Improved TOPSIS Method Based Trust Evaluation Framework for Determining Trustworthiness of Cloud Service Providers

Trust is one of the most challenging issues in the emerging cloud computing era. Over the past few years, numerous cloud service providers have been emerged providing similar kinds of services. It has become incredibly complex for the cloud clients to make a distinction among multiple cloud service providers offering similar kinds of services. Cloud clients need trustworthy service providers who provide services exactly as per the SLA and do not deviate from their promises. Though, there have been significant efforts to form trust between service providers and the clients by providing data, storage and network security, but relatively fewer efforts have been made in the field of trustworthiness determination by monitoring the compliance of offered services as per the SLA. This paper presents the design of a trust evaluation framework that uses the compliance monitoring mechanism to determine the trustworthiness of service providers. The compliance values are computed and then processed using a technique known as the Improved Technique for Order of Preference by Similarity to Ideal Solution (Improved TOPSIS) to obtain trust on the service providers. Case study based approach has been followed to demonstrate the usability and the applicability of the proposed framework. Experiments have been performed using the real cloud data extracted from the Cloud Harmony reports. From the experimental results, it is clear that the proposed framework can be used in real cloud environments to determine the trustworthiness of service providers by employing the real time monitoring of their services.

[1]  Jie Wu,et al.  Consistency as a Service: Auditing Cloud Consistency , 2014, IEEE Transactions on Network and Service Management.

[2]  Matthias Ehrgott,et al.  Multiple criteria decision analysis: state of the art surveys , 2005 .

[3]  Rajkumar Buyya,et al.  A framework for ranking of cloud computing services , 2013, Future Gener. Comput. Syst..

[4]  Catherine Everett,et al.  Cloud computing – A question of trust , 2009 .

[5]  David M. Nicol,et al.  Trust mechanisms for cloud computing , 2013, Journal of Cloud Computing: Advances, Systems and Applications.

[6]  Christoph Meinel,et al.  Distributed Trust Management for Validating SLA Choreographies , 2010 .

[7]  Khaled M. Khan,et al.  Establishing Trust in Cloud Computing , 2010, IT Professional.

[8]  Gary Garrison,et al.  Success factors for deploying cloud computing , 2012, CACM.

[9]  Elisa Bertino,et al.  Privacy-preserving Digital Identity Management for Cloud Computing , 2009, IEEE Data Eng. Bull..

[10]  Shanlin Yang,et al.  A novel two-stage model for cloud service trustworthiness evaluation , 2014, Expert Syst. J. Knowl. Eng..

[11]  Ching-Lai Hwang,et al.  Multiple Attribute Decision Making: Methods and Applications - A State-of-the-Art Survey , 1981, Lecture Notes in Economics and Mathematical Systems.

[12]  Changyong Liang,et al.  Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems , 2014, Knowl. Based Syst..

[13]  Martin Knahl,et al.  Validating Cloud Infrastructure Changes by Cloud Audits , 2012, 2012 IEEE Eighth World Congress on Services.

[14]  Subhajyoti Bandyopadhyay,et al.  Cloud Computing - The Business Perspective , 2011, 2011 44th Hawaii International Conference on System Sciences.

[15]  Quan Z. Sheng,et al.  Trust as a Service: A Framework for Trust Management in Cloud Environments , 2011, WISE.

[16]  Sachin Shetty,et al.  Auditing and Analysis of Network Traffic in Cloud Environment , 2013, 2013 IEEE Ninth World Congress on Services.

[17]  Kai Hwang,et al.  Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[18]  C. Hwang Multiple Objective Decision Making - Methods and Applications: A State-of-the-Art Survey , 1979 .

[19]  Shanshan Song,et al.  Trusted Grid Computing with Security Binding and Trust Integration , 2005, Journal of Grid Computing.

[20]  Thomas L. Saaty,et al.  Theory and Applications of the Analytic Network Process: Decision Making With Benefits, Opportunities, Costs, and Risks , 2005 .

[21]  Max Mühlhäuser,et al.  Trust as a facilitator in cloud computing: a survey , 2012, Journal of Cloud Computing: Advances, Systems and Applications.

[22]  Muthucumaru Maheswaran,et al.  Trust Brokering and Its Use for Resource Matchmaking in Public-Resource Grids , 2006, Journal of Grid Computing.

[23]  Yuqiong Sun,et al.  Cloud Verifier: Verifiable Auditing Service for IaaS Clouds , 2013, 2013 IEEE Ninth World Congress on Services.

[24]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[25]  Joon S. Park,et al.  Near-Real-Time Cloud Auditing for Rapid Response , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[26]  Kaliappa Nadar Ravindran QoS Auditing for Evaluation of SLA in Cloud-based Distributed Services , 2013, 2013 IEEE Ninth World Congress on Services.

[27]  Jin Tong,et al.  NIST cloud computing standards roadmap :: version 1.0 , 2011 .

[28]  Borja Sotomayor,et al.  Virtual Infrastructure Management in Private and Hybrid Clouds , 2009, IEEE Internet Computing.

[29]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[30]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[31]  Siani Pearson,et al.  Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[32]  Iván Arce,et al.  Guest Editors' Introduction: In Cloud Computing We Trust - But Should We? , 2010, IEEE Secur. Priv..

[33]  John Viega,et al.  Cloud Computing and the Common Man , 2009, Computer.

[34]  Sally I. McClean,et al.  Cache performance models for quality of service compliance in storage clouds , 2013, Journal of Cloud Computing: Advances, Systems and Applications.

[35]  Harry G. Perros,et al.  A novel trust management framework for multi-cloud environments based on trust service providers , 2014, Knowl. Based Syst..

[36]  Lukas Kencl,et al.  CLAudit: Planetary-scale cloud latency auditing platform , 2013, 2013 IEEE 2nd International Conference on Cloud Networking (CloudNet).

[37]  Andrés García-García,et al.  Cloud Services Representation using SLA Composition , 2014, Journal of Grid Computing.

[38]  Michael D. Hogan,et al.  NIST Cloud Computing Standards Roadmap , 2013 .

[39]  R. Venkata Rao,et al.  Decision Making in Manufacturing Environment Using Graph Theory and Fuzzy Multiple Attribute Decision Making Methods , 2013 .

[40]  Muttukrishnan Rajarajan,et al.  Trust Model for Optimized Cloud Services , 2012, IFIPTM.

[41]  Kai Hwang,et al.  Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.

[42]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[43]  Zhixiong Chen,et al.  IT Auditing to Assure a Secure Cloud Computing , 2010, 2010 6th World Congress on Services.

[44]  Salvatore Venticinque,et al.  An SLA-based Broker for Cloud Infrastructures , 2013, Journal of Grid Computing.

[45]  Jihong Yan,et al.  Understanding the Approach for Auditing of Cloud Computing System , 2010, 2010 Second International Conference on Information Technology and Computer Science.

[46]  R Ramanathan,et al.  A note on the use of the analytic hierarchy process for environmental impact assessment. , 2001, Journal of environmental management.

[47]  Jemal H. Abawajy,et al.  Establishing Trust in Hybrid Cloud Computing Environments , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[48]  Dave Cliff,et al.  A financial brokerage model for cloud computing , 2011, Journal of Cloud Computing: Advances, Systems and Applications.

[49]  M. Roberts Masillamani,et al.  Design and auditing of Cloud computing security , 2010, 2010 Fifth International Conference on Information and Automation for Sustainability.

[50]  Sherali Zeadally,et al.  Trust management of services in cloud environments: Obstacles and solutions , 2013, CSUR.