Abstract

Since its inception, cloud computing technology is serving in almost all the possible domains like healthcare, banking, retail, insurance, aviation etc. Services are provided using the various service models like SaaS, PaaS, and IaaS in cloud computing. Use of these service models has significantly reduces the overall implementation cost at service provider end and at user’s end. Users have to subscribe to the various services provided by these service providers to store or access of the information. In many cases, users have to store their personal information on the servers located geographically in the distributed environment. In this chapter, we have explored the various possibilities that could breach the trust between Cloud service provider and the user. User must trust their service provider if it ensures various measures which are required to build the trust i.e. from creation of information to its destruction a complete traceability of the data should be there. We have also discussed the scenarios that depict the various trust principles or provides the thorough implementation of authentication and auditability measures.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call