DOI QR코드

DOI QR Code

Service Oriented Cloud Computing Trusted Evaluation Model

  • 투고 : 2019.07.26
  • 심사 : 2020.05.29
  • 발행 : 2020.12.31

초록

More and more cloud computing services are being applied in various fields; however, it is difficult for users and cloud computing service platforms to establish trust among each other. The trust value cannot be measured accurately or effectively. To solve this problem, we design a service-oriented cloud trust assessment model using a cloud model. We also design a subjective preference weight allocation (SPWA) algorithm. A flexible weight model is advanced by combining SPWA with the entropy method. Aiming at the fuzziness and subjectivity of trust, the cloud model is used to measure the trust value of various cloud computing services. The SPWA algorithm is used to integrate each evaluation result to obtain the trust evaluation value of the entire cloud service provider.

키워드

참고문헌

  1. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, et al., "A view of cloud computing," Communications of the ACM, vol. 53, no.4, pp. 50-58, 2010. https://doi.org/10.1145/1721654.1721672
  2. D. G. Feng, M. Zhang, Y. Zhang, and Z. Xu, "Study on cloud computing security," Journal of Software, vol. 22, no. 1, pp. 71-83, 2011. https://doi.org/10.3724/SP.J.1001.2011.03958
  3. Q. Xie, J. Wu, G. Wang, W. Liu, D. Chen, and X. Yu, "Provably secure authentication protocol based on convertible proxy signcryption in cloud computing," Scientia Sinica Informationis, vol. 42, no. 3, pp. 303-313, 2012. https://doi.org/10.1360/112011-915
  4. L. M. Vaquero, L. Rodero-Merino, and D. Moran, "Locking the sky: a survey on IaaS cloud security," Computing, vol. 91, no. 1, pp. 93-118, 2011. https://doi.org/10.1007/s00607-010-0140-x
  5. K. Hashizume, D. G. Rosado, E. Fernandez-Medina, and E. B. Fernandez, "An analysis of security issues for cloud computing," Journal of Internet Services and Applications, vol. 4, article no. 5, 2013.
  6. C. Lin, W. B. Su, K. Meng, Q. Liu, and W. D. Liu, "Cloud computing security: architecture, mechanism and modeling," Chinese Journal of Computers, vol. 36, no. 9, pp. 1765-1784, 2013. https://doi.org/10.3724/SP.J.1016.2013.01765
  7. J. Huang and D. M. Nicol, "Trust mechanisms for cloud computing," Journal of Cloud Computing, vol. 2, article no. 9, 2013.
  8. P. Manuel, "A trust model of cloud computing based on Quality of Service," Annals of Operations Research, vol. 233, no. 1, pp. 281-292, 2015. https://doi.org/10.1007/s10479-013-1380-x
  9. R. Z. Du, J. F. Tian, and H. G. Zhang, "Cloud service selection model based on trust and personality preferences," Journal of Zhejiang University (Engineering Science), vol. 47, no. 1, pp. 53-61, 2013.
  10. Z. Yang, X. Qin, Y. Yang, and T. Yagink, "A hybrid trust service architecture for cloud computing," in Proceedings of 2013 International Conference on Computer Sciences and Applications, Wuhan, China, 2013, pp. 674-680.
  11. C. Li, S. Wang, L. Kang, L. Guo, and Y. Cao, "Trust evaluation model of cloud manufacturing service platform," The International Journal of Advanced Manufacturing Technology, vol. 75, no. 1-4, pp. 489-501, 2014. https://doi.org/10.1007/s00170-014-6112-0
  12. U. A. Kashif, Z. A. Memon, A. R. Balouch, and J. A. Chandio, "Distributed trust protocol for IaaS cloud computing," in Proceedings of 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, 2015, pp. 275-279.
  13. M. Chiregi, and N. J. Navimipour, "A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll entities," Computers in Human Behavior, vol. 60, pp. 280-292, 2016. https://doi.org/10.1016/j.chb.2016.02.029
  14. R. K. Chahal and S. Singh, "Fuzzy rule-based expert system for determining trustworthiness of cloud service providers," International Journal of Fuzzy Systems, vol. 19, no. 2, pp. 338-354, 2017. https://doi.org/10.1007/s40815-016-0149-1
  15. T. Lynn, L. van der Werff, G. Hunt, and P. Healy, "Development of a cloud trust label: a Delphi approach," Journal of Computer Information Systems, vol. 56, no. 23, pp. 185-193, 2016. https://doi.org/10.1080/08874417.2016.1153887
  16. A. Selvaraj and S. Sundararajan, "Evidence-based trust evaluation system for cloud services using fuzzy logic," International Journal of Fuzzy Systems, vol. 19, no. 2, pp. 329-337, 2017. https://doi.org/10.1007/s40815-016-0146-4
  17. J. Sidhu and S. Singh, "Improved topsis method based trust evaluation framework for determining trustworthiness of cloud service providers," Journal of Grid Computing, vol. 15, no. 1, pp. 81-105, 2017. https://doi.org/10.1007/s10723-016-9363-1
  18. M. Tang, X. Dai, J. Liu, and J. Chen, "Towards a trust evaluation middleware for cloud service selection," Future Generation Computer Systems, vol. 74, pp. 302-312, 2017. https://doi.org/10.1016/j.future.2016.01.009
  19. S. Singh and J. Sidhu, "Compliance-based multi-dimensional trust evaluation system for determining trustworthiness of cloud service providers," Future Generation Computer Systems, vol. 67, pp. 109-132, 2017. https://doi.org/10.1016/j.future.2016.07.013
  20. Y. Wang, J. Wen, X. Wang, and W. Zhou, "Cloud service evaluation model based on trust and privacy-aware," Optik, vol. 134, pp. 269-279, 2017. https://doi.org/10.1016/j.ijleo.2017.01.044
  21. N. Somu, G. R. MR, K. Kirthivasan, and S. S. VS, "A trust centric optimal service ranking approach for cloud service selection," Future Generation Computer Systems, vol. 86, pp. 234-252, 2018. https://doi.org/10.1016/j.future.2018.04.033
  22. M. Alhanahnah, P. Bertok, Z. Tari, and S. Alouneh, "Context-aware multifaceted trust framework for evaluating trustworthiness of cloud providers," Future Generation Computer Systems, vol. 79, pp. 488-499, 2018. https://doi.org/10.1016/j.future.2017.09.071
  23. M. B. Smithamol and S. Rajeswari, "TMM: trust management middleware for cloud service selection by prioritization," Journal of Network and Systems Management, vol. 27, no. 1, pp. 66-92, 2019. https://doi.org/10.1007/s10922-018-9457-0
  24. D. Li, H. Meng, and X. Sui, "Membership clouds and membership cloud generators," Computer Research and Development, vol. 32, no. 6, pp. 15-20, 1995.
  25. H. Chen and B. Li, "Approach to uncertain reasoning based on cloud model," Journal of Chinese Computer Systems, vol. 32, no. 12, pp. 2449-2455, 2011.
  26. Y. Du, Z. Song, and D. Li, "Mining association rules based on cloud model," Journal of PLA University of Science and Technology, vol. 1, no. 1, pp. 29-34, 2000. https://doi.org/10.3969/j.issn.1009-3443.2000.01.006
  27. X. Y. Meng, G. W. Zhang, C. Y. Liu, J. C. Kang, and H. S. Li, "Research on subjective trust management model based on cloud model," Journal of System Simulation, vol. 19, no. 14, pp. 3310-3317, 2007.
  28. G. W. Zhang, D. Y. Li, P. Li, J. C. Kang, and G. S. Chen, "A collaborative filtering recommendation algorithm based on cloud model," Journal of Software, vol. 18, no. 10, pp. 2403-2411, 2007. https://doi.org/10.1360/jos182403
  29. G. Qiang and Y. M. Bi, "Effectiveness evaluation of command of missile information war based on cloud model," Command Control & Simulation, vol. 30, no. 4, pp. 61-64, 2008. https://doi.org/10.3969/j.issn.1673-3819.2008.04.017
  30. J. Tian, H. Jiao, B. Wang, and C. Chen, "An e-commerce trust model based on expanded subjective logic," International Journal of High Performance Computing and Networking, vol. 9, no. 5-6, pp. 372-381, 2016. https://doi.org/10.1504/IJHPCN.2016.080409