Trustworthy Cloud Services for IoT Security: Triple Integration of Security, Privacy and Reputation
Amarnath J L1, Pritam Gajakumar Shah2, Chandramouli H3, Arun Kumar S4
1Amarnath J L, Assistant professor, Computer Engineering, Research Scholar at Vishveswaraya Technological University Belagavi.
2Pritam Gajakumar Shah, Chief Editor Australian journal of wireless technology mobility and security Canberra Australia, University of Canberra.
3Chandramouli H, Professor, Department of Computer Science and Engineering, East Point College of Engineering and Technology, Bangaluru.
4Arun Kumar S, Assistant Professor, Department of Computer Science and Engineering, South East Asian College of Engineering and Technology, Bangaluru.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 3280-3283 | Volume-8 Issue-6, August 2019. | Retrieval Number: F9536088619/2019©BEIESP | DOI: 10.35940/ijeat.F9536.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In this era of digital world, Internet of Things (IoT) plays a vital role almost in every field of engineering. Now a days, almost every system has adopted this technology due to it’s ease in access, design and development. However the technology still suffers from the issues of available resources for computing of huge amount of IoT data. In order to solve these issues, it is necessary to adopt trustworthy cloud based architecture. The trust level calculation of these cloud services is a challenging task. In this paper, we have developed a triple integrated assessment for the trust evaluation of a cloud network. This assessment has been carried out using the three major parameters i.e. security, privacy and reputation. Security assessment of the cloud service has been carried out using the security metrics like security controls deliverable. The privacy assessment is evaluated using the Privacy Impact Assessment(PIA) tool. Finally the reputation assessment of the cloud network is carried out using the reputation of it’s cloud services. Experiments are carried out on different real – world web service datasets which shows that the proposed assessment model works efficiently than all other assessment models.
Keywords: Cloud services, IoT, Trustworthy cloud, Security, Privacy and Reputation assessments.