The recent prevalence of microservice-based applications that leverage the capabilities offered by cloud and edge computing, has given rise to highly complex services which …
S Mehraj, MT Banday - … of Cloud Applications and Computing (IJCAC …, 2022 - igi-global.com
In the Cloud computing, trust management has become a key requirement for its security as it has an important role where service-interactions take place in an anonymous environment …
With the industry's fast adoption of cloud computing, it's been hard to keep trust between cloud service providers and people who use their services. In fact, trust management in …
With the widespread growth of the Internet of Things (IoT) devices and emergent data generated at the edge computing network, the conventional cloud computing (CC) model …
Cloud computing is a prominently distributed paradigm that offers a wide variety of infrastructure, platform, and software services over the internet on demand. However, the …
M Mrabet, YB Saied, LA Saidane - 2017 17th IEEE/ACM …, 2017 - ieeexplore.ieee.org
This paper introduces an approach that handleswith the trustworthy cloud service selection issue in Cloudcomputing environments. Despite the fact that most of theexisting trust …
VK Damera, A Nagesh, M Nagaratna - environment, 2020 - academia.edu
There is a big race for processing technology and storage and resource sharing capacity on interconnected servers around the world. This race defines what we call―Cloud …
L Wang, F Liu - EURASIP Journal on Information Security, 2018 - Springer
Abstract In Infrastructure as a Service (IaaS) environments, the user virtual machine is the user's private property. However, in the case of privacy protection, how to ensure the security …