SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Glitches in Cloud Trust Protocol Architecture and Trust Evaluation
By Sucheta Mandal
Description
Now a day’s cloud technology is becoming the most used architecture in the industry. But according to
recent surveys done by CSA (Cloud Security Alliance), still 73% of survey participant hold them back to
use cloud technology because of its data vulnerability. Reliability of cloud service providers and
transparency is really crucial to the cloud business. For developing trust over consumers and providers
several approaches have been introduced. One of them is Cloud Trust Protocol, a set of rules and
process to establish digital trust among cloud users. [1]
Cloud trust protocol is built on transparency, dynamic request, response based on trust value. But still
there are many more flaws, which are needed to be improved to make CTP a vastly used protocol in the
industry. Cloud trust management base, central storage location, lacks encryption and proper
automation. This module is responsible for storing user authentication data, request- response
history.[5][6]
But it is accessible for all cloud consumers, who are using this same protocol. If one of those
consumers able to hacks those data, then this could prompt an immense information rupture. Hence
this component should be divided into different domain per consumer and every domain would be
encrypted with a private key. On the other hand entry and management in this section should be
automated, otherwise in manual processes this storage location might be exposed to wrong hands.
More robust trust value calculation algorithm should be included for deciding probable threat and
trustworthiness of both service providers and consumers. Trust evaluation is two – way mechanism. It
helps consumer to determine which provider is best for his business and other way around it helps cloud
provider to distinguish safe and trustworthy consumers. Hence, if it is not evaluated properly then Cloud
users can be trapped in a wrong and vulnerable cloud server and also cloud providers will be opened to
data loss threats. [7]
For determining trust value of cloud provider, cloud consumers should track cloud
providers past history, reputation and level of transparency in service. On the second level, cloud
providers also should use consumer’s behavioral approach towards other services. Those surveys need
to be done in regular basis, otherwise it may happen that cloud users at first maintained a good trust
value and after getting a good trust value, it chooses to misuse the trust. But, if a cloud user is new in
the market, then it is really tough for them to get a good trust value. For those cases, a trial trust value
and period should be introduced and then their trust value can be graded according to trust parameter
matrix.
As many cloud users will be using CTP protocol via CTP response engine, sometimes it may cause long
waiting time for a user to get its required response. To solve this privilege escalation problem, CTP
engine should process evidence access request s based on their trust value. If anything malicious thing
happens then there trust value should be decreased. In this way trustworthy client will have fast access.
An automated on the fly trust value evaluation system based on each transaction can be used to get
updated accurate trust value. In first step, automated system will take already stored trust vale (which is
calculated based on direct trust, recommended trust, preference trust etc) .Secondly, it will determine
transactional trust value depending on its operation mode, type of query, symptoms of attacking other
web services etc. Then it will update the final trust value and return it back to CTP engine. If its trust
value is decreased, then CTP engine will further check the cause of this sudden change and afterwards
can block the user from cloud services. If the trust value is increased then the request will be processed
quickly. In this way trustworthy client will have fast access.
Previous Work and Criticism
Several trust modeling mechanisms has been cited for improvement of this protocol.
• Some of them are using fuzzy comprehensive logic theory along side with direct and reputation based
trust to determine optimum trust value. [3]
• Service Level Assignment based trust level. It is basically an agreement between the service provider
and consumer for monitoring quality of service and service level violation if any. But this approach only
focuses on visible elements and totally ignores invisible elements like transparency, privacy etc. [4]
• Reputation based approach. In this approach a new company will always suffer to get good trust
value. [9][2]
• D-S Evidence theory and sliding window approach. In this process, the model only considers the
evidence from interaction between that particular CSP and User. They did not consider any other trust
value factor. [8]
• There are no special works accessible for tackling CTP engine’s special privilege acceleration problem.
References
[1] Acquiring forensic evidence from infrastructure-as-a-service cloud computing available at
http://www.sciencedirect.com/science/article/pii/S1742287612000266
[2] A Survey Study on Reputation-Based Trust Management in P2P Networks, available at
http://www.comp.nus.edu.sg/~cs6203/guidelines/topic7/survey-trust-reputation.pdf
[3] A Method for Trust Quantification in Cloud Computing Environments at
http://dsn.sagepub.com/content/12/2/5052614.full
[4] SLA-Based Trust Model for Cloud Computing available at
http://ieeexplore.ieee.org/document/5636125/
[5] Cloud Trust - a security assessment model for IaaS Clouds at
https://www.computer.org/csdl/trans/cc/preprint/07072526.pdf
[6] Cloud Audit and Cloud Trust Protocol available at http://www.issa-
dv.org/meetings/presentations/2011-12-09/2011-12-09_Presentation_01_Lingenfelter.pdf
[7] Trust Model for Measuring Security Strength of Cloud Computing Service available at http://ac.els-
cdn.com/S1877050915004081/1-s2.0-S1877050915004081-main.pdf?_tid=e4e1e0a0-7ed3-11e6-b843-
00000aacb35d&acdnat=1474336102_d8afa8db53d844660bf8387f1dc42de4
[8] Research in Cloud Security and Privacy available at
https://www.cs.purdue.edu/homes/bb/cloud/cloud-complete.ppt
[9] A Trust Evaluation Model for Cloud Computing, available at
http://www.sciencedirect.com/science/article/pii/S1877050913002822

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Empfohlen

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Empfohlen (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Glitches in cloud trust protocol architecture and trust evaluation

  • 1. Glitches in Cloud Trust Protocol Architecture and Trust Evaluation By Sucheta Mandal Description Now a day’s cloud technology is becoming the most used architecture in the industry. But according to recent surveys done by CSA (Cloud Security Alliance), still 73% of survey participant hold them back to use cloud technology because of its data vulnerability. Reliability of cloud service providers and transparency is really crucial to the cloud business. For developing trust over consumers and providers several approaches have been introduced. One of them is Cloud Trust Protocol, a set of rules and process to establish digital trust among cloud users. [1] Cloud trust protocol is built on transparency, dynamic request, response based on trust value. But still there are many more flaws, which are needed to be improved to make CTP a vastly used protocol in the industry. Cloud trust management base, central storage location, lacks encryption and proper automation. This module is responsible for storing user authentication data, request- response history.[5][6] But it is accessible for all cloud consumers, who are using this same protocol. If one of those consumers able to hacks those data, then this could prompt an immense information rupture. Hence this component should be divided into different domain per consumer and every domain would be encrypted with a private key. On the other hand entry and management in this section should be automated, otherwise in manual processes this storage location might be exposed to wrong hands. More robust trust value calculation algorithm should be included for deciding probable threat and trustworthiness of both service providers and consumers. Trust evaluation is two – way mechanism. It helps consumer to determine which provider is best for his business and other way around it helps cloud provider to distinguish safe and trustworthy consumers. Hence, if it is not evaluated properly then Cloud users can be trapped in a wrong and vulnerable cloud server and also cloud providers will be opened to data loss threats. [7] For determining trust value of cloud provider, cloud consumers should track cloud providers past history, reputation and level of transparency in service. On the second level, cloud providers also should use consumer’s behavioral approach towards other services. Those surveys need to be done in regular basis, otherwise it may happen that cloud users at first maintained a good trust value and after getting a good trust value, it chooses to misuse the trust. But, if a cloud user is new in the market, then it is really tough for them to get a good trust value. For those cases, a trial trust value and period should be introduced and then their trust value can be graded according to trust parameter matrix. As many cloud users will be using CTP protocol via CTP response engine, sometimes it may cause long waiting time for a user to get its required response. To solve this privilege escalation problem, CTP engine should process evidence access request s based on their trust value. If anything malicious thing happens then there trust value should be decreased. In this way trustworthy client will have fast access. An automated on the fly trust value evaluation system based on each transaction can be used to get updated accurate trust value. In first step, automated system will take already stored trust vale (which is calculated based on direct trust, recommended trust, preference trust etc) .Secondly, it will determine transactional trust value depending on its operation mode, type of query, symptoms of attacking other web services etc. Then it will update the final trust value and return it back to CTP engine. If its trust value is decreased, then CTP engine will further check the cause of this sudden change and afterwards can block the user from cloud services. If the trust value is increased then the request will be processed quickly. In this way trustworthy client will have fast access.
  • 2. Previous Work and Criticism Several trust modeling mechanisms has been cited for improvement of this protocol. • Some of them are using fuzzy comprehensive logic theory along side with direct and reputation based trust to determine optimum trust value. [3] • Service Level Assignment based trust level. It is basically an agreement between the service provider and consumer for monitoring quality of service and service level violation if any. But this approach only focuses on visible elements and totally ignores invisible elements like transparency, privacy etc. [4] • Reputation based approach. In this approach a new company will always suffer to get good trust value. [9][2] • D-S Evidence theory and sliding window approach. In this process, the model only considers the evidence from interaction between that particular CSP and User. They did not consider any other trust value factor. [8] • There are no special works accessible for tackling CTP engine’s special privilege acceleration problem. References [1] Acquiring forensic evidence from infrastructure-as-a-service cloud computing available at http://www.sciencedirect.com/science/article/pii/S1742287612000266 [2] A Survey Study on Reputation-Based Trust Management in P2P Networks, available at http://www.comp.nus.edu.sg/~cs6203/guidelines/topic7/survey-trust-reputation.pdf [3] A Method for Trust Quantification in Cloud Computing Environments at http://dsn.sagepub.com/content/12/2/5052614.full [4] SLA-Based Trust Model for Cloud Computing available at http://ieeexplore.ieee.org/document/5636125/ [5] Cloud Trust - a security assessment model for IaaS Clouds at https://www.computer.org/csdl/trans/cc/preprint/07072526.pdf [6] Cloud Audit and Cloud Trust Protocol available at http://www.issa- dv.org/meetings/presentations/2011-12-09/2011-12-09_Presentation_01_Lingenfelter.pdf [7] Trust Model for Measuring Security Strength of Cloud Computing Service available at http://ac.els- cdn.com/S1877050915004081/1-s2.0-S1877050915004081-main.pdf?_tid=e4e1e0a0-7ed3-11e6-b843- 00000aacb35d&acdnat=1474336102_d8afa8db53d844660bf8387f1dc42de4 [8] Research in Cloud Security and Privacy available at https://www.cs.purdue.edu/homes/bb/cloud/cloud-complete.ppt [9] A Trust Evaluation Model for Cloud Computing, available at http://www.sciencedirect.com/science/article/pii/S1877050913002822