TRUST-EVALUATION METRIC FOR CLOUD APPLICATIONS

Cloud services are becoming popular in terms of distributed technology because they allow cloud users to rent well-specified resources of computing, network, and storage infrastructure. Users pay for their use of services without needing to spend massive amounts for integration, maintenance, or management of the IT infrastructure. Before interaction occurs between cloud providers and users, trust in the cloud relationship is very important to minimize the security risk and malicious attacks. The notion of trust involves several dimensions. These dimensions include: the scalability, availability, security, and usability parameters of IaaS, PaaS, SaaS, and DaaS. Each of these dimensions is characterized by fuzzy aspects and linguistic terms. This paper develops a model for each of the dimensions for IaaS using fuzzy-set theory. It then uses the sugeno fuzzy-inference approach for developing an overall measure of trust value of the cloud providers. It is not easy to evaluate the cloud metrics for a general domain. So, in this paper, we will use an e-learning application as the main example when we collect the data and apply the fuzzy model to evaluate the trust for cloud computing. Test and results are presented to evaluate the effectiveness and robustness of the proposed model.

[1]  Jay F. Nunamaker,et al.  Systems Development in Information Systems Research , 1990, J. Manag. Inf. Syst..

[2]  Tharam S. Dillon,et al.  Automated knowledge acquisition , 1994, Prentice Hall International series in computer science and engineering.

[3]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[4]  Rino Falcone,et al.  A Fuzzy Approach to a Belief-Based Trust Computation , 2002, Trust, Reputation, and Security.

[5]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[6]  Jordi Sabater-Mir,et al.  Reputation and social network analysis in multi-agent systems , 2002, AAMAS '02.

[7]  Lasse Rosendahl,et al.  Methods to improve prediction performance of ANN models , 2003, Simul. Model. Pract. Theory.

[8]  Paul T. Jaeger,et al.  Cloud Computing and Information Policy: Computing in a Policy Cloud? , 2008 .

[9]  Paolo Bientinesi,et al.  Can cloud computing reach the top500? , 2009, UCHPC-MAW '09.

[10]  Borja Sotomayor,et al.  Virtual Infrastructure Management in Private and Hybrid Clouds , 2009, IEEE Internet Computing.

[11]  Shishir Garg,et al.  Opening the clouds: qualitative overview of the state-of-the-art open source VM-based cloud management platforms , 2009, Middleware.

[12]  Michael R Nelson,et al.  Building an Open Cloud , 2009, Science.

[13]  Rajkumar Buyya,et al.  Market-Oriented Cloud Computing: Vision, Hype, and Reality of Delivering Computing as the 5th Utility , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[14]  David Hilley,et al.  Cloud Computing: A Taxonomy of Platform and Infrastructure-level Offerings , 2009 .

[15]  Gerard Briscoe,et al.  Community Cloud Computing , 2009, CloudCom.

[16]  Lei Sun,et al.  Customer Centric Cloud Service Model and a Case Study on Commerce as a Service , 2009, 2009 IEEE International Conference on Cloud Computing.

[17]  Richard Wolski,et al.  The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[18]  Alexander Zeier,et al.  Customizing Enterprise Software as a Service Applications: Back-End Extension in a Multi-tenancy Environment , 2009, ICEIS.

[19]  Robert Grossman,et al.  Open standards and cloud computing: KDD-2009 panel report , 2009, KDD.

[20]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[21]  Tharam S. Dillon,et al.  Response time for cloud computing providers , 2010, iiWAS.

[22]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .