Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon openaccess Fuzzy logic approach to modelling trust in cloud computing

Despite the growing deployment of mission critical applications on computing systems, trust and security continues to hinder its full adoption and deployment on cloud computing platforms. In addition to accountability and non-repudiation on the cloud deployment, end-users want to be confident of availability and reliability of services. For any cloud platform to be secure and trusted, the individual layers of the platform must be secure as there is no ‘one fits all solution’ for securing all the layers. This work presents a multi-layer trust security model (MLTSM) based on unified cloud platform trust that employs a fuzzy logic combination of on-demand states of several different security mechanisms, such as identification, direct and in-direct trust, across all cloud layers. In addition, results from a MATLAB-based simulation of the model are also presented. A MLTSM can improve the secure deployment of cloud infrastructure in mission critical sectors such as electrical power system operation, as it provides empirical evidence that allows direct (on-demand) determination and verification of the trust state of any given cloud computing platform or service. Such a modelling approach is useful for comparison, classification and improving end-user confidence in selecting or consuming cloud computing resources.

References

    1. 1)
      • 6. Huang, J., Nicol, D.M.: ‘Trust mechanisms for cloud computing’, J. Cloud Comput. Adv. Syst. Appl., 2013, 2, (1), p. 9.
    2. 2)
      • 15. Gu, L., Wang, C., Zhang, Y., et al: ‘Trust model in cloud computing environment based on fuzzy theory’, Int. J. Comput. Commun. Control, 2014, 9, (5), p. 570.
    3. 3)
      • 17. Prasath, V., Bharathan, N., Lakshmi, N.N.P.N., et al: ‘Fuzzy logic in cloud computing’, Int. J. Eng. Res. Technol., 2013, 2, (3), pp. 1-5.
    4. 4)
      • 18. Chen, X., Chen, C., Tao, Y., et al: ‘A cloud security assessment system based on classifying and grading’, IEEE Cloud Comput., 2015, 2, (2), pp. 5867.
    5. 5)
      • 8. Canedo, E.D., Rafael Timóteo de Sousa, R.R.de.C., Junior, R.de.O.A.: ‘Trust measurements yield distributed decision support in cloud computing’, Int. J. Cyber-Secur. Digit. Forensics, 2012, 1, (2), pp. 140151.
    6. 6)
      • 14. Yang, K., Jia, X., Ren, K., et al: ‘DACS-MACS: effective data access control for multiauthority cloud storage systems’, IEEE Trans. Inf. Forensics Secur., 2013, 8, (11), pp. 1790-1801.
    7. 7)
      • 19. Wallom, D., Turilli, M., Martin, A., et al: ‘myTrustedCloud: trusted cloud infrastructure for security-critical computation and data managment’. Cloudcom, 2011 IEEE Third Int. Conf. on Cloud Computing Technology and Science, 2011, pp. 247254.
    8. 8)
      • 22. Sivanandam, S.N., Sumathi, S., Deepa, S.N.: ‘Introduction to fuzzy logic using MATLAB’ (Springer Berlin Heidelberg, Berlin, Heidelberg, 2007).
    9. 9)
      • 13. Banirostam, H., Hedayati, A., Zadeh, A.K., et al: ‘A trust based approach for increasing security in cloud computing infrastructure’. 15th Int. Conf. on Computer Modelling Simulation, 2013.
    10. 10)
      • 21. Hwang, K., Li, D.: ‘Trusted cloud computing with secure resources and data coloring’, IEEE Internet Comput., 2010, 14, (5), pp. 1422.
    11. 11)
      • 5. Ko, R.K.L., Jagadpramana, P., Mowbray, M., et al: ‘TrustCloud: a framework for accountability and trust in cloud computing’. 2011 IEEE World Congress on Services, 2011, pp. 584588.
    12. 12)
      • 3. Mell, P.: ‘What's special about cloud security?’, IT Prof., 2012, 14, (4), pp. 68.
    13. 13)
      • 12. Fan, W., Perros, H.: ‘A novel trust management framework for multi-cloud environments based on trust service providers’, Knowledge-Based Syst., 2014, 70, pp. 392406.
    14. 14)
      • 2. Sule, M.-J., Li, M., Taylor, G.A., et al: ‘Deploying trusted cloud computing for data intensive power system applications’. 2015 50th Int. Universities Power Engineering Conf. (UPEC), 2015, pp. 15.
    15. 15)
      • 1. Mell, P., Grance, T.: ‘The NIST definition of cloud computing (draft) recommendations of the National Institute of Standards and Technology’, Nist Spec. Publ., 2011, 145, (6), p. 7.
    16. 16)
      • 10. Shaikh, R., Sasikumar, M.: ‘Trust model for measuring security strength of cloud computing service’, Procedia Comput. Sci., 2015, 45, pp. 380389.
    17. 17)
      • 16. Mohsenzadeh, A., Motameni, H.: ‘A trust model between cloud entities using fuzzy mathematics’, J. Intell. Fuzzy Syst., 2015, 29, (5), pp. 17951803.
    18. 18)
      • 20. SSH Communication Security: ‘Why SSH Communication Security?’. 2016. Available at http://www.ssh.com/.
    19. 19)
      • 4. Pearson, S., Benameur, A.: ‘Privacy, security and trust issues arising from cloud computing’. 2010 IEEE Second Int. Conf. on Cloud Computing Technology and Science, 2010, pp. 693702.
    20. 20)
      • 9. Jansen, W., Grance, T.: ‘Guidelines on security and privacy in public cloud computing’, Technical Report, NIST, Gaithersburg, MD, United States, 2011, SP 800-144.
    21. 21)
      • 7. Sun, D., Chang, G., Sun, L., et al: ‘A dynamic multi-dimensional trust evaluation model to enhance security of cloud computing environments’, Int. J. Innov. Comput. Appl., 2012, 4, (3), pp. 200-212.
    22. 22)
      • 23. Zadeh, L.A.: ‘The concept of a linguistic variable and its application to approximate reasoning’, J. Inf. Sci., 1975, 8, pp. 199249.
    23. 23)
      • 11. Xu, W.: ‘A fuzzy reputation-based trust management scheme for cloud computing’, Int. J. Digit. Content Technol. its Appl., 2012, 6, (17), pp. 437445.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2017.0016
Loading

Related content

content/journals/10.1049/iet-cps.2017.0016
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address