic. In: 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (2016)Google Scholar
  21. 21.
  22. 22.
  23. 23.
  24. 24.
  25. 25.
  26. 26.
  27. 27.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Pragati Prakash
    • 1
  • Nidhi Ekka
    • 1
  • Tanmay Kathane
    • 1
  • Nishi Yadav
    • 1
    Email author
  1. 1.Department of Computer Science and EngineeringGuru Ghasidas VishwavidyalayaBilaspurIndia

Personalised recommendations