Skip to main content

Development of Secured Trust SLA Model from SLA Life Cycle Phases

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 721))

Abstract

This is the era of Cloud Computing which shares on-demand computing resources and disposes off efficiently. It has a wide range of benefits for business and consumers. In spite of several benefits, there embeds numerous challenges such as data integrity, authenticity, data security, data locking, access control, data confidentiality, auditability, trust on cloud service provider, well management of service level agreement (SLA). Trust – is a key differentiator in defining the success or failure of many business companies. Service Level Agreement builds trust between cloud providers and cloud consumers. This research proposes a secured trust SLA model that builds trust on cloud service provider and helps in providing data security, confidentiality and integrity for cloud user.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Abadi, H.R., Hafshejani, S.N., Zadeh, F.K.: Considering factors that affect users’ online purchase intentions with using structural equation modeling. Interdisc. J. Contemp. Res. Bus. 3(8), 463–471 (2011)

    Google Scholar 

  • Ahmed, M., Hossain, M.A.: Cloud computing and security issues in the cloud. Int. J. Netw. Secur. Appl. (IJNSA) 6(1), 25–36 (2014)

    Google Scholar 

  • Ameen, S.Y., Nourildean, S.W.: Firewall and VPN investigation on cloud computing performance. Int. J. Comput. Sci. Eng. Surv. (IJCSES) 5(2), 15–25 (2014)

    Article  Google Scholar 

  • Data Integrity, November 2010. https://en.wikipedia.org

  • George, R.S., Sabitha, S.: Survey on data integrity in cloud computing. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(1), 123–125 (2013)

    Google Scholar 

  • Gupta, P.C.: Data Communications and Computer Networks. PHI, New Delhi (2011)

    Google Scholar 

  • Hussain, I., Ashraf, I.: Security issues in cloud computing - a review. Int. J. Adv. Netw. Appl. 6(2), 2240–2243 (2014)

    Google Scholar 

  • Joint, A., Baker, E., Eccles, E.: Hey, you, get off of that cloud? Comput. Law Secur. Rev. 25, 270–274 (2009)

    Article  Google Scholar 

  • Kant, C., Sharma, Y.: Enhanced security architecture for cloud data security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5), 570–575 (2013)

    Google Scholar 

  • Khorshed, T., Ali, A., Wasimi, S.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28, 833–851 (2012)

    Article  Google Scholar 

  • Kumar, A.: World of cloud computing & security. Int. J. Cloud Comput. Serv. Sci. 1(2), 53–58 (2012)

    Google Scholar 

  • Panse, D., Haritha, P.: Multi-factor authentication in cloud computing for data storage security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(8), 629–634 (2014)

    Google Scholar 

  • Rao, S., Gujrathi, S., Sanghvi, M., Shah, S.: Analysis on data integrity in cloud environment. IOSR J. Comput. Eng. (IOSR-JCE), 16(5) (2014). E-Issn: 2278-0661, P-Issn: 2278-8727

    Google Scholar 

  • Rawat, S., Chowdhary, R., Bansal, D.A.: Data integrity of Cloud Data Storages (CDSs) in cloud. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(3), 585–592 (2013)

    Google Scholar 

  • Ron, S., Aliko, P.: Service level agreements. Internet NG. Internet NG project (1999–2001) (2001). http://ing.ctit.utwente.nl/WU2/

  • Rubach, P.: Optimal resource allocation in federated metacomputing environments. Ph.D. thesis. Warsaw University of Technology, Electronics and Information Technology, Warsaw (2010)

    Google Scholar 

  • Ryan, P., Falvey, S.: Trust in the clouds. Comput. Law Secur. Rev. 28, 513–521 (2012)

    Article  Google Scholar 

  • Soofi, A.A., Khan, M., Fazal-E-Amin: Encryption techniques for cloud data confidentiality. Int. J. Grid Distrib. Comput. 7(4), 11–20 (2014)

    Article  Google Scholar 

  • Subramanyam, K.J., Hari, K.K.: The Proceedings of the International Conference on Information Engineering, Management and Security (2014)

    Google Scholar 

  • Talib, A.: Ensuring security, confidentiality and fine-grained data access control of cloud data storage implementation environment. J. Inf. Secur. 6, 118–130 (2015)

    Google Scholar 

  • Ziyad, S., Rehman, S.: Critical review of authentication mechanisms in cloud computing. IJCSI Int. J. Comput. Sci. Issues 11(3), 145–149 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manjula Shanbhog .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Shanbhog, M., Chaudhary, K., Singh, M., Mishra, S. (2017). Development of Secured Trust SLA Model from SLA Life Cycle Phases. In: Singh, M., Gupta, P., Tyagi, V., Sharma, A., Ören, T., Grosky, W. (eds) Advances in Computing and Data Sciences. ICACDS 2016. Communications in Computer and Information Science, vol 721. Springer, Singapore. https://doi.org/10.1007/978-981-10-5427-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5427-3_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5426-6

  • Online ISBN: 978-981-10-5427-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics