Open Access Open Access  Restricted Access Subscription or Fee Access

Trust Model in Cloud Computing Based on Quality of Protection

Rishabh Jain, Piyush Mittal, Himanshu Srivastava, Vijay Kumar Chaurasiya


Today, trust is considered as a biggest challenge and a critical factor in the cloud computing. Many organizations want to move towards cloud for giving secure access and secure transmission of their data to the data user but due to lack in trust in cloud security services organization hesitate to move towards cloud. This paper proposes a new trust model based on the quality of protection of services offered by the cloud provider to the data owner or organization. Trust is build between cloud provider and the organization based on the cloud provider ability to provide resources. In order to provide this a service level agreement is build between the cloud provider and the organization based on the organization security requirements and the cloud provider security services capabilities. Trust values are calculated using the three core security parameters which are confidentiality, data integrity and availability.

Keywords: Security, confidentiality, integrity, availability, trust, cloud computing, quality of protection, cloud provider, cloud user, data owner


Cite this Article
Rishabh Jain, Piyush Mittal, Himanshu Srivastava et al. Trust Model in Cloud Computing Based on Quality of Protection. Journal of Software Engineering Tools & Technology Trends. 2015; 2(2): 21–25p.

Full Text:



Urquhart J. The Biggest Cloud-Computing Issue of 2009 is Trust, C-Net News. 2009; 7 Jan.

Hwang Kai, Deyi Li. Trusted Cloud Computing with Secure Resources and Data Coloring, Trust Reputation Management. IEEE Internet Computing. 2010; 14(5): 14 –22p.

Paul Manuel. A trust model of cloud computing based on Quality of service. Annals of Operations Research, Springer US, New York. 2013; April.

Alhamad Mohammed, Dillon Tharam, Chang Elizabeth. SLA-Based Trust Model for Cloud Computing. 13th International Conference on Network- Based Information Systems. 2010.

Ahmad Shakeel, Ahmad Bashir, Saqib Sheikh Muhammad, Khattak Rashid Muhammad. Trust Model: Clouds Provider and Clouds User. International Journal of Advanced Science and Technology. 2012; 44.

Huang Jingwei, Nicol David M. Trust mechanisms for cloud computing, Journal of Cloud Computing. Advances, Systems and Applications, Springer Open Journal. 2013.

Uikey Chaitali, Dr. Bhilare D. S. A Broker Based Trust Model for Cloud Computing Environment. International Journal of Emerging Technology and Advanced Engineering. 2013; 3(11).

Wua Xiaonian, Zhanga Runlian, Zengb Bing, Zhoua Shengyuan. A trust evaluation model for cloud computing. Procedia Computer Science, Information Technology and Quantitative Management (ITQM), Elsevier. 2013; 17: 1170– 1177p.

Verizon. Verizon-Data Breach Investigations report. Verizon Risk Team. 2014. Retrieved on 2015-02-10.

Alanazi Hamdan.O. et al. New Comparative Study Between DES, 3DES and AES within Nine Factors. Journal of Computing. 2010; 2(3).

Gupta Piyush, Kumar Sandeep. A Comparative Analysis of SHA and MD5 Algorithm. International Journal of Computer Science.


  • »
  • »
  • »
  • »
  • »
  • »

This site has been shifted to