Download PDFOpen PDF in browser

User Behavior and Trust Evaluation in Cloud Computing

9 pagesPublished: March 13, 2019

Abstract

Cloud computing helps organizations to dynamically increase the resource needs as and when needed, without the need to purchase them. Security is a basic concern in cloud computing, and threats can occur both internally and externally. Users can access the cloud infrastructure for software, operating system and network infrastructure provided by the Cloud Service Providers (CSP). Evaluating the user behavior in the cloud computing infrastructure is becoming more and more important for both Cloud Users (CSs) as well as Cloud Service Providers The CSPs must ensure the safety of users accessing the cloud. Since user authentication alone is not enough to ensure the safety of users, user behavior trust plays a critical role in ensuring the authenticity of the user as well as safety. In this paper, we present the importance of user behavior in modeling trust, associated evaluation principles and comparison between different trust models.

Keyphrases: behavior, cloud computing, cloud security, trust evaluation

In: Gordon Lee and Ying Jin (editors). Proceedings of 34th International Conference on Computers and Their Applications, vol 58, pages 378-386.

BibTeX entry
@inproceedings{CATA2019:User_Behavior_Trust_Evaluation,
  author    = {Maryam Alruwaythi and Krishna Kambhampaty and Kendall E. Nygard},
  title     = {User Behavior and Trust Evaluation in Cloud Computing},
  booktitle = {Proceedings of 34th International Conference on Computers and Their Applications},
  editor    = {Gordon Lee and Ying Jin},
  series    = {EPiC Series in Computing},
  volume    = {58},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/vD8J},
  doi       = {10.29007/q5bd},
  pages     = {378-386},
  year      = {2019}}
Download PDFOpen PDF in browser