About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Cloud Computing. Third International Conference, CloudComp 2012, Vienna, Austria, September 24-26, 2012, Revised Selected Papers

Research Article

Opinion Model Based Security Reputation Enabling Cloud Broker Architecture

Download(Requires a free EAI acccount)
516 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-03874-2_11,
        author={Pramod Pawar and Srijith Nair and Fadi El-Moussa and Theo Dimitrakos and Muttukrishnan Rajarajan and Andrea Zisman},
        title={Opinion Model Based Security Reputation Enabling Cloud Broker Architecture},
        proceedings={Cloud Computing. Third International Conference, CloudComp 2012, Vienna, Austria, September 24-26, 2012, Revised Selected Papers},
        proceedings_a={CLOUDCOMP},
        year={2014},
        month={6},
        keywords={broker reputation subjective logic security},
        doi={10.1007/978-3-319-03874-2_11}
    }
    
  • Pramod Pawar
    Srijith Nair
    Fadi El-Moussa
    Theo Dimitrakos
    Muttukrishnan Rajarajan
    Andrea Zisman
    Year: 2014
    Opinion Model Based Security Reputation Enabling Cloud Broker Architecture
    CLOUDCOMP
    Springer
    DOI: 10.1007/978-3-319-03874-2_11
Pramod Pawar,*, Srijith Nair1,*, Fadi El-Moussa1,*, Theo Dimitrakos1,*, Muttukrishnan Rajarajan2,*, Andrea Zisman2,*
  • 1: British Telecommunications, Security Practice
  • 2: City University London
*Contact email: pramod.s.pawar@bt.com, srijith.nair@bt.com, fadiali.el-moussa@bt.com, theo.dimitrakos@bt.com, r.muttukrishnan@city.ac.uk, a.zisman@soi.city.ac.uk

Abstract

Security and trust in service providers is a major concern in the use of cloud services and the associated process of selecting a cloud service provider that meets the expectations and needs of one’s security requirements is not easy. As a solution, we propose a broker architecture model that enables us to build a security reputation framework for cloud service providers, capturing comprehensive evidence of security information to build its trust and security reputation.

Keywords
broker reputation subjective logic security
Published
2014-06-19
http://dx.doi.org/10.1007/978-3-319-03874-2_11
Copyright © 2012–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL