IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence

Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence
View Sample PDF
Author(s): Manash Sarkar (Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, India), Soumya Banerjee (Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, India), Youakim Badr (National Institute of Applied Sciences of Lyon, France)and Arun Kumar Sangaiah (VIT University, India)
Copyright: 2018
Pages: 23
Source title: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-5634-3.ch020

Purchase

View Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence on the publisher's website for pricing and purchasing information.

Abstract

Emerging research concerns about the authenticated cloud service with high performance of security and assuring trust for distributed clients in a smart city. Cloud services are deployed by the third-party or web-based service providers. Thus, security and trust would be considered for every layer of cloud architecture. The principle objective of cloud service providers is to deliver better services with assurance of trust about clients' information. Cloud's users recurrently face different security challenges about the use of sharable resources. It is really difficult for Cloud Service Provider for adapting varieties of security policies to sustain their enterprises' goodwill. To make an optimistic decision that would be better suitable to provide a trusted cloud service for users' in smart city. Statistical method known as Multivariate Normal Distribution is used to select different attributes of different security entities for developing the proposed model. Finally, fuzzy multi objective decision making and Bio-Inspired Bat algorithm are applied to achieve the objective.

Related Content

Preethi, Sapna R., Mohammed Mujeer Ulla. © 2023. 16 pages.
Srividya P.. © 2023. 12 pages.
Preeti Sahu. © 2023. 15 pages.
Vandana Niranjan. © 2023. 23 pages.
S. Darwin, E. Fantin Irudaya Raj, M. Appadurai, M. Chithambara Thanu. © 2023. 33 pages.
Shankara Murthy H. M., Niranjana Rai, Ramakrishna N. Hegde. © 2023. 23 pages.
Jothimani K., Bhagya Jyothi K. L.. © 2023. 19 pages.
Body Bottom