RTMDC for Effective Cloud Data Security

  • Pankaj VermaEmail author
  • Nilima DongreEmail author
  • Vijaylaxmi BittalEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 33)


In today’s world, almost everything has been digitised and hence the cloud computing is emerging as a boom in its field. But the most disturbing fact is that the cloud computing also appears as a vulnerable platform and therefore the security becomes the most important aspect in the cloud computing applications. Security issues are mainly dealt with known and unknown threats, malware and network access by unknown or unauthorised users. Hence, it has become a fundamental feature to create a secure platform for the cloud computing technologies. In this scenario, we proposed a RTMDC (Reputation based Trust Management system with Data Colouring) systems, which builds and tests a secure platform using Reputation Based Trust Management technique. Reputation based trust factor is then calculated using the collective reviews given by the users. This research work focuses on the images that has been related to the cloud users.




  1. 1.
    Shaik Hussain, S.I., Yuvaraj, V.: A secure data access control method using AES for P2P storage cloud. IEEE (2015)Google Scholar
  2. 2.
    He, H., Li, R., Dong, X., Zhang, Z.: Secure, efficient and fine-grained data access control mechanism for P2P storage cloud. IEEE (2014)Google Scholar
  3. 3.
    Manjusha, R., Ramachandran, R.: Sharing data in cloud based on Trust Attribute Based Encryption (TABE). ARPN J. Eng. Appl. Sci. 10(9), 3 (2015)Google Scholar
  4. 4.
    Bonatti, P., Duma, C., Olmedilla, D., Shahmehri, N.: An integration of reputation-based and policy based trust managementGoogle Scholar
  5. 5.
    Liu, Y.-C., Ma, Y.-T., Zhang, H.-S., Li, D.-Y., Chen, G.-S.: A method for trust management in cloud computing: data coloring by cloud watermarking. Int. J. Autom. Comput. 8(3), 280 (2011)CrossRefGoogle Scholar
  6. 6.
    Banerjee, A., Neogy, S., Chowdhury, C.: Reputation based trust management system for MANET. In: Third International Conference on Emerging Applications of Information Technology (EAIT) (2012)Google Scholar
  7. 7.
    Selcuk, A.A., Uzun, E., Pariente, M.R.: A reputation-based trust management system for P2P networks. Int. J. Netw. Secur. 6(3), 235–245 (2008)Google Scholar
  8. 8.
    Noor, T.H., Sheng, Q.Z., Yao, L., Dustdar, S., Ngu, A.H.H.: CloudArmor: supporting reputation-based trust management for cloud services. IEEE Trans. Parallel Distrib. Syst. 27(2), 367–380 (2015)CrossRefGoogle Scholar
  9. 9.
    Nitya Lakshmi, R., Laavanya, R., Meenakshi, M., Suresh Gana Dhas, C.: Analysis of attribute based encryption schemes. Int. J. Comput. Sci. Eng. Commun. 3(3), 1076–1081 (2015)Google Scholar
  10. 10.
    Saravana Kumar, N., Rajya Lakshmi, G.V., Balamurugan, B.: Enhanced attribute based encryption for cloud computing. In: International Conference on Information and Communication Technologies (ICICT 2014) (2014)Google Scholar
  11. 11.
    Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE (2010)Google Scholar
  12. 12.
    Chadha, K., Bajpai, A.: Security aspects of cloud computing. Int. J. Comput. Appl. 40(8), 43–47 (2012)Google Scholar
  13. 13.
    Security for Cloud Computing Ten Steps to Ensure Success: Cloud Standards Customer Council (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of ITRAITNavi MumbaiIndia
  2. 2.Department of CScRAITNavi MumbaiIndia

Personalised recommendations