Calculation of Exploitation Degree at IAAS
Citation
Archana B Saxena, Sanjive Saxena "Calculation of Exploitation Degree at IAAS", International Journal of Engineering Trends and Technology (IJETT), V45(6),251-253 March 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
The rapid growth of cloud computing
and its rapid adoption by business units including
government organizations has transformed the
means and mechanism for doing business. For, as is
well known, that cloud offers as easy mechanism for
increasing the savings on various aspects of cost
such as maintenance costs of various devices and
paying only for the services availed from the cloud
service provider. However, despite several
advantages, the customer on the cloud is at the risk
of being exploited either by the business competitors
or the cloud service provider may on its own exploit
the customer. This paper is an attempt to develop the
mathematical model for determining the degree of
exploitation due to loss of trust in cloud. The design
of the paper follows a structured approach. it starts
with the basics of cloud computing and the various
assumptions used in the development of the model. It
takes into account several practical aspects and
finally arriving culminating at the end wherein it
highlights the means and mechanism which can be
deployed to lessen the impact of the degree of
exploitation on account of loss of trust at the IAAS
level.
References
[1] .Michael Armbrust, Armando Fox, Rean Griffith, Anthony
D. Joseph, Randy Katz, Andykonwinski, Gunho Lee,
David Patterson, Arielrabkin, Ion Stonica and Mateizaharia.
“A View of Cloud Computing”, Communication of the
ACM, April 2010, Vol 53, No.4
[2] Ahmed Rashidi Isfahan, Isfahan Iran, “A Model for Trust
in Cloud Computing”, International Journal on Cloud
Computing: Services and Architecture (IJCCSA), Vol 2,
No.2 April 2012.
[3] Khaled M Kahn and Qutiabah Malluhi, “Establishing Trust
in cloud”, IEEE Computer Science, IT PRO, Sep/Oct 2010
[4] “Building Trust in the Cloud”, Insights on Governance,
Risk and Compliance, June 2014.
[5] William R. Claycomb, “Cloud Computing Security
Turorial”, Carnegie Mellon University, 2012.
[6] Candid Wueest, Mario Balano Barcena, Laura O’Brien,
“Mistakes in the IaaS Cloud can put your Data at Risk”,
Security Response, Symantec, Version 1.01, May 2015.
[7] Bijayalaxmi Purohit, Pawan Prakash Singh, “Data Leakage
Analysis on Cloud Computing”, International Journal of
Engineering Research and Application, Vol. 3, Issue
3May-June 2013. ISSN: 2248-9622.
[8] Christian Priebe, Divya Muthukumaran, Dan O’Keeffe,
David Eyers, Brian Shand, Ruedigerkapitza, Peter
Pietzuch.,”Cloud Safety Net: Detecting Data Leakage
between Cloud Tenants” CCSW’14, November 7, 2014,
Scottsdale, Arizona, USA. ACM 978-1-4503-3239-2/14/11.
[9] “Data Leakage – Threats and Mitigation”, SANS Institute
InfoSec Reading Room. Peter Gordon.
[10] http://www.computerworld.com/article/2487123/dataprivacy/
cloud-computing-2014--moving-to-a-zero-trustsecurity-
model.html.
[11] http://www.washingtonpost.com/business/economy/michae
ls-says-nearly-3-million-customers-hit-by-databreach/
2014/04/18/3074e432-c6fc-11e3-8b9a-
8e0977a24aeb_story.html.
[12] http://www.cloudcomputingexpo.com/node/ / 3204068.
Keywords
Cloud, IAAS, Trust, Exploitation,
Impact.