Public key encryption in the cloud computing environments: trust and untrust

With the development of data storage technology and the computerized process of an internet-based technology. Cloud computing systems allow users to store and process data virtually. Users also do not need to prepare a platform or supporting infrastructure, but only need to use existing platforms. F...

Full description

Saved in:
Bibliographic Details
Main Authors: Nanang, Herlino, Durachman, Yusuf, Misman, Ahmad Fatzilah, Zulkifli, Zahidah, Sukmana, Husni Teja
Format: Conference or Workshop Item
Language:English
English
Published: IEEE 2021
Subjects:
Online Access:http://irep.iium.edu.my/95842/1/95842_Public%20key%20encryption%20in%20the%20cloud%20computing.pdf
http://irep.iium.edu.my/95842/7/95842_Public%20Key%20Encryption_Scopus.pdf
http://irep.iium.edu.my/95842/
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9588879
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
English
Description
Summary:With the development of data storage technology and the computerized process of an internet-based technology. Cloud computing systems allow users to store and process data virtually. Users also do not need to prepare a platform or supporting infrastructure, but only need to use existing platforms. For the establishment of a trust relationship between entities as an important part of establishing security mechanisms in the cloud computing environment. This article introduces a trust management model in cloud computing using public key encryption. Measurement and computation of trust, and the chain of trust where similarity of trust issues is recommended have been addressed to prevent fraudulent user behavior. This model is geared towards cloud users who make decisions about whether to use a cloud computing service provider by giving them confidence. The purpose of this article motivates us to try proposes new ideas and methods of trust management in cloud computing using public key encryption.