Adaptive and attribute-based trust model for service-level agreement guarantee in cloud computing

Adaptive and attribute-based trust model for service-level agreement guarantee in cloud computing

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In cloud computing, trust management is more important than ever before in the use of information and communication technologies. Owing to the dynamic nature of the cloud, continuous monitoring on trust attributes is necessary to enforce service-level agreements. This study presents Cloud-Trust, an adaptive trust management model for efficiently evaluating the competence of a cloud service based on its multiple trust attributes. In Cloud-Trust, two kinds of adaptive modelling tools (rough set and induced ordered weighted averaging (IOWA) operator) are organically integrated and successfully applied to trust data mining and knowledge discovery. Using rough set to discover knowledge from trust attributes makes the model surpass the limitations of traditional models, in which weights are assigned subjectively. Moreover, Cloud-Trust uses the IOWA operator to aggregate the global trust degree based on time series, thereby enabling better real-time performance. Experimental results show that Cloud-Trust converges more rapidly and accurately than do existing approaches, thereby verifying that it can effectively take on trust measurement tasks in cloud computing.


    1. 1)
    2. 2)
      • Patel, P., Ranabahu, A., Sheth, A.: `Service level agreement in cloud computing', Proc. Cloud Workshops at OOPSLA09, 25–29 October 2009, p. 1–10.
    3. 3)
      • Alhamad, M., Dillon, T., Chang, E.: `Conceptual SLA framework for cloud computing', Proc. Fourth IEEE Int. Conf. on Digital Ecosystems and Technologies (IEEE DEST 2010), p. 606–610.
    4. 4)
      • Monsef, M., Gidado, N.: `Trust and privacy concern in the Cloud', Proc. 2011 European Cup, IT Security for the Next Generation, 2011, p. 1–15.
    5. 5)
      • Hwang, K., Kulkarni, S., Hu, Y.: `Cloud security with virtualized defense and reputation-based trust management', Proc. IEEE Int. Conf. Dependable, Autonomic, and Secure Computing (DASC 09), 2009.
    6. 6)
    7. 7)
    8. 8)
      • H. Kim , H. Lee , W. Kim , Y. Kim . A trust evaluation model for QoS guarantee in cloud systems. Int. J. Grid Distrib. Comput. , 1 , 1 - 10
    9. 9)
      • Manuel, P.D., Thamarai Selvi, S., Barr, M.I.A.E.: `Trust management system for grid and cloud resources', Proc. First Int. Conf. on Advanced Computing (ICAC 2009), 13–15 December 2009, p. 176–181.
    10. 10)
      • Tian, L., Lin, C., Yang, N.: `Evaluation of user behavior trust in cloud computing', Proc. 2010 Int. Conf. on Computer Application and System Modeling (ICCASM 2010), 2010, p. 576–572.
    11. 11)
      • Alhamad, M., Dillon, T., Chang, E.: `SLA-based trust model for cloud computing', Proc. 2010 13th Int. Conf. on Network-Based Information Systems, 2010, p. 321–324.
    12. 12)
      • Ai, L., Tang, M., Fidge, C.J.: `QoS-oriented Resource allocation and scheduling of multiple composite web services in a hybrid cloud using a random-key genetic algorithm', Proc. 17th Int. Conf. on Neural Information Processing (ICONIP 2010), November 2010, Sydney, p. 22–25.
    13. 13)
    14. 14)
      • Jøsang, A., Golbeck, J.: `Challenges for robust of trust and reputation systems', Proc. Fifth Int. Workshop on Security and Trust Management (STM 2009), September 2009, Saint Malo, France.
    15. 15)
      • S. Stefan , S. Robert . Fuzzy trust evaluation and credibility development in multi-agent systems. Appl. Soft Comput. , 7 , 492 - 505
    16. 16)
    17. 17)
      • Y. Sun , W. Yu , Z. Han , K.J.R. Liu . Information theoretic framework of trust modeling and evaluation for ad-hoc networks. IEEE J. Sel. Areas Commun. , 2 , 305 - 319
    18. 18)
      • Z. Liang , W. Shi . Enforcing cooperative resource sharing in untrusted Peer-to-Peer environments. J. Mob. Netw. Appl. , 6 , 771 - 783
    19. 19)
    20. 20)
    21. 21)
    22. 22)
    23. 23)
      • E.J. Friedman , P. Resnick . The social cost of cheap pseudonyms. J. Econ. Manage. Strateg , 2
    24. 24)
    25. 25)
      • G. Wang . Decision table reduction based on conditional information entropy. Chin. J. Comput. , 7 , 759 - 766
    26. 26)
      • J. Wu , X. Wu , Z. Gao . Multi-attribute weight allocation based on fuzzy clustering analysis and rough sets. LNCS , 358 - 365
    27. 27)
    28. 28)
    29. 29)
    30. 30)
      • R.B. Chase , F.R. Jacobs , N.J. Aquilano , R.B. Chase . (2005) Operations management for competitive advantage.

Related content

This is a required field
Please enter a valid email address