Calculation of Exploitation Degree at IAAS

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2017 by IJETT Journal
Volume-45 Number-6
Year of Publication : 2017
Authors : Archana B Saxena, Sanjive Saxena
DOI :  10.14445/22315381/IJETT-V45P252


Archana B Saxena, Sanjive Saxena "Calculation of Exploitation Degree at IAAS", International Journal of Engineering Trends and Technology (IJETT), V45(6),251-253 March 2017. ISSN:2231-5381. published by seventh sense research group

The rapid growth of cloud computing and its rapid adoption by business units including government organizations has transformed the means and mechanism for doing business. For, as is well known, that cloud offers as easy mechanism for increasing the savings on various aspects of cost such as maintenance costs of various devices and paying only for the services availed from the cloud service provider. However, despite several advantages, the customer on the cloud is at the risk of being exploited either by the business competitors or the cloud service provider may on its own exploit the customer. This paper is an attempt to develop the mathematical model for determining the degree of exploitation due to loss of trust in cloud. The design of the paper follows a structured approach. it starts with the basics of cloud computing and the various assumptions used in the development of the model. It takes into account several practical aspects and finally arriving culminating at the end wherein it highlights the means and mechanism which can be deployed to lessen the impact of the degree of exploitation on account of loss of trust at the IAAS level.


[1] .Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andykonwinski, Gunho Lee, David Patterson, Arielrabkin, Ion Stonica and Mateizaharia. “A View of Cloud Computing”, Communication of the ACM, April 2010, Vol 53, No.4
[2] Ahmed Rashidi Isfahan, Isfahan Iran, “A Model for Trust in Cloud Computing”, International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol 2, No.2 April 2012.
[3] Khaled M Kahn and Qutiabah Malluhi, “Establishing Trust in cloud”, IEEE Computer Science, IT PRO, Sep/Oct 2010
[4] “Building Trust in the Cloud”, Insights on Governance, Risk and Compliance, June 2014.
[5] William R. Claycomb, “Cloud Computing Security Turorial”, Carnegie Mellon University, 2012.
[6] Candid Wueest, Mario Balano Barcena, Laura O’Brien, “Mistakes in the IaaS Cloud can put your Data at Risk”, Security Response, Symantec, Version 1.01, May 2015.
[7] Bijayalaxmi Purohit, Pawan Prakash Singh, “Data Leakage Analysis on Cloud Computing”, International Journal of Engineering Research and Application, Vol. 3, Issue 3May-June 2013. ISSN: 2248-9622.
[8] Christian Priebe, Divya Muthukumaran, Dan O’Keeffe, David Eyers, Brian Shand, Ruedigerkapitza, Peter Pietzuch.,”Cloud Safety Net: Detecting Data Leakage between Cloud Tenants” CCSW’14, November 7, 2014, Scottsdale, Arizona, USA. ACM 978-1-4503-3239-2/14/11.
[9] “Data Leakage – Threats and Mitigation”, SANS Institute InfoSec Reading Room. Peter Gordon.
[10] cloud-computing-2014--moving-to-a-zero-trustsecurity- model.html.
[11] ls-says-nearly-3-million-customers-hit-by-databreach/ 2014/04/18/3074e432-c6fc-11e3-8b9a- 8e0977a24aeb_story.html.
[12] / 3204068.

Cloud, IAAS, Trust, Exploitation, Impact.