Adaptive and attribute-based trust model for service-level agreement guarantee in cloud computing
- Author(s): Xiaoyong Li 1 and Junping Du 1
-
-
View affiliations
-
Affiliations:
1:
Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing 100876, People's Republic of China
-
Affiliations:
1:
Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing 100876, People's Republic of China
- Source:
Volume 7, Issue 1,
March 2013,
p.
39 – 50
DOI: 10.1049/iet-ifs.2012.0232 , Print ISSN 1751-8709, Online ISSN 1751-8717
In cloud computing, trust management is more important than ever before in the use of information and communication technologies. Owing to the dynamic nature of the cloud, continuous monitoring on trust attributes is necessary to enforce service-level agreements. This study presents Cloud-Trust, an adaptive trust management model for efficiently evaluating the competence of a cloud service based on its multiple trust attributes. In Cloud-Trust, two kinds of adaptive modelling tools (rough set and induced ordered weighted averaging (IOWA) operator) are organically integrated and successfully applied to trust data mining and knowledge discovery. Using rough set to discover knowledge from trust attributes makes the model surpass the limitations of traditional models, in which weights are assigned subjectively. Moreover, Cloud-Trust uses the IOWA operator to aggregate the global trust degree based on time series, thereby enabling better real-time performance. Experimental results show that Cloud-Trust converges more rapidly and accurately than do existing approaches, thereby verifying that it can effectively take on trust measurement tasks in cloud computing.
Inspec keywords: data mining; cloud computing; contracts; data privacy; rough set theory; information technology; trusted computing
Other keywords:
Cloud-Trust;
information and communication technologies;
adaptive trust management;
Subjects: Internet software; Knowledge engineering techniques; Data security
References
-
-
1)
-
5. Hwang, K., Kulkarni, S., Hu, Y.: ‘Cloud security with virtualized defense and reputation-based trust management’. Proc. IEEE Int. Conf. Dependable, Autonomic, and Secure Computing (DASC 09), 2009.
-
-
2)
-
26. Wu, J., Wu, X., Gao, Z.: ‘Multi-attribute weight allocation based on fuzzy clustering analysis and rough sets’, (LNCS, 5821), 2009, pp. 358–365.
-
-
3)
-
28. Yager, R.R., Filev, D.P.: ‘Induced ordered weighted averaging operators’, IEEE Trans. Syst. Man Cybern., 1999, 29, (2), pp. 141–150 (doi: 10.1109/3477.752789).
-
-
4)
-
27. Yager, R.R.: ‘On ordered weighted averaging aggregation operators in multi-criteria decision making’, IEEE Trans. Syst. Man Cybern., 1988, 18, (1), pp. 183–190 (doi: 10.1109/21.87068).
-
-
5)
-
23. Friedman, E.J., Resnick, P.: ‘The social cost of cheap pseudonyms’, J. Econ. Manage. Strateg., 2001, 10, (2), pp. 173C199.
-
-
6)
-
9. Manuel, P.D., Thamarai Selvi, S., Barr, M.I.A.E.: ‘Trust management system for grid and cloud resources’. Proc. First Int. Conf. on Advanced Computing (ICAC 2009), 13–15 December 2009, pp. 176–181.
-
-
7)
-
25. Wang, G.: ‘Decision table reduction based on conditional information entropy’, Chin. J. Comput., 2002, 25, (7), pp. 759–766.
-
-
8)
-
2. Patel, P., Ranabahu, A., Sheth, A.: ‘Service level agreement in cloud computing’. Proc. Cloud Workshops at OOPSLA09, 25–29 October 2009, pp. 1–10.
-
-
9)
-
22. Yan, Z., Prehofer, C.: ‘Autonomic trust management for a component based software system’, IEEE Trans. Dependable Secur. Comput., 2011, 8, (6), pp. 810–823 (doi: 10.1109/TDSC.2010.47).
-
-
10)
-
11. Alhamad, M., Dillon, T., Chang, E.: ‘SLA-based trust model for cloud computing’. Proc. 2010 13th Int. Conf. on Network-Based Information Systems, 2010, pp. 321–324.
-
-
11)
-
21. Li, X., Gui, X.: ‘A comprehensive and adaptive trust model for large-scale P2P networks’, J. Comput. Sci. Technol., 2009, 24, (5), pp. 868–882 (doi: 10.1007/s11390-009-9278-4).
-
-
12)
-
19. LI, X., Zhou, F., Yang, X.: ‘Scalable feedback aggregating (SFA) overlay for large-scale P2P trust management’, IEEE Trans. Parallel Distrib. Syst., 2012, 23, (10), pp. 1944–1957 (doi: 10.1109/TPDS.2012.26).
-
-
13)
-
17. Sun, Y., Yu, W., Han, Z., Liu, K.J.R.: ‘Information theoretic framework of trust modeling and evaluation for ad-hoc networks’, IEEE J. Sel. Areas Commun., 2006, 249, (2), pp. 305–319.
-
-
14)
-
30. Chase, R.B., Jacobs, F.R., Aquilano, N.J.: ‘Operations management for competitive advantage’, in Chase, R.B. (Ed.) (McGraw-Hill, New York, 2005).
-
-
15)
-
10. Tian, L., Lin, C., Yang, N.: ‘Evaluation of user behavior trust in cloud computing’. Proc. 2010 Int. Conf. on Computer Application and System Modeling (ICCASM 2010), 2010, pp. 576–572.
-
-
16)
-
14. Jøsang, A., Golbeck, J.: ‘Challenges for robust of trust and reputation systems’. Proc. Fifth Int. Workshop on Security and Trust Management (STM 2009), Saint Malo, France, September 2009.
-
-
17)
-
24. Pawlak, Z.: ‘Rough sets’, Int. J. Comput. Inf. Sci., 1982, 11, (5), pp. 341–356 (doi: 10.1007/BF01001956).
-
-
18)
-
3. Alhamad, M., Dillon, T., Chang, E.: ‘Conceptual SLA framework for cloud computing’. Proc. Fourth IEEE Int. Conf. on Digital Ecosystems and Technologies (IEEE DEST 2010), pp. 606–610.
-
-
19)
-
1. Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: ‘A break in the clouds: towards a cloud definition’, ACM SIGCOMM Comput. Commun. Rev., 2009, 39, (1), pp. 50–55 (doi: 10.1145/1496091.1496100).
-
-
20)
-
8. Kim, H., Lee, H., Kim, W., Kim, Y.: ‘A trust evaluation model for QoS guarantee in cloud systems’, Int. J. Grid Distrib. Comput., 2010, 3, (1), pp. 1–10.
-
-
21)
-
29. Mitchell, H.B., Estrakh, D.D.: ‘A modified OWA operator and its use in LOssless DPCM image compression’, Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 1997, 5, pp. 429–436 (doi: 10.1142/S0218488597000324).
-
-
22)
-
20. Li, X., Zhou, F., Yang, X.: ‘A multi-dimensional trust evaluation model for large-scale P2P computing’, J. Parallel Distrib. Comput., 2011, 71, (6), pp. 837–847 (doi: 10.1016/j.jpdc.2011.01.007).
-
-
23)
-
4. Monsef, M., Gidado, N.: ‘Trust and privacy concern in the Cloud’. Proc. 2011 European Cup, IT Security for the Next Generation, 2011, pp. 1–15.
-
-
24)
-
15. Stefan, S., Robert, S.: ‘Fuzzy trust evaluation and credibility development in multi-agent systems’, Appl. Soft Comput., 2007, 41, (7), pp. 492–505.
-
-
25)
-
12. Ai, L., Tang, M., Fidge, C.J.: ‘QoS-oriented Resource allocation and scheduling of multiple composite web services in a hybrid cloud using a random-key genetic algorithm’. Proc. 17th Int. Conf. on Neural Information Processing (ICONIP 2010), November 2010, Sydney, pp. 22–25.
-
-
26)
-
6. Hwang, K., Li, D.: ‘Trusted cloud computing with secure resources and data coloring’, IEEE Internet Comput., 2010, 14, (5), pp. 14–22 (doi: 10.1109/MIC.2010.86).
-
-
27)
-
7. Khan, K.M., Malluhi, Q.: ‘Establishing trust in cloud computing’, IEEE IT Prof., 2010, 12, (5), pp. 20–27 (doi: 10.1109/MITP.2010.128).
-
-
28)
-
18. Liang, Z., Shi, W.: ‘Enforcing cooperative resource sharing in untrusted Peer-to-Peer environments’, J. Mob. Netw. Appl., 2005, 10, (6), pp. 771–783.
-
-
29)
-
13. Li, H., Singhal, M.: ‘Trust management in distributed systems’, IEEE Comput., 2007, 40, (2), pp. 45–53 (doi: 10.1109/MC.2007.76).
-
-
30)
-
16. Theodorakopoulos, G., Baras, J.S.: ‘On trust models and trust evaluation metrics for ad-hoc networks’, IEEE J. Sel. Areas Commun., 2006, 24, (2), pp. 318–328 (doi: 10.1109/JSAC.2005.861390).
-
-
31)
- Alhamad, M., Dillon, T., Chang, E.: `Conceptual SLA framework for cloud computing', Proc. Fourth IEEE Int. Conf. on Digital Ecosystems and Technologies (IEEE DEST 2010), p. 606–610.
-
32)
- X. Li , F. Zhou , X. Yang . Scalable feedback aggregating (SFA) overlay for large-scale P2P trust management. IEEE Trans. Parallel Distrib. Syst. , 10 , 1944 - 1957
-
33)
- Z. Pawlak . Rough sets. Int. J. Comput. Inf. Sci. , 5 , 341 - 356
-
34)
- K. Hwang , D. Li . Trusted cloud computing with secure resources and data coloring. IEEE Internet Comput. , 5 , 14 - 22
-
35)
- J. Wu , X. Wu , Z. Gao . Multi-attribute weight allocation based on fuzzy clustering analysis and rough sets. LNCS , 358 - 365
-
36)
- Alhamad, M., Dillon, T., Chang, E.: `SLA-based trust model for cloud computing', Proc. 2010 13th Int. Conf. on Network-Based Information Systems, 2010, p. 321–324.
-
37)
- S. Stefan , S. Robert . Fuzzy trust evaluation and credibility development in multi-agent systems. Appl. Soft Comput. , 7 , 492 - 505
-
38)
- H.B. Mitchell , D.D. Estrakh . A modified OWA operator and its use in LOssless DPCM image compression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. , 429 - 436
-
39)
- Tian, L., Lin, C., Yang, N.: `Evaluation of user behavior trust in cloud computing', Proc. 2010 Int. Conf. on Computer Application and System Modeling (ICCASM 2010), 2010, p. 576–572.
-
40)
- Monsef, M., Gidado, N.: `Trust and privacy concern in the Cloud', Proc. 2011 European Cup, IT Security for the Next Generation, 2011, p. 1–15.
-
41)
- R.R. Yager . On ordered weighted averaging aggregation operators in multi-criteria decision making. IEEE Trans. Syst. Man Cybern. , 1 , 183 - 190
-
42)
- Manuel, P.D., Thamarai Selvi, S., Barr, M.I.A.E.: `Trust management system for grid and cloud resources', Proc. First Int. Conf. on Advanced Computing (ICAC 2009), 13–15 December 2009, p. 176–181.
-
43)
- Z. Yan , C. Prehofer . Autonomic trust management for a component based software system. IEEE Trans. Dependable Secur. Comput. , 6 , 810 - 823
-
44)
- H. Li , M. Singhal . Trust management in distributed systems. IEEE Comput. , 2 , 45 - 53
-
45)
- H. Kim , H. Lee , W. Kim , Y. Kim . A trust evaluation model for QoS guarantee in cloud systems. Int. J. Grid Distrib. Comput. , 1 , 1 - 10
-
46)
- X. Li , F. Zhou , X. Yang . A multi-dimensional trust evaluation model for large-scale P2P computing. J. Parallel Distrib. Comput. , 6 , 837 - 847
-
47)
- R.R. Yager , D.P. Filev . Induced ordered weighted averaging operators. IEEE Trans. Syst. Man Cybern. , 2 , 141 - 150
-
48)
- K.M. Khan , Q. Malluhi . Establishing trust in cloud computing. IEEE IT Prof. , 5 , 20 - 27
-
49)
- L.M. Vaquero , L. Rodero-Merino , J. Caceres , M. Lindner . A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput. Commun. Rev. , 1 , 50 - 55
-
50)
- Hwang, K., Kulkarni, S., Hu, Y.: `Cloud security with virtualized defense and reputation-based trust management', Proc. IEEE Int. Conf. Dependable, Autonomic, and Secure Computing (DASC 09), 2009.
-
51)
- G. Wang . Decision table reduction based on conditional information entropy. Chin. J. Comput. , 7 , 759 - 766
-
52)
- Ai, L., Tang, M., Fidge, C.J.: `QoS-oriented Resource allocation and scheduling of multiple composite web services in a hybrid cloud using a random-key genetic algorithm', Proc. 17th Int. Conf. on Neural Information Processing (ICONIP 2010), November 2010, Sydney, p. 22–25.
-
53)
- X. Li , X. Gui . A comprehensive and adaptive trust model for large-scale P2P networks. J. Comput. Sci. Technol. , 5 , 868 - 882
-
54)
- Y. Sun , W. Yu , Z. Han , K.J.R. Liu . Information theoretic framework of trust modeling and evaluation for ad-hoc networks. IEEE J. Sel. Areas Commun. , 2 , 305 - 319
-
55)
- Patel, P., Ranabahu, A., Sheth, A.: `Service level agreement in cloud computing', Proc. Cloud Workshops at OOPSLA09, 25–29 October 2009, p. 1–10.
-
56)
- G. Theodorakopoulos , J.S. Baras . On trust models and trust evaluation metrics for ad hoc networks. IEEE J. Sel. Areas Commun. , 2 , 318 - 328
-
57)
- E.J. Friedman , P. Resnick . The social cost of cheap pseudonyms. J. Econ. Manage. Strateg , 2
-
58)
- R.B. Chase , F.R. Jacobs , N.J. Aquilano , R.B. Chase . (2005) Operations management for competitive advantage.
-
59)
- Z. Liang , W. Shi . Enforcing cooperative resource sharing in untrusted Peer-to-Peer environments. J. Mob. Netw. Appl. , 6 , 771 - 783
-
60)
- Jøsang, A., Golbeck, J.: `Challenges for robust of trust and reputation systems', Proc. Fifth Int. Workshop on Security and Trust Management (STM 2009), September 2009, Saint Malo, France.
-
1)