Loading

Trust Management Techniques, Models and Attacks in Cloud
Mahantesh N. Birje1, Vijay L. Hallappanavar2
1Mahantesh N. Birje, Center for Post Graduate Studies, VTU, Belagavi, Karnataka, India.
2Vijay L. Hallappanavar*, ECE department, KLECET, Chikodi, Karnataka, India.
Manuscript received on November 22, 2019. | Revised Manuscript received on November 28, 2019. | Manuscript published on November 30, 2019. | PP: 2647-2665 | Volume-8 Issue-4, November 2019. | Retrieval Number: D7273118419/2019©BEIESP | DOI: 10.35940/ijrte.D7273.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is a technology that promises resilient and flexible computing resources to the growing business. Along with many benefits of Cloud computing, there are various complex problems such as security and privacy of data that exists on Cloud. Trust is one of the key obstacles in the adoption of Cloud by the growing market due to absence of any reliable and efficient trust evaluation mechanism. It is difficult task for Cloud consumers to choose trustworthy provider among various service providers who provide similar type of services. There is a need to have – proper techniques/methods to establish trust; proper trust based models to evaluate the trust; and awareness of various possible attacks to know the robustness of the models. Hence this paper discusses existing state of the art trust management techniques, models and attacks, to help research community interested in designing trust based schemes in Cloud environment.
Keywords: Attacks, Cloud, Privacy, Security, Trust Management Techniques, Trust Models
Scope of the Article: Service Level Agreements (Drafting, Negotiation, Monitoring and Management).