X. A TRUST BASED SLA MODEL AND CLOUD
SERVICE MANAGEMENT FOR CLOUD
ENVIRONMENT
We have proposed a Trust based Model between
cloud providers and users. Here it is proposed that
trust can be analyzed in three major steps. When
cloud users are satisfied with the first two steps then
at third step unwords they can rely on cloud provider
and request for the cloud services. The steps shown in
Figure -8
Figure-8 ( Trust based SLA model)
XI. CONCLUSION
Understanding the roles of the cloud service providers and
cloud users is important for the service level
agreement(SLA).Providing security and privacy in the
cloud computing environment and developing efficient and
effective solutions for it is really a difficult task for the
cloud service providers. Confidentiality, integrity,
reliability and availability are widely used terminology
based upon which the cloud users relay on the service
providers. In this paper we have discussed about the
service level agreements(SLA) and cloud computing
models in details from the service providers as well as the
cloud user point of view
.
REFERENCES
[1]. Wikipedia, http://en.wikipedia.org/wiki /Cloud_Computning
[2]. Rafael Moreno-Vozmediano,Rubén S. Montero, Ignacio M.
Llorente,” Key Challenges in Cloud Computing -Enabling the
Future Internet of Services”, Published by the IEEE Computer
Society 1089-7801/13/ © 2013 IEEE, IEEE internet computing
[3]. M.Rajendra Prasad, R. Lakshman Naik, V.Bapuji,” Cloud
Computing : Research Issues and Implications ”, International
Journal of Cloud Computing and Services Science (IJ-CLOSER)
Vol.2, No.2, April 2013, pp. 134~140 ISSN: 2089-3337.
[4]. Francesco M.A and Gianni F. “An approach to a cloud Computing
network”, IEEE, August 2008, pp113-118
[5]. Huaglory Tianfield,”Cloud Computing Architectures”, 978-1-4577-
0653-0/11/©2011 IEEE.
[6]. S. V. Kavitha, “A survey on security issues in service delivery
models of cloud computing” Journal of Network and Computer
Applications, Elsevier, vol. 34, (2011), pp. 1–11.
[7]. P. Adams, “Advantages and Disadvantages Of Cloud Computing
System”, Advantages And Disadvantages Of Cloud Computing
System, (2011) November 18.
[8]. Shakeel Ahmad, Bashir Ahmad, Sheikh Muhammad Saqib ,Rashid
Muhammad Khattak” Trust Model: Cloud’s Provider and Cloud’s
User ” International Journal of Advanced Science and Technology
Vol. 44, July, 2012
[9]. Marco Comuzzi, Guus Jacobs , Paul Grefen”Clearing the Sky -
Understanding SLA Elements in Cloud Computing”Beta Working
Paper series 412
[10]. Linlin Wu , Rajkumar Buyya “Service Level Agreement (SLA) in
Utility Computing Systems”, Cloud Computing and Distributed
Systems (CLOUDS) Laboratory
[11]. Wikipedia, http://en.wikipedia.org/wiki / Service Level Agreement
[12]. http://www.cosentry.com/information-center/who-is-
cosentry/certifications/pci-dss-compliance
[13]. Mitchell cochran,paul d. Witman “Governance and service level
agreement issues in a Cloud computing environment” Journal of
information technology management issn #1042-1319 A publication
of the association of management
[14]. Pankesh Patel, Ajith Ranabahu, Amit Sheth ,“Service Level
Agreement in Cloud Computing” Knoesis Center, Wright State
University, USA
[15]. Jessica McCarthy,” Service Level Agreements for Cloud Computing”
ISBN 978-1-4614-1 - e-ISBN 978-1-4614-1 - DOI 10.1007/978-1-
4614-1 - Springer New York Dordrecht Heidelberg London Library
of Congress Control Number: 2011939783 © Springer
[16]. C. Robert, “Cloud Computing: Advantages and Disadvantages”,
http://boardroombrief.com/2010/08/cloud-computing-advantages-
and-disadvantages/, (2010) August 24
[17]. Xu Xiaoping, Yan Junhu,” Research on Cloud Computing Security
Platform”, 978-0-7695-4789-3/12 © 2012 IEEE DOI
10.1109/ICCIS.2012.238.
[18]. Dimitrios Zissis , Dimitrios Lekkas, “Addressing cloud computing
security issues”, 0167-739X/ © 2010 Elsevier B.V. All rights
reserved.doi:10.1016/j.future.2010.12.006.
[19].
“Understanding Cloud Computing Vulnerabilities”, by the iee
e
computer and reliability societies 1540-7993/11/ © 2011 IEEE
march/april 2011.
[20]. Hassan Takabi , James B.D. Joshi, Gail-Joon Ahn, “Security and
Privacy Challenges in Cloud Computing Environments”, by the ieee
computer and reliability societies ,1540-7993/10/ © 2010 IEEE ,
november/december 2010.
[21]. Zhifeng Xiao and Yang Xiao, Senior Member, IEEE,” Security and
Privacy in Cloud Computing”, IEEE communications surveys &
tutorials, VOL. 15, NO. 2, second quarter 2013, 1553-877X/13/ c_
2013 IEEE.
[22]. Peter Mell,” What’s Special about Cloud Security? ”, IT Pro
July/August 2012, P u b l i s h e d by t h e I E E E Comp u t e r S o c
i e t y, 1520-9202/12/ © 2012 IEEE.
[23]. Jianhua Che, Yamin Duan, Tao Zhang, Jie Fan,” Study on the
security models and strategies of cloud computing”, 1877-7058 ©
2011 Published by Elsevier Ltd. doi:10.1016/j.proeng.2011.11.2551.
[24]. Xue Jing, Zhang Jian-jun2. “A Brief Survey on the Security Model
of Cloud Computing" 978-0-7695-4110-5/10 © 2010 IEEE DOI
10.1109/DCABES.2010.103
[25]. Engr: Farhan Bashir Shaikh, Sajjad Haider,” Security Threats in
Cloud Computing”, 978-1-908320-00-1/11@2011 IEEE
[26]. H.Sato,et al., “A Cloud Trust Model in a Security Aware Cloud”,
SAINT2010, pp.121-124.
[27]. Mladen A. Vouch, ”Cloud Computing Issues, Research and
Implementationsǁ”, Journal of Computing and Information
Technology - CIT 16, 2008, 4, 235–246
[28]. www.http://webhosting.about.com/od/Clouding-Hosting/a/Top-10-
Cloud-Computing-Vendors.htm
[29]. Latifa Ben, Arfa Rabai , Mouna Jouini, Anis Ben Aissa , Ali Mili,”
A cybersecurity model in cloud computing environments”, 1319-
1578 ª 2012 King Saud University. Production and hosting by
Elsevier B.V. All rights
reserved.http://dx.doi.org/10.1016/j.jksuci.2012.06.002
[30]. M. Mackay, T. Baker, A. Al-Yasiri,” Security-oriented cloud
computing platform for critical infrastructures”, 0267-3649/ 2012 M.
Mackay, T. Baker & A. Al-Yasiri. Published by Elsevier Ltd. All
right reserved.http://dx.doi.org/10.1016/j.clsr.2012.07.007.
S.B.Dash et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 2899-2906