Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Adaptive and attribute-based trust model for service-level agreement guarantee in cloud computing

In cloud computing, trust management is more important than ever before in the use of information and communication technologies. Owing to the dynamic nature of the cloud, continuous monitoring on trust attributes is necessary to enforce service-level agreements. This study presents Cloud-Trust, an adaptive trust management model for efficiently evaluating the competence of a cloud service based on its multiple trust attributes. In Cloud-Trust, two kinds of adaptive modelling tools (rough set and induced ordered weighted averaging (IOWA) operator) are organically integrated and successfully applied to trust data mining and knowledge discovery. Using rough set to discover knowledge from trust attributes makes the model surpass the limitations of traditional models, in which weights are assigned subjectively. Moreover, Cloud-Trust uses the IOWA operator to aggregate the global trust degree based on time series, thereby enabling better real-time performance. Experimental results show that Cloud-Trust converges more rapidly and accurately than do existing approaches, thereby verifying that it can effectively take on trust measurement tasks in cloud computing.

References

    1. 1)
      • 5. Hwang, K., Kulkarni, S., Hu, Y.: ‘Cloud security with virtualized defense and reputation-based trust management’. Proc. IEEE Int. Conf. Dependable, Autonomic, and Secure Computing (DASC 09), 2009.
    2. 2)
      • 26. Wu, J., Wu, X., Gao, Z.: ‘Multi-attribute weight allocation based on fuzzy clustering analysis and rough sets’, (LNCS, 5821), 2009, pp. 358365.
    3. 3)
      • 28. Yager, R.R., Filev, D.P.: ‘Induced ordered weighted averaging operators’, IEEE Trans. Syst. Man Cybern., 1999, 29, (2), pp. 141150 (doi: 10.1109/3477.752789).
    4. 4)
      • 27. Yager, R.R.: ‘On ordered weighted averaging aggregation operators in multi-criteria decision making’, IEEE Trans. Syst. Man Cybern., 1988, 18, (1), pp. 183190 (doi: 10.1109/21.87068).
    5. 5)
      • 23. Friedman, E.J., Resnick, P.: ‘The social cost of cheap pseudonyms’, J. Econ. Manage. Strateg., 2001, 10, (2), pp. 173C199.
    6. 6)
      • 9. Manuel, P.D., Thamarai Selvi, S., Barr, M.I.A.E.: ‘Trust management system for grid and cloud resources’. Proc. First Int. Conf. on Advanced Computing (ICAC 2009), 13–15 December 2009, pp. 176181.
    7. 7)
      • 25. Wang, G.: ‘Decision table reduction based on conditional information entropy’, Chin. J. Comput., 2002, 25, (7), pp. 759766.
    8. 8)
      • 2. Patel, P., Ranabahu, A., Sheth, A.: ‘Service level agreement in cloud computing’. Proc. Cloud Workshops at OOPSLA09, 25–29 October 2009, pp. 110.
    9. 9)
      • 22. Yan, Z., Prehofer, C.: ‘Autonomic trust management for a component based software system’, IEEE Trans. Dependable Secur. Comput., 2011, 8, (6), pp. 810823 (doi: 10.1109/TDSC.2010.47).
    10. 10)
      • 11. Alhamad, M., Dillon, T., Chang, E.: ‘SLA-based trust model for cloud computing’. Proc. 2010 13th Int. Conf. on Network-Based Information Systems, 2010, pp. 321324.
    11. 11)
      • 21. Li, X., Gui, X.: ‘A comprehensive and adaptive trust model for large-scale P2P networks’, J. Comput. Sci. Technol., 2009, 24, (5), pp. 868882 (doi: 10.1007/s11390-009-9278-4).
    12. 12)
      • 19. LI, X., Zhou, F., Yang, X.: ‘Scalable feedback aggregating (SFA) overlay for large-scale P2P trust management’, IEEE Trans. Parallel Distrib. Syst., 2012, 23, (10), pp. 19441957 (doi: 10.1109/TPDS.2012.26).
    13. 13)
      • 17. Sun, Y., Yu, W., Han, Z., Liu, K.J.R.: ‘Information theoretic framework of trust modeling and evaluation for ad-hoc networks’, IEEE J. Sel. Areas Commun., 2006, 249, (2), pp. 305319.
    14. 14)
      • 30. Chase, R.B., Jacobs, F.R., Aquilano, N.J.: ‘Operations management for competitive advantage’, in Chase, R.B. (Ed.) (McGraw-Hill, New York, 2005).
    15. 15)
      • 10. Tian, L., Lin, C., Yang, N.: ‘Evaluation of user behavior trust in cloud computing’. Proc. 2010 Int. Conf. on Computer Application and System Modeling (ICCASM 2010), 2010, pp. 576572.
    16. 16)
      • 14. Jøsang, A., Golbeck, J.: ‘Challenges for robust of trust and reputation systems’. Proc. Fifth Int. Workshop on Security and Trust Management (STM 2009), Saint Malo, France, September 2009.
    17. 17)
      • 24. Pawlak, Z.: ‘Rough sets’, Int. J. Comput. Inf. Sci., 1982, 11, (5), pp. 341356 (doi: 10.1007/BF01001956).
    18. 18)
      • 3. Alhamad, M., Dillon, T., Chang, E.: ‘Conceptual SLA framework for cloud computing’. Proc. Fourth IEEE Int. Conf. on Digital Ecosystems and Technologies (IEEE DEST 2010), pp. 606610.
    19. 19)
      • 1. Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: ‘A break in the clouds: towards a cloud definition’, ACM SIGCOMM Comput. Commun. Rev., 2009, 39, (1), pp. 5055 (doi: 10.1145/1496091.1496100).
    20. 20)
      • 8. Kim, H., Lee, H., Kim, W., Kim, Y.: ‘A trust evaluation model for QoS guarantee in cloud systems’, Int. J. Grid Distrib. Comput., 2010, 3, (1), pp. 110.
    21. 21)
      • 29. Mitchell, H.B., Estrakh, D.D.: ‘A modified OWA operator and its use in LOssless DPCM image compression’, Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 1997, 5, pp. 429436 (doi: 10.1142/S0218488597000324).
    22. 22)
      • 20. Li, X., Zhou, F., Yang, X.: ‘A multi-dimensional trust evaluation model for large-scale P2P computing’, J. Parallel Distrib. Comput., 2011, 71, (6), pp. 837847 (doi: 10.1016/j.jpdc.2011.01.007).
    23. 23)
      • 4. Monsef, M., Gidado, N.: ‘Trust and privacy concern in the Cloud’. Proc. 2011 European Cup, IT Security for the Next Generation, 2011, pp. 115.
    24. 24)
      • 15. Stefan, S., Robert, S.: ‘Fuzzy trust evaluation and credibility development in multi-agent systems’, Appl. Soft Comput., 2007, 41, (7), pp. 492505.
    25. 25)
      • 12. Ai, L., Tang, M., Fidge, C.J.: ‘QoS-oriented Resource allocation and scheduling of multiple composite web services in a hybrid cloud using a random-key genetic algorithm’. Proc. 17th Int. Conf. on Neural Information Processing (ICONIP 2010), November 2010, Sydney, pp. 2225.
    26. 26)
      • 6. Hwang, K., Li, D.: ‘Trusted cloud computing with secure resources and data coloring’, IEEE Internet Comput., 2010, 14, (5), pp. 1422 (doi: 10.1109/MIC.2010.86).
    27. 27)
      • 7. Khan, K.M., Malluhi, Q.: ‘Establishing trust in cloud computing’, IEEE IT Prof., 2010, 12, (5), pp. 2027 (doi: 10.1109/MITP.2010.128).
    28. 28)
      • 18. Liang, Z., Shi, W.: ‘Enforcing cooperative resource sharing in untrusted Peer-to-Peer environments’, J. Mob. Netw. Appl., 2005, 10, (6), pp. 771783.
    29. 29)
      • 13. Li, H., Singhal, M.: ‘Trust management in distributed systems’, IEEE Comput., 2007, 40, (2), pp. 4553 (doi: 10.1109/MC.2007.76).
    30. 30)
      • 16. Theodorakopoulos, G., Baras, J.S.: ‘On trust models and trust evaluation metrics for ad-hoc networks’, IEEE J. Sel. Areas Commun., 2006, 24, (2), pp. 318328 (doi: 10.1109/JSAC.2005.861390).
    31. 31)
      • Alhamad, M., Dillon, T., Chang, E.: `Conceptual SLA framework for cloud computing', Proc. Fourth IEEE Int. Conf. on Digital Ecosystems and Technologies (IEEE DEST 2010), p. 606–610.
    32. 32)
    33. 33)
    34. 34)
    35. 35)
      • J. Wu , X. Wu , Z. Gao . Multi-attribute weight allocation based on fuzzy clustering analysis and rough sets. LNCS , 358 - 365
    36. 36)
      • Alhamad, M., Dillon, T., Chang, E.: `SLA-based trust model for cloud computing', Proc. 2010 13th Int. Conf. on Network-Based Information Systems, 2010, p. 321–324.
    37. 37)
      • S. Stefan , S. Robert . Fuzzy trust evaluation and credibility development in multi-agent systems. Appl. Soft Comput. , 7 , 492 - 505
    38. 38)
    39. 39)
      • Tian, L., Lin, C., Yang, N.: `Evaluation of user behavior trust in cloud computing', Proc. 2010 Int. Conf. on Computer Application and System Modeling (ICCASM 2010), 2010, p. 576–572.
    40. 40)
      • Monsef, M., Gidado, N.: `Trust and privacy concern in the Cloud', Proc. 2011 European Cup, IT Security for the Next Generation, 2011, p. 1–15.
    41. 41)
    42. 42)
      • Manuel, P.D., Thamarai Selvi, S., Barr, M.I.A.E.: `Trust management system for grid and cloud resources', Proc. First Int. Conf. on Advanced Computing (ICAC 2009), 13–15 December 2009, p. 176–181.
    43. 43)
    44. 44)
    45. 45)
      • H. Kim , H. Lee , W. Kim , Y. Kim . A trust evaluation model for QoS guarantee in cloud systems. Int. J. Grid Distrib. Comput. , 1 , 1 - 10
    46. 46)
    47. 47)
    48. 48)
    49. 49)
    50. 50)
      • Hwang, K., Kulkarni, S., Hu, Y.: `Cloud security with virtualized defense and reputation-based trust management', Proc. IEEE Int. Conf. Dependable, Autonomic, and Secure Computing (DASC 09), 2009.
    51. 51)
      • G. Wang . Decision table reduction based on conditional information entropy. Chin. J. Comput. , 7 , 759 - 766
    52. 52)
      • Ai, L., Tang, M., Fidge, C.J.: `QoS-oriented Resource allocation and scheduling of multiple composite web services in a hybrid cloud using a random-key genetic algorithm', Proc. 17th Int. Conf. on Neural Information Processing (ICONIP 2010), November 2010, Sydney, p. 22–25.
    53. 53)
    54. 54)
      • Y. Sun , W. Yu , Z. Han , K.J.R. Liu . Information theoretic framework of trust modeling and evaluation for ad-hoc networks. IEEE J. Sel. Areas Commun. , 2 , 305 - 319
    55. 55)
      • Patel, P., Ranabahu, A., Sheth, A.: `Service level agreement in cloud computing', Proc. Cloud Workshops at OOPSLA09, 25–29 October 2009, p. 1–10.
    56. 56)
    57. 57)
      • E.J. Friedman , P. Resnick . The social cost of cheap pseudonyms. J. Econ. Manage. Strateg , 2
    58. 58)
      • R.B. Chase , F.R. Jacobs , N.J. Aquilano , R.B. Chase . (2005) Operations management for competitive advantage.
    59. 59)
      • Z. Liang , W. Shi . Enforcing cooperative resource sharing in untrusted Peer-to-Peer environments. J. Mob. Netw. Appl. , 6 , 771 - 783
    60. 60)
      • Jøsang, A., Golbeck, J.: `Challenges for robust of trust and reputation systems', Proc. Fifth Int. Workshop on Security and Trust Management (STM 2009), September 2009, Saint Malo, France.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2012.0232
Loading

Related content

content/journals/10.1049/iet-ifs.2012.0232
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address