Addressing Trust Issues in Cloud Computing
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2014, Vol 4, Issue 1
Abstract
Cloud computing is an evolving paradigm with tremendous momentum, but its unique aspects exacerbate trust issues in cloud computing. Data is the most valuable of clients (or) company’s asset; it must be protected with much vigilance than any other. Data Security in the cloud is one of the big issue which acts as obstacle in the implementation of cloud computing. This article explores about different trust issues in cloud computing for trustworthy cloud computing environment.
Authors and Affiliations
Manoj Prabhakar Darsi , Vinay B abu D , Gayathri D arsi
Secure Efficient Geographic Multicast Protocol For Mobile AdHoc Networks
A mobile ad-hoc network (MANET) is composed of mobile nodes without any infrastructure. So that Ad hoc networks are mainly used in emergency situations where no infrastructure is available, for e.g. military battle...
Improved rtPS SchedulingwithQoE metrics in Joint WiMAX / Satellite Networks
Thispaper improves a previously proposed scheduling algorithm that is responsible to share the allocated capacity to the uplink traffic of an integrated satellite and WiMAX network. The target of this improvement i...
Protected Data Forwarding by Erasure Coding to Cloud Storage System
Present so many mobile services are converting to cloud depended mobile services with highly communications and higher flexibility. We explore a unique mobile cloud infrastructure that attaches mobiles and cloud services...
A Survey on Hierarchical Routing Protocols in Wireless Sensor Networks
There is several issues in Wireless Sensor Networks from which routing are also a major issue which is directly related to energy consumption. In order to increase the lifetime of network energy must be consumed...
Homomorphic Encryption Scheme & Its Application for Mobile Agent Security
Mobile agents (MA) are autonomous software entities that are able to migrate across heterogeneous network execution environments. Protection of Mobile agents is one of the most difficult problems in the area of mobile ag...