16,798 research outputs found

    Cloud Armor: a platform for credibility-based trust management of cloud services

    Get PDF
    Trust management of cloud services is emerging as an impor- tant research issue in recent years, which poses signicant challenges because of the highly dynamic, distributed, and non-transparent nature of cloud services. This paper de- scribes Cloud Armor, a platform for credibility-based trust management of cloud services. The platform provides a crawler for automatic cloud services discovery, an adaptive and robust credibility model for measuring the credibility of feedbacks, and a trust-based recommender to recommend the most trustworthy cloud services to users. This paper presents the motivation, system design, implementation, and a demonstration of the Cloud Armor platform.Talal H. Noor, Quan Z. Sheng, Anne H.H. Ngu, Abdullah Alfazi and Jeriel Lawhttp://www.cikm2013.org/cfp.ph

    Formulating and managing viable SLAs in cloud computing from a small to medium service provider's viewpoint: A state-of-the-art review

    Full text link
    © 2017 Elsevier Ltd In today's competitive world, service providers need to be customer-focused and proactive in their marketing strategies to create consumer awareness of their services. Cloud computing provides an open and ubiquitous computing feature in which a large random number of consumers can interact with providers and request services. In such an environment, there is a need for intelligent and efficient methods that increase confidence in the successful achievement of business requirements. One such method is the Service Level Agreement (SLA), which is comprised of service objectives, business terms, service relations, obligations and the possible action to be taken in the case of SLA violation. Most of the emphasis in the literature has, until now, been on the formation of meaningful SLAs by service consumers, through which their requirements will be met. However, in an increasingly competitive market based on the cloud environment, service providers too need a framework that will form a viable SLA, predict possible SLA violations before they occur, and generate early warning alarms that flag a potential lack of resources. This is because when a provider and a consumer commit to an SLA, the service provider is bound to reserve the agreed amount of resources for the entire period of that agreement – whether the consumer uses them or not. It is therefore very important for cloud providers to accurately predict the likely resource usage for a particular consumer and to formulate an appropriate SLA before finalizing an agreement. This problem is more important for a small to medium cloud service provider which has limited resources that must be utilized in the best possible way to generate maximum revenue. A viable SLA in cloud computing is one that intelligently helps the service provider to determine the amount of resources to offer to a requesting consumer, and there are number of studies on SLA management in the literature. The aim of this paper is two-fold. First, it presents a comprehensive overview of existing state-of-the-art SLA management approaches in cloud computing, and their features and shortcomings in creating viable SLAs from the service provider's viewpoint. From a thorough analysis, we observe that the lack of a viable SLA management framework renders a service provider unable to make wise decisions in forming an SLA, which could lead to service violations and violation penalties. To fill this gap, our second contribution is the proposal of the Optimized Personalized Viable SLA (OPV-SLA) framework which assists a service provider to form a viable SLA and start managing SLA violation before an SLA is formed and executed. The framework also assists a service provider to make an optimal decision in service formation and allocate the appropriate amount of marginal resources. We demonstrate the applicability of our framework in forming viable SLAs through experiments. From the evaluative results, we observe that our framework helps a service provider to form viable SLAs and later to manage them to effectively minimize possible service violation and penalties

    A Framework, Secure and Trustworthy Assessment for Credibility Based Trust Management for Cloud Services.

    Get PDF
    Cloud Framework Supporting Automate Rank supported Trust Organization benefit of cloud describes the design and implementation of Cloud Framework, The framework provides a automate rank about executive trust system which hand over service with events to produce TaaS, whichever incorporates i) to preserving user seclusion and trust feedbacks for providing credibility’s using trending innovative protocol, ii) to protect cloud services from awful consumers for finding the details of users trust feedbacks also map the dependability of cloud administrations, and iii) a trust management service is managed by the availability context system. model describe the additional functionalities provided to Cloud Framework by increasing security, trustworthy assessment for Data Owner and Cloud Consumer. Extending the SLA period of each owner and consumer based on their request, the studies held from a collection of a real world users trust feedbacks are been verified, established on cloud services. This increases the transparency between user, consumer and cloud on TaaS

    Secure Clouds Through Reputation-Based Cloud Service Trust Management

    Get PDF
    Inadequate mechanisms for managing user trust in cloud services are a major roadblock to the broad adoption of this technology. Difficulties with privacy, security, and availability are inevitable in the cloud because of the service's intrinsic malleability, dispersion, and lack of transparency. Due to the sensitive nature of the information shared between customers and the trust management service, confidentiality must be maintained at all times. It's difficult to prevent malicious individuals from disrupting cloud services (for example, by providing false or misleading feedback to make a cloud service seem bad). Due to the dynamic nature of cloud infrastructure, it may be challenging to guarantee the constant availability of the trust management service in a cloud environment. We discuss the design and implementation of Cloud Armor, a reputation-based trust management framework that offers a collection of functions to provide Trust as a Service, with the goals of protecting cloud services from malicious users and comparing the trustworthiness of various cloud services. A unique protocol to verify the credibility of trust feedbacks while protecting users' anonymity; and (ii) an adaptive and resilient credibility model for gauging the veracity of trust feedbacks. Our approach's benefits and viability have been demonstrated through prototype development and experimentation with real-world trust feedback on cloud services

    A Fast Supportive and Trustworthy Cloud Services

    Get PDF
    Trust management is a standout amongst the most difficult issues for the selection and development of cloudcomputing. The profoundly unique, circulated, and non-straightforward nature of cloud management presents several challenging issues, for example, protection, security, and availability. Although a few arrangements have been proposed as of late in overseeing trust feedbacks in cloud situations, how to decide the validity of trust inputs is for the most part disregarded. In this project the framework proposed a notoriety based trust administration structure that gives an arrangement of functionalities to convey Trust as a Service (TaaS). "Trust as aService" (TaaS) structure to enhance routes on put stock in management in cloud situations. The approaches have been approved by the model framework and investigational comes about.

    Sensing as a Service Model for Smart Cities Supported by Internet of Things

    Full text link
    The world population is growing at a rapid pace. Towns and cities are accommodating half of the world's population thereby creating tremendous pressure on every aspect of urban living. Cities are known to have large concentration of resources and facilities. Such environments attract people from rural areas. However, unprecedented attraction has now become an overwhelming issue for city governance and politics. The enormous pressure towards efficient city management has triggered various Smart City initiatives by both government and private sector businesses to invest in ICT to find sustainable solutions to the growing issues. The Internet of Things (IoT) has also gained significant attention over the past decade. IoT envisions to connect billions of sensors to the Internet and expects to use them for efficient and effective resource management in Smart Cities. Today infrastructure, platforms, and software applications are offered as services using cloud technologies. In this paper, we explore the concept of sensing as a service and how it fits with the Internet of Things. Our objective is to investigate the concept of sensing as a service model in technological, economical, and social perspectives and identify the major open challenges and issues.Comment: Transactions on Emerging Telecommunications Technologies 2014 (Accepted for Publication

    Enhancing Trust Management in Cloud Environment

    Get PDF
    AbstractTrust management has been identified as vital component for establishing and maintaining successful relational exchanges between e-commerce trading partners in cloud environment. In this highly competitive and distributed service environment, the assurances are insufficient for the consumers to identify the dependable and trustworthy Cloud providers. Due to these limitations, potential consumers are not sure whether they can trust the Cloud providers in offering dependable services. In this paper, we propose a multi-faceted trust management system architecture for cloud computing marketplaces, to support customers in identifying trustworthy cloud providers. This paper presents the important threats to a trust system and proposed a method for tackling these threats. It described the desired feature of a trust management system. It security components to determine the trustworthiness of e- commerce participants to helps online customers to decide whether or not to proceed with a transaction. Based on this framework, we proposed an approach for filtering out malicious feedbacks and a trust metric to evaluate the trustworthiness of service provider. Results of various simulation experiments show that the proposed multi-attribute trust management system can be highly effective in identifying risky transaction in electronic market places

    Evaluation Theory for Characteristics of Cloud Identity Trust Framework

    Get PDF
    Trust management is a prominent area of security in cloud computing because insufficient trust management hinders cloud growth. Trust management systems can help cloud users to make the best decision regarding the security, privacy, Quality of Protection (QoP), and Quality of Service (QoS). A Trust model acts as a security strength evaluator and ranking service for the cloud and cloud identity applications and services. It might be used as a benchmark to setup the cloud identity service security and to find the inadequacies and enhancements in cloud infrastructure. This chapter addresses the concerns of evaluating cloud trust management systems, data gathering, and synthesis of theory and data. The conclusion is that the relationship between cloud identity providers and Cloud identity users can greatly benefit from the evaluation and critical review of current trust models

    A framework for the successful implementation of food traceability systems in China

    Get PDF
    Implementation of food traceability systems in China faces many challenges due to the scale, diversity and complexity of China’s food supply chains. This study aims to identify critical success factors specific to the implementation of traceability systems in China. Twenty-seven critical success factors were identified in the literature. Interviews with managers at four food enterprises in a pre-study helped identify success criteria and five additional critical success factors. These critical success factors were tested through a survey of managers in eighty-three food companies. This study identifies six dimensions for critical success factors: laws, regulations and standards; government support; consumer knowledge and support; effective management and communication; top management and vendor support; and information and system quality
    • …
    corecore