Abstract
A dependable technology that gives us access to the with a confidential and secure environment that can be adaptable to the needs of consumers. With the help of cloud data storage, it is now feasible to store a lot of data at a low cost and with real-time access. The only those with access rights to the information kept in the cloud may access it. Cryptography can be used to provide more security to the data. Cloud with lots of benefits consists of various vulnerabilities due to its nature because of which breach of data is possible, it can be handled with TMS (Trust Management System) i.e. the secure and trusted framework by using CSTA (Cloud Security Trusted Authority) which judges the user activity on the basis of its activity. Furthermore, it is presumed that the proposed architecture lacks faith in the cloud service provider. Cloud consumer feedback is an important source for assessing trust management in the cloud framework. The CSTA is applied on the cloud where data is uploaded by the consumer and hence the judgment will be relied on the feedback of the user such that it does not provide fake recommendations. Thus in the cloud environment, it will be providing us to maintain the correctness of trust from the feedback of the consumers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhou L, Varadharajan V, Hitchens M: Integrating trust with cryptographic role-based access control for secure cloud data storage. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (2013)
Mehraj S, Banday MT: Establishing a zero trust strategy in cloud computing environment. In: International Conference on Computer Communication and Informatics (2020)
Youssef AE. Alageel M: A framework for secure cloud computing. Int J Comput Sci Issues (IJCSI) 9(4):487–500 (2012)
Dawoud MM, Ebrahim GA, Youssef SA: In the introduction of A Cloud Computing Security Framework Based on Cloud Security Trusted Authority (2020)
Noor TH, Sheng QZ, Alfazi A: Reputation attacks detection for effective trust assessment among cloud services. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp 469–76
Varalakshmi P, Judgi T, Balaji D: Trust management model based on malicious filtered feedback in cloud. In: International Conference on Data Science Analytics and Applications, pp 178–87
Bhatt S, Sandhu R, Patwa F: An access control framework for cloudenabled wearable internet of things. In: IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), pp. 213–233 (2017)
Deng W, Zhou Z: A flexible RBAC model based on trust in open system. Third Global Congress on Intelligent Systems (2012)
Noor TH, Sheng QZ, Alfazi A: Detecting occasional reputation attacks on cloud services. In: International Conference on Web Engineering, pp 416–23
Noor TH, Sheng QZ, Bouguettaya A: Trust Management in Cloud Services. Springer (2014)
Tong W, Liang J, Lu L, Jin X: Intrusion detection scheme based node trust value in WSNs. In: Systems Engineering and Electronics, pp 1644–1649 (2015)
Shand B, Dimmock N, Bacon J: Trust for ubiquitous, transparent collaboration. In: 1st IEEE International Conference on Pervasive Computing and Communications, Texas, USA, pp 153–160 (2003)
Ya-Jun G, Fan H, Ping-Guo Z, Rong L: An access control model for ubiquitous computing application. In: 2nd International Conference on Mobile Technology, Applications and Systems, China, pp 128–133 (2005)
Deno MK, Sun T: Probabilistic trust management in pervasive computing. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, China, pp 610–615 (2008)
Wang C, Liu C, Liu B, Dong Y: DIV: Dynamic integrity validation framework for detecting compromises on virtual machine-based cloud services in real-time. China Communications 11(8):15–27 (2014)
Tari Z: Security and privacy in cloud computing. IEEE Cloud Computing 1(1):54–57 (2014)
Lang U, Schreiner R (2011) Analysis of recommended cloud security controls to validate open PMF “policy as a service.” Elsevier, Information Security Technical Report 16(2011):131–141
Kagal L, Finin T, Joshi A (2001) Trust-based security in pervasive computing environments. IEEE Comput 34(12):154–157. https://doi.org/10.1109/2.970591
Kagal L, Undercoffer J, Perich F, Joshi A, Finin T: Vigil: enforcing security in ubiquitous environments. In: Grace Hopper Celebration of Women in Computing 2002 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Saxena, U.R., Sharma, P., Gupta, G., Sahai, M. (2023). Secure & Trusted Framework for Cloud Services Recommendation-A Systematic Review. In: Hasteer, N., McLoone, S., Khari, M., Sharma, P. (eds) Decision Intelligence Solutions. InCITe 2023. Lecture Notes in Electrical Engineering, vol 1080. Springer, Singapore. https://doi.org/10.1007/978-981-99-5994-5_6
Download citation
DOI: https://doi.org/10.1007/978-981-99-5994-5_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-5993-8
Online ISBN: 978-981-99-5994-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)