Proposed model for Monitoring and Evaluation Users in Trusted Cloud
-
2018-11-27 https://doi.org/10.14419/ijet.v7i4.17.21803 -
cloud, evaluation, SaaS, PaaS, IaaS, monitoring -
Abstract
Consequently, whether that user behavior is trusted, how to evaluate user behavior trust is an important paper content in cloud computing". This paper Mainly discusses assessment significance of user conduct consider and assessment method," inside the cloud computing, along with consider object analysis, precept in comparing person behavior accept as true with, the basic idea of comparing person behavior believe, assessment strategy of conduct accept as true with for each technique, and long axis, which lay the theoretical basis about consider for the sensible cloud computing utility. In this paper i've proposed a believe version for the evaluation of the consumer degree believe in a cloud computing surroundings. I may be comparing the person degree believe for the programs hosted within the cloud environment. The user level agree with can be evaluated by using analyzing uncommon activities particular for finding accept as true with evidences that are cited inside the paper. The final effect of the user level trust evaluation can be used for figuring out the trustworthiness of the user". "however failing on one or parameters used for reading the trustworthiness can't finish the trustworthiness, or untrustworthiness of the person, but without a doubt it's going to assist in taking the uncommon user sports and also in identifying similarly plan of hobby. Further, I am planning to pack out the trust model in a public cloud environment".
Â
-
References
[1] TIAN Li-Qin LIN Chuang . A Kind of Game-Theoretic Control Mechanism of User Behavior Trust Based on Prediction in Trustworthy Network , November 2007.
[2] Suess, Jack,Morooney, Kevin . Identity Management and Trust Services: Foundations for Cloud Computing, 2009.
[3] V.Vinothina, Dr.R.Sridaran and Dr.PadmavathiGanapathi . A Survey on Resource Allocation Strategies in Cloud Computing, June 2012.
[4] Chandrashekhar S. Pawar1 and R.B.Wagh2 . A review of resource allocation policies in cloud computing, 2012.
[5] 1Edna Dias Canedo, Rafael Timóteo de Sousa Junior, and Robson de Oliveira Albuquerque. Trust Model For Reliable File Exchange In Cloud Computing, Feb 2012.
[6] Dr. Mohammed A. T. AlSudiari1, Dr. TGK Vasista2 . Cloud Computing And Privacy Regulations:An Exploratory Study On Issues And Implications, March 2012.
[7] Mohamed Firdhous, Osman Ghazali and Suhaidi Hassan. Trust Management in Cloud Computing: A Critical Review, April 2011.
[8] Christian Cachin , Idit Keidar Alex , Er Shraer . Trusting the Cloud, 2010 .
[9] Zeeshan Pervez, Asad Masood Khattak, Sungyoung Lee, Young-Koo Lee, Eui-Nam Huh . Oblivious access control policies for cloud based data sharing systems,
[10] December 2012.
[11] Mr. Sanjay Kumar Brahman1, Prof. Brijesh Patel2 . Java Based Resource Sharing with Secure Transaction in User Cloud Environment, September-2012 .
[12] Mark Meiss , John Duncan , Bruno Gonçalves . What’s in a Session: Tracking Individual Behavior on the Web, March 2010 .
[13] Chiara Bodei, Viet Dung Dinh and Gian Luigi Ferrari . Safer in the Clouds, 2010 .
[14] Vijay. G.R, A. Rama Mohan Reddy . Data Security in Cloud based on Trusted Computing Environment, March 2013 .
[15] Snehal Suryawanshi , Anant M. Bagade. Distributed Accountability for Data Sharing in Cloud,December 2012 .
-
Downloads
-
How to Cite
K. Ebis, S., & Sadi Aziz, R. (2018). Proposed model for Monitoring and Evaluation Users in Trusted Cloud. International Journal of Engineering & Technology, 7(4.17), 57-61. https://doi.org/10.14419/ijet.v7i4.17.21803Received date: 2018-11-27
Accepted date: 2018-11-27
Published date: 2018-11-27