preview

Trusted Cloud Computing with Secure Resources and Data Coloring

Good Essays
[1] 1. TRUSTED CLOUD COMPUTING WITH SECURE RESOURCES AND DATA COLORING 1.1 trust and security is considered as two major factors in the platform of cloud computing. Trust and security have prevented businesses from fully accepting cloud platforms. Trust & Reputation Management has made Cloud Computing Trusted with Secure Resources and Data Coloring and water marking. A reputation system is one of the ways for establishing trust between service providers and data owners. These techniques are used to safe the confidential data from unauthorized access. A new business model is enabled by Cloud computing that supports on-demand, pay-for-use, and econ¬omies-of-scale IT services over the Internet. The Internet cloud works as a service factory…show more content…
at the innermost implementation layer, there is infrastructure-as-a-service (IaaS) model which is extended to form the platform-as-a-service (PaaS) layer by adding OS and middle¬ware support. PaaS further by applications on data, content, and meta¬data using special APIsis created to extends to the software-as-a-service (SaaS) model. all protection functions at all levels are being demanded by SaaS. At the other extreme, IaaS demands protec¬tion mainly at the networking, trusted com¬puting, and compute/storage levels, whereas PaaS embodies the IaaS support plus additional protection at the resource-management level. 1.3Securing Infrastructure as a Service: In a virtu¬alized environment , lease compute, stor¬age, network, and other resources are provided to user by the IaaS model. underlying cloud infrastructure has not been manage by the user but user has control over the OS, storage, deployed applications, and possibly certain network¬ing components. Amazon’s Elastic Compute Cloud (EC2) is a good example of IaaS. At the cloud infrastructure level, CSPs can enforce network security with intrusion-detection systems (IDSs), firewalls, antivirus programs, distributed denial-of-service (DDoS) defenses. 1.4Securing Software as a Service: To serve thousands of cloud custom¬ers, who make no upfront investment in serv¬ers or software licensing, SaaS is employing browser-initiated application software. From the provider’s
Get Access