Configuring trust model for cloud computing: Decision exploration using fuzzy reasoning

The concept of cloud computing enhances the on-demand network access expediently to share a pool of configurable resources. The major advantage of cloud computing has been accomplished by business organizations through the use of shared services, service-oriented architecture and virtualizations. Cloud computing is deployed by the third-party or web-based providers. Therefore, security component would be considered all the layers of the cloud architecture. In this paper, a secured and trusted cloud system is proposed. Security could be embedded in middleware architecture of the cloud system. Threats related to the cloud security are dynamic in nature and recurrently changing the types of attacks encountered over time. Therefore, a computationally intelligent and adaptive decision mechanism based on fuzzy rules is introduced to take a proper decision according to the contextual variables. Fuzzy decision maker identify the anomalies and sustain the trust of the cloud computing.

[1]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[2]  Gilles Grimaud,et al.  Large-Scale Coordinated attacks: Impact on the Cloud Security , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[3]  E. Michael Maximilien,et al.  A Best Practice Model for Cloud Middleware Systems , 2009 .

[4]  Issa M. Khalil,et al.  Cloud Computing Security: A Survey , 2014, Comput..

[5]  Doan B. Hoang,et al.  Towards Scalable, Fine-Grained, Intrusion-Tolerant Data Protection Models for Healthcare Cloud , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[6]  Michael D. Hogan,et al.  NIST Cloud Computing Standards Roadmap , 2013 .

[7]  Monjur Ahmed,et al.  Cloud Computing and Security Issues in the Cloud , 2014, Trinity Journal of Management, IT & Media.

[8]  Nils Gruschka,et al.  Attack Surfaces: A Taxonomy for Attacks on Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[9]  Te-Shun Chou,et al.  SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES , 2013 .

[10]  Issa M. Khalil MCC: Mitigating Colluding Collision Attacks in Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[11]  John Sharp,et al.  Building Hybrid Applications in the Cloud on Windows Azure , 2013 .

[12]  Cong Wang,et al.  Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[13]  Aarthi,et al.  Towards Secure and Dependable Storage Services in Cloud Computing , 2014 .

[14]  Yong Tang,et al.  Cloud Computing: A Statistics Aspect of Users , 2009, CloudCom.

[15]  Shufen Zhang,et al.  Cloud Computing Research and Development Trend , 2010, 2010 Second International Conference on Future Networks.

[16]  David M. Nicol,et al.  Trust mechanisms for cloud computing , 2013, Journal of Cloud Computing: Advances, Systems and Applications.

[17]  P. A. Ejegwa,et al.  An Overview On Intuitionistic Fuzzy Sets , 2014 .

[18]  Peter Desnoyers,et al.  Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing , 2011, 2011 IEEE 10th International Symposium on Network Computing and Applications.

[19]  G. Aghila,et al.  A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.

[20]  Shouzhen Zeng,et al.  A Projection Method for Multiple Attribute Group Decision Making with Intuitionistic Fuzzy Information , 2013, Informatica.