International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 178 - Issue 14 |
Published: May 2019 |
Authors: Priyanka Pandey, Hitesh Kag |
![]() |
Priyanka Pandey, Hitesh Kag . Trust based Cloud Brokerage Approach using Cryptographic and Weighed Technique. International Journal of Computer Applications. 178, 14 (May 2019), 7-11. DOI=10.5120/ijca2019918903
@article{ 10.5120/ijca2019918903, author = { Priyanka Pandey,Hitesh Kag }, title = { Trust based Cloud Brokerage Approach using Cryptographic and Weighed Technique }, journal = { International Journal of Computer Applications }, year = { 2019 }, volume = { 178 }, number = { 14 }, pages = { 7-11 }, doi = { 10.5120/ijca2019918903 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2019 %A Priyanka Pandey %A Hitesh Kag %T Trust based Cloud Brokerage Approach using Cryptographic and Weighed Technique%T %J International Journal of Computer Applications %V 178 %N 14 %P 7-11 %R 10.5120/ijca2019918903 %I Foundation of Computer Science (FCS), NY, USA
Cloud computing is emerging as the future Internet technology due to its advantages such as sharing of IT resources, unlimited scalability and flexibility and high level of automation. Along the lines of rapid growth, the cloud computing technology also brings in concerns of security, trust and privacy of the applications and data that is hosted in the cloud environment. In this paper, we design and implemented trust based model of data during the brokerage. For preparing solution, in first step a cryptographic approach using the tiger hash and DES algorithm is provided which helps to preserve data on cloud securely. In addition to that, second step illustrate a new trust management concept using weighted trust technique. Our proposed approach is simplified yet efficient algorithm that can implemented for cloud brokerage application that strictly enforce the user trust that identified server rating. In this approach, we measure number of performance parameters which exemplify system availability in critical phase of the applications.