Advertisement

Journal of Network and Systems Management

, Volume 27, Issue 1, pp 66–92 | Cite as

TMM: Trust Management Middleware for Cloud Service Selection by Prioritization

  • Mukalel Bhaskaran SmithamolEmail author
  • Sridhar Rajeswari
Article
  • 133 Downloads

Abstract

Cloud computing is a prominently distributed paradigm that offers a wide variety of infrastructure, platform, and software services over the internet on demand. However, the identification of trustworthy cloud services imposes difficulties due to the multiplicity and the resemblance in their functionality. The shortage of proficient trust management schemes for services prevents the large-scale adoption of cloud computing paradigm by the public. In this paper, we propose trust management middleware (TMM), a framework for trustworthy service selection in the cloud. TMM performs service selection by integrating subjective assessment from users and objective assessment from service monitors. We proposed a new covariance based algorithm to determine the credibility of user feedback. Also, in our model, a novel objective trust evaluation algorithm is proposed based on prioritization of quality of service parameters depending on the user preferences. The results show that the proposed framework improves the accuracy of trust evaluation considerably and is more efficient in identifying trustworthy cloud services as compared with the other relevant methods.

Keywords

Service selection Subjective trust Objective trust Satisfaction level Covariance 

Notes

Acknowledgements

This research work is supported in part by the Quality Improvement Programme of All India Council for Technical Education, India. The authors are very grateful to the editors and the anonymous referees for their detailed comments and suggestions regarding this paper.

References

  1. 1.
    Mell, P., Grance, T.: The NIST definition of cloud computing. Commun. ACM 53(6), 50 (2011)Google Scholar
  2. 2.
    Ghanbari, S., Othman, M.: A priority based job scheduling algorithm in cloud computing. Proced. Eng. 50, 778–785 (2012)CrossRefGoogle Scholar
  3. 3.
    Pearson, S.: Privacy, security and trust in cloud computing. In: Privacy and Security for Cloud Computing, pp. 3–42. Springer, London (2013)Google Scholar
  4. 4.
    Kirthica, S., Sridhar, R.: Cit: a cloud inter-operation toolkit to enhance elasticity and tolerate shut down of external clouds. J. Netw. Comput. Appl. 85, 32–46 (2017)CrossRefGoogle Scholar
  5. 5.
    Somu, N., Kirthivasan, K., Shankar, V.S.: A rough set-based hypergraph trust measure parameter selection technique for cloud service selection. J. Supercomput. 73(10), 1–25 (2017)CrossRefGoogle Scholar
  6. 6.
    Noor, T.H., Sheng, Q.Z.: Web service-based trust management in cloud environments. In: Advanced Web Services, pp. 101–120. Springer, New York (2014)Google Scholar
  7. 7.
    Lie, Q., Wang, Y., Orgun, M.A., Liu, L., Liu, H., Bouguettaya, A.: Cccloud: Context-aware and credible cloud service selection based on subjective assessment and objective assessment. IEEE Trans. Serv. Comput. 8(3), 369–383 (2015)CrossRefGoogle Scholar
  8. 8.
    Jayapriya, K., Mary, A.B.N., Rajesh, R.S.: Cloud service recommendation based on a correlated Qos ranking prediction. J. Netw. Syst. Manag. 24, 1–28 (2016)CrossRefGoogle Scholar
  9. 9.
    Duan, Q.: Cloud service performance evaluation: status, challenges, and opportunities-a survey from the system modeling perspective. Digit. Commun. Netw. 3(2), 101–111 (2017)CrossRefGoogle Scholar
  10. 10.
    Fan, W., Perros, H.: A reliability-based trust management mechanism for cloud services. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1581–1586. IEEE, New York (2013)Google Scholar
  11. 11.
    Habib, S.M., Hauke, S., Ries, S., Mühlhäuser, M.: Trust as a facilitator in cloud computing: a survey. J. Cloud Comput. Adv. Syst. Appl. 1(1), 1 (2012)CrossRefGoogle Scholar
  12. 12.
    Noor, T.H., Sheng, Q.Z., Zeadally, S., Yu, J.: Trust management of services in cloud environments: obstacles and solutions. ACM Comput. Surv. (CSUR) 46(1), 12 (2013)CrossRefGoogle Scholar
  13. 13.
    Sun, L., Dong, H., Hussain, F.K., Hussain, O.K., Chang, E.: Cloud service selection: state-of-the-art and future research directions. J. Netw. Comput. Appl. 45, 134–150 (2014)CrossRefGoogle Scholar
  14. 14.
    Kumar, R.R., Mishra, S., Kumar, C.: Prioritizing the solution of cloud service selection using integrated MCDM methods under fuzzy environment. J. Supercomput. 73, 4652–4682 (2017)CrossRefGoogle Scholar
  15. 15.
    Ding, S., Li, Y., Wu, D., Zhang, Y., Yang, S.: Time-aware cloud service recommendation using similarity-enhanced collaborative filtering and arima model. Decis. Support Syst. 107, 103–115 (2018)CrossRefGoogle Scholar
  16. 16.
    Lin, D., Squicciarini, A.C., Dondapati, V.N., Sundareswaran, S.: A cloud brokerage architecture for efficient cloud service selection. IEEE Trans. Serv. Comput. (2016).  https://doi.org/10.1109/TSC.2016.2592903
  17. 17.
    Casalicchio, E., Cardellini, V., Interino, G., Palmirani, M.: Research challenges in legal-rule and qos-aware cloud service brokerage. Future Gener. Comput. Syst. 78, 211–223 (2018)CrossRefGoogle Scholar
  18. 18.
    Meng, Y., Huang, Z., Zhou, Y., Ke, C.: Privacy-aware cloud service selection approach based on p-spec policy models and privacy sensitivities. Future Gener. Comput. Syst. 86, 1–11 (2018)CrossRefGoogle Scholar
  19. 19.
    Tang, M., Dai, X., Liu, J., Chen, J.: Towards a trust evaluation middleware for cloud service selection. Future Gener. Comput. Syst. 74, 302–312 (2017)CrossRefGoogle Scholar
  20. 20.
    Jatoth, C., Gangadharan, G.R., Fiore, U.: Evaluating the efficiency of cloud services using modified data envelopment analysis and modified super-efficiency data envelopment analysis. Soft. Comput. 21(23), 7221–7234 (2017)CrossRefGoogle Scholar
  21. 21.
    Xiahou, J., Lin, F., Huang, Q.H., Zeng, W.: Multi-datacenter cloud storage service selection strategy based on ahp and backward cloud generator model. Neural Comput. Appl. 29(1), 71–85 (2018)CrossRefGoogle Scholar
  22. 22.
    Qian, H., Medhi, D., Trivedi, K.: A hierarchical model to evaluate quality of experience of online services hosted by cloud computing. In: 2011 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 105–112. IEEE, New York (2011)Google Scholar
  23. 23.
    Noor, T.H, Sheng, Q.Z, Ngu, A.H.H., Alfazi, A., Law, J.: Cloud armor: a platform for credibility-based trust management of cloud services. In: Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management, pp. 2509–2512. ACM, New York (2013)Google Scholar
  24. 24.
    Yamato, Y.: Server selection, configuration and reconfiguration technology for IaaS cloud with multiple server types. J. Netw. Syst. Manag. 45, 1–22 (2017)Google Scholar
  25. 25.
    Kumawat, S., Tomar, D.: Sla-aware trust model for cloud service deployment. Int. J. Comput. Appl. 90(10), 10–15 (2014)Google Scholar
  26. 26.
    Yadav, N., Goraya, M.S.: Two-way ranking based service mapping in cloud environment. Future Gener. Comput. Syst. 81, 53–66 (2018)CrossRefGoogle Scholar
  27. 27.
    Yager, R.R.: Prioritized aggregation operators. Int. J. Approx. Reason. 48(1), 263–274 (2008)MathSciNetCrossRefzbMATHGoogle Scholar
  28. 28.
    Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 2(1), 1 (2013)CrossRefGoogle Scholar
  29. 29.
    Jin, B., Wang, Y., Liu, Z., Xue, J.: A trust model based on cloud model and bayesian networks. Proced. Environ. Sci. 11, 452–459 (2011)CrossRefGoogle Scholar
  30. 30.
    Wang, S., Sun, L., Sun, Q., Wei, J., Yang, F.: Reputation measurement of cloud services based on unstable feedback ratings. Int. J. Web Grid Serv. 11(4), 362–376 (2015)CrossRefGoogle Scholar
  31. 31.
    Macías, M., Guitart, J.: Analysis of a trust model for sla negotiation and enforcement in cloud markets. Future Gener. Comput. Syst. 55, 460–472 (2016)CrossRefGoogle Scholar
  32. 32.
    Zheng, Z., Xinmiao, W., Zhang, Y., Lyu, M.R., Wang, J.: Qos ranking prediction for cloud services. IEEE Trans. Parallel Distrib. Syst. 24(6), 1213–1222 (2013)CrossRefGoogle Scholar
  33. 33.
    Ding, S., Wang, Z., Wu, D., Olson, D.L: Utilizing customer satisfaction in ranking prediction for personalized cloud service selection. Decis. Sup. Syst 93: 1–10 (2017)Google Scholar
  34. 34.
    Sun, L., Ma, J., Zhang, Y., Dong, H., Hussain, F.K.: Cloud-fuser: fuzzy ontology and MCDM based cloud service selection. Future Gener. Comput. Syst. 57, 42–55 (2016)CrossRefGoogle Scholar
  35. 35.
    Kanwal, A., Masood, R., Shibli, M.A: Evaluation and establishment of trust in cloud federation. In: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, pp. 12. ACM, New York (2014)Google Scholar
  36. 36.
    Li, X., Ma, H., Zhou, F., Yao, W.: T-broker: a trust-aware service brokering scheme for multiple cloud collaborative services. IEEE Trans. Inf. Forensics Secur. 10(7), 1402–1415 (2015)CrossRefGoogle Scholar
  37. 37.
    Fan, W., Perros, H.: A novel trust management framework for multi-cloud environments based on trust service providers. Knowl.-Based Syst. 70, 392–406 (2014)CrossRefGoogle Scholar
  38. 38.
    Matin Chiregi and Nima Jafari Navimipour: A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders’ entities and removing the effect of troll entities. Comput. Hum. Behav. 60, 280–292 (2016)CrossRefGoogle Scholar
  39. 39.
    Dalmazo, B.L., Vilela, J.P., Curado, M.: Performance analysis of network traffic predictors in the cloud. J. Netw. Syst. Manage. 25(2), 290–320 (2017)CrossRefGoogle Scholar
  40. 40.
    Li, J., Squicciarini, A.C., Lin, D., Sundareswaran, S., Jia, C.: Mmbcloud-tree: authenticated index for verifiable cloud service selection. IEEE Trans. Dependable Secur. Comput. 14(2), 185–198 (2017)CrossRefGoogle Scholar
  41. 41.
    Al-Faifi, A.M. Song, B., Hassan, M.M., Alamri, A., Gumaei, A.: Performance prediction model for cloud service selection from smart data. Future Gener. Comput. Syst. 85, 97–106 (2018)CrossRefGoogle Scholar
  42. 42.
    Habib, S.M., Varadharajan, V., Mühlhäuser, M.: A framework for evaluating trust of service providers in cloud marketplaces. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp. 1963–1965. ACM, New York (2013)Google Scholar
  43. 43.
    Fan, W.-J., Yang, S.-L., Perros, H., Pei, J.: A multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning approach. Int. J. Autom. Comput. 12(2), 208–219 (2015)CrossRefGoogle Scholar
  44. 44.
    Li, X., Junping, D.: Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing. IET Inf. Secur. 7(1), 39–50 (2013)CrossRefGoogle Scholar
  45. 45.
    Rajendran, V.V., Swamynathan, S.: Hybrid model for dynamic evaluation of trust in cloud services. Wireless Netw. 1–12 (2015)Google Scholar
  46. 46.
    Manuel, P.: A trust model of cloud computing based on quality of service. Ann. Oper. Res. 233(1), 281–292 (2015)CrossRefGoogle Scholar
  47. 47.
    Ghosh, N., Ghosh, S.K., Das, S.K.: Selcsp: a framework to facilitate selection of cloud service providers. IEEE Trans. Cloud Comput. 3(1), 66–79 (2015)CrossRefGoogle Scholar
  48. 48.
    Alhanahnah, M., Bertok, P., Tari, Z., Alouneh, S.: Context-aware multifaceted trust framework for evaluating trustworthiness of cloud providers. Future Gener. Comput. Syst. 79, 488–499 (2018)CrossRefGoogle Scholar
  49. 49.
    Crockford, D.: The application/json media type for javascript object notation (json) (2006), RFC 4627Google Scholar
  50. 50.
    Garg, S.K., Versteeg, S., Buyya, R.: Smicloud: a framework for comparing and ranking cloud services. In: 2011 Fourth IEEE International Conference on Utility and Cloud Computing (UCC), pp. 210–218. IEEE, New York (2011)Google Scholar
  51. 51.
    Li, Z., Liao, L., Leung, H., Li, B., Li, C.: Evaluating the credibility of cloud services. Comput. Electr. Eng. 58, 161–175 (2016)CrossRefGoogle Scholar
  52. 52.
    Mason, R.L., Tracy, N.D., Young, J.C.: Decomposition of t2 for multivariate control chart interpretation. J. Qual. Technol. 27(2), 99–108 (1995)CrossRefGoogle Scholar
  53. 53.
    Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Näslund, M., Pourzandi, M.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 1(1), 1 (2012)CrossRefGoogle Scholar
  54. 54.
    Krautheim, F.J., Phatak, D.S., Sherman, A.T.: Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing. In: International Conference on Trust and Trustworthy Computing, pp. 211–227. Springer, Berlin (2010)Google Scholar
  55. 55.
    Joreskog, K.G.: Structural analysis of covariance and correlation matrices. Psychometric society presidential address. Technical report, Research Report 78: 10, Department of Statistics, University of Uppsala, 1978Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringAnna UniversityChennaiIndia

Personalised recommendations