Skip to main content
Log in

Trust Based Approach and Risk Management for IT Systems in Cloud Service Selection

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Cloud computing, which is amidst the new approaching fields of computers. There is a boom of this technology at present which can be easily seen as every organization outsource for most resources. As everyday life is known as, ranging from business applications to commercial functions, from students to professionals, the Cloud is giving uncountable advantages to users. Organizations often have concerns about the migration and utilization of cloud computing due to the loss of control over their outsourced resources, and cloud computing is vulnerable to risks. As per financial aspects, persons move to the cloud area because of their works, but security and privacy for data remain to be questionable. Hiding information related to trade and business bargains is utmost important as it might give a substantial profit or loss as the critical information may go too wrong hands. This paper focuses on the risk management frameworks for cloud computing and to the comparison between them to determine the strengths and weakness of each techniques. The proposed system deployed trust evaluation model in different conditions to reduce the complex evaluation procedures, while a substantial improvement recorded with the consideration of risk assessment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Abbadi, I. M., & Alwaneh, M. (2012). A framework for establishing trust in cloud. Elsevier Computers and Electrical Engineering, 3, 1073–1087.

    Article  Google Scholar 

  2. Aljazzaf, Z., Carpretz, A., & Perry, M. (2011). Trust bootstrapping services and service providers. In Proceedings of 9th annual international conference on privacy, security and trust, PST (no. 3, pp. 7–15).

  3. Amir, M. T., Rodziah, R., & Masrah, A. A. (2015). Towards a comprehensive security framework of cloud data storage based on multi-agent system architecture. Journal of Information Security, 10(1), 118–131.

    Google Scholar 

  4. Jøsang, A. (2001). A logic for uncertain probabilities. International Journal of uncertainty, Fuzziness and Knowledge-Based Systems, 9(03), 279–311.

    Article  MathSciNet  Google Scholar 

  5. Chunsheng, Z., Hasen, N., Victor, C. L., & Laurence, T. Y. (2015). An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Transactions on Information Forensics and Security.

  6. CSA. (2015). Cloud adoption practices and priorities survey report. Cloud Security Alliance, 39(1).

  7. CSA. (2014). Cloud usage: Risks and opportunities report. Cloud Security Alliance.

  8. Daskalakis, C., Goldberg, P., & Papadimitriou, C. (2009). The complexity of computing Nash euilibrium. SIAM Journal on computing, 29(1), 195–259.

    Article  Google Scholar 

  9. Datacenter knowledge. (2015). Archives. Retrieved from DATA Centre Knowledge. www.datacentreknowledge.com/archives/2015/06/19/seven-worstcloud-outages-of-2015so-far/.

  10. David, K. (1998). Choice under partial uncertainty. International Economic Review, 34, 297–308.

    MATH  Google Scholar 

  11. Malar, E., & Gauthaam, M. (2020). Wavelet analysis of EEG for the identification of alcoholics using probabilistic classifiers and neural networks. International Journal of Intelligence and Sustainable Computing, 1(1), 3.

    Article  Google Scholar 

  12. Bertino, E. (2014). A roadmap for privacy-enhanced secure data provenance. Journal of Intelligent Information Systems, 43(3), 481–501.

    Article  Google Scholar 

  13. Gokulnath, K., & Rhymend, U. (2014). Fair-trust evaluation approach for cloud environment. Communications in Computer and Information Science, 2995, 81–91.

    Article  Google Scholar 

  14. Imad, M. A., & Muntaha, A. (2012). A framework for establishing trust in the cloud. Computers and Electrical engineering', 14(2), 1073–1087.

    Google Scholar 

  15. Ishmanov, K., & Kim, S. (2014). A secure trust establishment in wireless sensor networks. In International conference on electrical engineering and informatics (ICEEI) (pp. 154–162).

  16. Josang, A., & Lo, P. (2004). Analyzing the relationship between risk and trust in trust management. Lecture Notes in Computer Science, 11(4), 135–145.

    Article  Google Scholar 

  17. Kannan, G., & Prasant, M. (2012). Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Communications Surveys and Tutorials, 36(1), 279–298.

    Google Scholar 

  18. Lin, G., Wang, D., Bie, Y., & Lei, M. (2014). MTBAC: A mutual trust based access control model in Cloud computing. China Communications, 11(4), 154–162.

    Article  Google Scholar 

  19. Ko, R., Jagadramana, P., Mowbray, M., Pearson, S., Kirchberg, M., & Liang, Q. (2011). Trust cloud: A frame for accountability and trust in cloud computing (pp. 4–9). Washington: World Congress on Services, IEEE.

    Google Scholar 

  20. Krantz, S. (1999). Jensen's Inequality. In Handbook of complex variables (p. 118). Boston: Birkhauser.

  21. Selvaraj, J., & Mohammed, A. S. (2020). Mutation-based PSO techniques for optimal location and parameter settings of STATCOM under generator contingency. International Journal of Intelligence and Sustainable Computing, 1(1), 53.

    Article  Google Scholar 

  22. Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., & Leaf, D. (2011). NIST cloud computing reference architecture. NIST Special Publication (pp. 13–14), 500–292.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sreejith Gopalakrishnan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gopalakrishnan, S., Alli, P. Trust Based Approach and Risk Management for IT Systems in Cloud Service Selection. Wireless Pers Commun 117, 3109–3127 (2021). https://doi.org/10.1007/s11277-020-07796-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07796-z

Keywords

Navigation