Abstract
This is the era of Cloud Computing which shares on-demand computing resources and disposes off efficiently. It has a wide range of benefits for business and consumers. In spite of several benefits, there embeds numerous challenges such as data integrity, authenticity, data security, data locking, access control, data confidentiality, auditability, trust on cloud service provider, well management of service level agreement (SLA). Trust – is a key differentiator in defining the success or failure of many business companies. Service Level Agreement builds trust between cloud providers and cloud consumers. This research proposes a secured trust SLA model that builds trust on cloud service provider and helps in providing data security, confidentiality and integrity for cloud user.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Abadi, H.R., Hafshejani, S.N., Zadeh, F.K.: Considering factors that affect users’ online purchase intentions with using structural equation modeling. Interdisc. J. Contemp. Res. Bus. 3(8), 463–471 (2011)
Ahmed, M., Hossain, M.A.: Cloud computing and security issues in the cloud. Int. J. Netw. Secur. Appl. (IJNSA) 6(1), 25–36 (2014)
Ameen, S.Y., Nourildean, S.W.: Firewall and VPN investigation on cloud computing performance. Int. J. Comput. Sci. Eng. Surv. (IJCSES) 5(2), 15–25 (2014)
Data Integrity, November 2010. https://en.wikipedia.org
George, R.S., Sabitha, S.: Survey on data integrity in cloud computing. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(1), 123–125 (2013)
Gupta, P.C.: Data Communications and Computer Networks. PHI, New Delhi (2011)
Hussain, I., Ashraf, I.: Security issues in cloud computing - a review. Int. J. Adv. Netw. Appl. 6(2), 2240–2243 (2014)
Joint, A., Baker, E., Eccles, E.: Hey, you, get off of that cloud? Comput. Law Secur. Rev. 25, 270–274 (2009)
Kant, C., Sharma, Y.: Enhanced security architecture for cloud data security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5), 570–575 (2013)
Khorshed, T., Ali, A., Wasimi, S.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28, 833–851 (2012)
Kumar, A.: World of cloud computing & security. Int. J. Cloud Comput. Serv. Sci. 1(2), 53–58 (2012)
Panse, D., Haritha, P.: Multi-factor authentication in cloud computing for data storage security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(8), 629–634 (2014)
Rao, S., Gujrathi, S., Sanghvi, M., Shah, S.: Analysis on data integrity in cloud environment. IOSR J. Comput. Eng. (IOSR-JCE), 16(5) (2014). E-Issn: 2278-0661, P-Issn: 2278-8727
Rawat, S., Chowdhary, R., Bansal, D.A.: Data integrity of Cloud Data Storages (CDSs) in cloud. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(3), 585–592 (2013)
Ron, S., Aliko, P.: Service level agreements. Internet NG. Internet NG project (1999–2001) (2001). http://ing.ctit.utwente.nl/WU2/
Rubach, P.: Optimal resource allocation in federated metacomputing environments. Ph.D. thesis. Warsaw University of Technology, Electronics and Information Technology, Warsaw (2010)
Ryan, P., Falvey, S.: Trust in the clouds. Comput. Law Secur. Rev. 28, 513–521 (2012)
Soofi, A.A., Khan, M., Fazal-E-Amin: Encryption techniques for cloud data confidentiality. Int. J. Grid Distrib. Comput. 7(4), 11–20 (2014)
Subramanyam, K.J., Hari, K.K.: The Proceedings of the International Conference on Information Engineering, Management and Security (2014)
Talib, A.: Ensuring security, confidentiality and fine-grained data access control of cloud data storage implementation environment. J. Inf. Secur. 6, 118–130 (2015)
Ziyad, S., Rehman, S.: Critical review of authentication mechanisms in cloud computing. IJCSI Int. J. Comput. Sci. Issues 11(3), 145–149 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shanbhog, M., Chaudhary, K., Singh, M., Mishra, S. (2017). Development of Secured Trust SLA Model from SLA Life Cycle Phases. In: Singh, M., Gupta, P., Tyagi, V., Sharma, A., Ören, T., Grosky, W. (eds) Advances in Computing and Data Sciences. ICACDS 2016. Communications in Computer and Information Science, vol 721. Springer, Singapore. https://doi.org/10.1007/978-981-10-5427-3_11
Download citation
DOI: https://doi.org/10.1007/978-981-10-5427-3_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5426-6
Online ISBN: 978-981-10-5427-3
eBook Packages: Computer ScienceComputer Science (R0)