ABSTRACT

This chapter discusses computing data in a cloud, current challenges to store, retrieve, process, as well as security requirements, and possible solutions. It frames the trust-based access control model that incorporates a digital signature to minimize the malicious activity for storage, retrieval, updates, and processing of sensitive data. The chapter provides the trust framework for the user and access control algorithms for data processing in the cloud environment. Cloud computing is a paradigm with unlimited on-demand services that is software as a service. It can virtualize hardware and software resources, with high processing power, storage, and pay-per-usage. Big Data technology solves many problems irrespective of volume, velocity, and source of generation. It is a continually changing technology, and many industries, customers, and government agencies are involved in usage and managing. Vulnerability assessment of the devices and software supporting these devices are essential to trust the functionality of these devices.