IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence

Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence
View Sample PDF
Author(s): Manash Sarkar (Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, India), Soumya Banerjee (Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, India), Youakim Badr (National Institute of Applied Sciences, France)and Arun Kumar Sangaiah (VIT University, India)
Copyright: 2019
Pages: 23
Source title: Smart Cities and Smart Spaces: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-7030-1.ch038

Purchase

View Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence on the publisher's website for pricing and purchasing information.

Abstract

Emerging research concerns about the authenticated cloud service with high performance of security and assuring trust for distributed clients in a smart city. Cloud services are deployed by the third-party or web-based service providers. Thus, security and trust would be considered for every layer of cloud architecture. The principle objective of cloud service providers is to deliver better services with assurance of trust about clients' information. Cloud's users recurrently face different security challenges about the use of sharable resources. It is really difficult for Cloud Service Provider for adapting varieties of security policies to sustain their enterprises' goodwill. To make an optimistic decision that would be better suitable to provide a trusted cloud service for users' in smart city. Statistical method known as Multivariate Normal Distribution is used to select different attributes of different security entities for developing the proposed model. Finally, fuzzy multi objective decision making and Bio-Inspired Bat algorithm are applied to achieve the objective.

Related Content

Kemal Yasin Göka, Halil Ibrahim Yiğit, Olcay Polat, Görkem Gülhan, Aşkıner Güngör, Soner Haldenbilen, Halim Ceylan. © 2024. 25 pages.
Hasibul Islam Lingkon, Syed Imran Ali. © 2024. 18 pages.
Metin Mutlu Aydin. © 2024. 21 pages.
Jorge Chicaiza Vaca, Markus Rabe, Jesus Gonzalez-Feliu. © 2024. 22 pages.
Aysun Aygün Oğur, Mehmet Penpecioğlu, Sezen Savran Penpecioğlu. © 2024. 21 pages.
Olcay Polat, Aşkıner Güngör, Soner Haldenbilen, Halim Ceylan. © 2024. 20 pages.
Tayfun Salihoğlu. © 2024. 26 pages.
Body Bottom