Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection

With the wide deployment of cloud computing, many security challenges have arisen, such as data and storage integrity and virtualization security. The crisis of trust caused by these security issues has become one of the important factors restricting the wide applications of cloud service. Especially for security-sensitive users, it is challenging to quickly select a cloud service which has the high level of trust and can meet both the user preferences and specific functional demands. This paper explores the multi-granularity selection standard of trust level, the users’ preference calculation model, and the cloud service selection algorithm. First, the trust evaluation mechanisms among different entities in the human society are fitted, and the multi-granularity selection standard of trust levels based on Gaussian cloud transformation is constructed. Then, the calculation model of user preferences based on the cloud analytic hierarchy process is developed. Finally, the trusted cloud service selection algorithm based on two-step fuzzy comprehensive evaluation is proposed and experimentally validated.

[1]  Zhaoquan Cai,et al.  Towards secure and flexible EHR sharing in mobile health cloud under static assumptions , 2017, Cluster Computing.

[2]  Jin Li,et al.  Differentially private Naive Bayes learning over multiple data sources , 2018, Inf. Sci..

[3]  Raymond K. Wong,et al.  Cognitively Adjusting Imprecise User Preferences for Service Selection , 2017, IEEE Transactions on Network and Service Management.

[4]  Fucai Zhou,et al.  Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures , 2018, J. Netw. Comput. Appl..

[5]  Desheng Dash Wu,et al.  Multi-objective optimization based ranking prediction for cloud service recommendation , 2017, Decis. Support Syst..

[6]  Niu Xiao,et al.  Cloud Hierarchical Analysis for Educational Resources of Engineering Education Accreditation in China , 2013 .

[7]  Keqin Li,et al.  Toward trustworthy cloud service selection: A time-aware approach using interval neutrosophic set , 2016, J. Parallel Distributed Comput..

[8]  Yanchun Zhang,et al.  Cloud-FuSeR: Fuzzy ontology and MCDM based cloud service selection , 2016, Future Gener. Comput. Syst..

[9]  Wei Fang,et al.  CSDA: a novel cluster-based secure data aggregation scheme for WSNs , 2019, Cluster Computing.

[10]  Kenli Li,et al.  Partition Scheduling on Heterogeneous Multicore Processors for Multi-dimensional Loops Applications , 2017, International Journal of Parallel Programming.

[11]  Xiao-Jun Yang,et al.  How to handle uncertainties in AHP: The Cloud Delphi hierarchical analysis , 2013, Inf. Sci..

[12]  Jian Shen,et al.  An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain , 2018, IEEE Access.

[13]  Jin Li,et al.  Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics , 2017, Soft Comput..

[14]  Jin Li,et al.  DivORAM: Towards a practical oblivious RAM with variable block size , 2018, Inf. Sci..

[15]  Xifan Yao,et al.  A hybrid artificial bee colony algorithm for optimal selection of QoS-based cloud manufacturing service composition , 2017 .

[16]  Jie Zhang,et al.  Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds , 2017, Secur. Commun. Networks.

[17]  Nor Badrul Anuar,et al.  Cloud Service Selection Using Multicriteria Decision Analysis , 2014, TheScientificWorldJournal.

[18]  Jin Li,et al.  Multi-resource scheduling and power simulation for cloud computing , 2017, Inf. Sci..

[19]  Christian Esposito,et al.  Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory , 2016, IEEE Transactions on Computers.

[20]  Sven Helmer,et al.  A survey study on major technical barriers affecting the decision to adopt cloud services , 2015, J. Syst. Softw..

[21]  Sarbjeet Singh,et al.  Design and Comparative Analysis of MCDM-based Multi-dimensional Trust Evaluation Schemes for Determining Trustworthiness of Cloud Service Providers , 2017, Journal of Grid Computing.

[22]  Farookh Khadeer Hussain,et al.  User-side cloud service management: State-of-the-art and future directions , 2015, J. Netw. Comput. Appl..

[23]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[24]  Achim Streit,et al.  A utility-based approach for customised cloud service selection , 2015, Int. J. Comput. Sci. Eng..

[25]  Jin Li,et al.  Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..

[26]  Jinjun Chen,et al.  Weighted principal component analysis-based service selection method for multimedia services in cloud , 2014, Computing.

[27]  Jane Siegel,et al.  Cloud Services Measures for Global Use: The Service Measurement Index (SMI) , 2012, 2012 Annual SRII Global Conference.

[28]  Yixiong Feng,et al.  A Hybrid Energy-Aware Resource Allocation Approach in Cloud Manufacturing Environment , 2017, IEEE Access.

[29]  Deyi Li,et al.  A new cognitive model: Cloud model , 2009, Int. J. Intell. Syst..

[30]  Sherali Zeadally,et al.  Managing Trust in the Cloud: State of the Art and Research Challenges , 2016, Computer.

[31]  Witawas Srisa-an,et al.  Significant Permission Identification for Machine-Learning-Based Android Malware Detection , 2018, IEEE Transactions on Industrial Informatics.

[32]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[33]  Weiwei Lin,et al.  An Ensemble Random Forest Algorithm for Insurance Big Data Analysis , 2017, IEEE Access.

[34]  Sangwon Lee,et al.  A Hybrid Multi-Criteria Decision-Making Model for a Cloud Service Selection Problem Using BSC, Fuzzy Delphi Method and Fuzzy AHP , 2016, Wirel. Pers. Commun..

[35]  Guoyin Wang,et al.  A New Multi-Step Backward Cloud Transformation Algorithm Based on Normal Cloud Model , 2014, Fundam. Informaticae.

[36]  Fei Tao,et al.  A chaos control optimal algorithm for QoS-based service composition selection in cloud manufacturing system , 2014, Enterp. Inf. Syst..

[37]  Xinguang Peng,et al.  A framework of cloud service selection based on trust mechanism , 2017, Int. J. Ad Hoc Ubiquitous Comput..

[38]  Jian Shen,et al.  Anonymous and Traceable Group Data Sharing in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.

[39]  Desheng Dash Wu,et al.  Utilizing customer satisfaction in ranking prediction for personalized cloud service selection , 2017, Decis. Support Syst..