Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Toward trustworthy cloud service selection

Published: 01 October 2016 Publication History

Abstract

Cloud services consumers face a critical challenge in selecting trustworthy services from abundant candidates, and facilitating these choices has become a critical issue in the uncertain cloud industry. This paper employs the time series analysis to address challenges resulting from fluctuating quality of service, flexible service pricing and complicated potential risks in order to propose a time-aware trustworthy service selection approach with tradeoffs between performance-costs and potential risks. The original evaluation data about the services is preprocessed using a cloud model, and interval neutrosophic set (INS) theory is utilized to describe and measure the performance-costs and potential risks of services. In order to calculate and compare the candidate services while supporting tradeoffs between performance-costs and potential risks in different time periods, we established a cloud service interval neutrosophic set (CINS) and designed its operators and calculation rules, with theoretical proofs provided. The problem of time-aware trustworthy service selection is formulated as a multi-criterion decision-making (MCDM) problem of creating a ranked services list using CINS, and it is solved by developing a CINS ranking method. Finally, experiments based on a real-world dataset illustrate the practicality and effectiveness of the proposed approach. Propose a time-aware service selection approach for uncertain cloud industry.Formulate a multi-criterion decision-making problem using interval neutrosophic set.Support tradeoffs between performance-costs and potential risks in time periods.Establish the CINS theory to calculate and compare the candidate cloud services.Develop a CINS ranking method to create a ranked list of trustworthy cloud services.

References

[1]
J. Allen, S. Singh, Neurofuzzy and neutrosophic approach to compute the rate of change in new economies, in: Proc. of the First International Conference on Neutrosophy, Neutrosophic Logic, Neutrosophic Set, Neutrosophic Probability and Statistics, University of New Mexico, 2001, pp. 56-62.
[2]
A. Ansari, R. Biswas, S. Aggarwal, Proposal for applicability of neutrosophic set theory in medical AI, Int. J. Comput. Appl., 27 (2011) 5-11.
[3]
K.T. Atanassov, Intuitionistic fuzzy sets, Fuzzy Sets and Systems, 20 (1986) 87-96.
[4]
K. Atanassov, G. Gargov, Interval valued intuitionistic fuzzy sets, Fuzzy Sets and Systems, 31 (1989) 343-349.
[5]
E. Ayday, F. Fekri, Iterative trust and reputation management using belief propagation, IEEE Trans. Dependable Secure Comput., 9 (2012) 375-386.
[6]
N. Brender, I. Markov, Risk perception and risk management in cloud computing: Results from a case study of Swiss companies, Int. J. Inf. Manage., 33 (2013) 726-733.
[7]
P. Casas, R. Schatz, Quality of experience in cloud services: survey and measurements, Comput. Netw., 68 (2014) 149-165.
[8]
P. Chen, An interval estimation for the number of signals, Signal Process., 85 (2005) 1623-1633.
[9]
J. Chen, Y. Liu, D. Li, Enhancing recommender diversity using gaussian cloud transformation, Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 23 (2015) 521-544.
[10]
China Cloud Computing Promotion and Policy Forum, The evaluation results of trusted services authentication, October 2015. URL: http://www.3cpp.org/news/201.html.
[11]
Chinese University of Hong Kong, WS-DREAM, February 2016. URL: http://www.wsdream.net/dataset.html.
[12]
Cloud Security Alliance, Cloud Controls Matrix v3.0, October. 2015. URL: https://cloudsecurityalliance.org/download/cloud-controls-matrix-v3/.
[13]
Cloud Security Alliance, CSA Security, Trust & Assurance Registry (STAR), October 2015. URL: https://cloudsecurityalliance.org/star/.
[14]
Databaseskill.com, LoadRunner did not tell you, October 2015. URL: http://www.Databaseskill.com/471323/.
[15]
K. Dempsey, N.S. Chawla, A. Johnson, R. Johnston, A.C. Jones, A. Orebaugh, M. Scholl, K. Stine, Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations, National Institute of Standards and Technology Special Publication, 2012.
[16]
S. Ding, S.L. Yang, Y.T. Zhang, C.Y. Liang, C.Y. Xia, Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems, Knowl.-Based Syst., 56 (2014) 216-225.
[17]
S. Drissi, H. Houmani, H. Medromi, Survey: Risk assessment for cloud computing, Int. J. Adv. Comput. Sci. Appl., 4 (2013) 143-148.
[18]
S.K. Garg, S. Versteeg, R. Buyya, A framework for ranking of cloud computing services, Future Gener. Comput. Syst., 29 (2013) 1012-1023.
[19]
N. Ghosh, S.K. Ghosh, S.K. Das, SelCSP: A framework to facilitate selection of cloud service providers, IEEE Trans. Cloud Comput., 3 (2015) 66-79.
[20]
M. Godse, S. Mulik, An approach for selecting software-as-a-service (SaaS) product, in: Proc. of IEEE International Conference on Cloud Computing, IEEE, 2009, pp. 155-158.
[21]
Y. Guo, H.D. Cheng, New neutrosophic approach to image segmentation, Pattern Recognit., 42 (2009) 587-595.
[22]
M.L. Hale, R. Gamble, Secagreement: Advancing security risk calculations in cloud services, in: Proc. of 2012 IEEE Eighth World Congress on Services, SERVICES, IEEE, 2012, pp. 133-140.
[23]
K. Hanbay, M.F. Talu, Segmentation of SAR images using improved artificial bee colony algorithm and neutrosophic set, Appl. Soft Comput., 21 (2014) 433-443.
[24]
HIEU2011, Data for CINS, February 2016. URL: http://pan.baidu.com/s/1ntoxg5V.
[25]
Y. Hu, Q. Peng, X. Hu, A time-aware and data sparsity tolerant approach for web service recommendation, in: Proc. of 2014 IEEE International Conference on Web Services, ICWS, IEEE, 2014, pp. 33-40.
[26]
Y. Huo, Y. Zhuang, S. Ni, Fuzzy trust evaluation based on consistency intensity for cloud services, Kybernetes, 44 (2015) 7-24.
[27]
M. Jarschel, D. Schlosser, S. Scheuring, T. Hoßfeld, Gaming in the clouds: QoE and the users' perspective, Math. Comput. Modelling, 57 (2013) 2883-2894.
[28]
B.P. Joshi, S. Kumar, Fuzzy time series model based on intuitionistic fuzzy sets for empirical research in stock market, Int. J. Appl. Evol. Comput., 3 (2012) 71-84.
[29]
N.N. Joshi, J.H. Lambert, Equity metrics with risk, performance, and cost objectives for the prioritization of transportation projects, IEEE Trans. Eng. Manage., 54 (2007) 539-547.
[30]
F.R.L. Junior, L. Osiro, L.C.R. Carpinetti, A comparison between fuzzy AHP and fuzzy TOPSIS methods to supplier selection, Appl. Soft Comput., 21 (2014) 194-209.
[31]
B. Kavitha, S. Karthikeyan, P.S. Maybell, An ensemble design of intrusion detection system for handling uncertainty using neutrosophic logic classifier, Knowl.-Based Syst., 28 (2012) 88-96.
[32]
K.M. Khan, Q. Malluhi, Establishing trust in cloud computing, IT Prof., 12 (2010) 20-27.
[33]
M. Khoshnevisan, S. Bhattacharya, A short note on financial data set detection using neutrosophic probability, in: Proc. of the First International Conference on Neutrosophy, Neutrosophic Logic, Neutrosophic Set, Neutrosophic Probability and Statistics, University of New Mexico, 2001, pp. 75-80.
[34]
K. Li, Optimal load distribution for multiple heterogeneous blade servers in a cloud computing environment, J. Grid Comput., 11 (2013) 27-46.
[35]
D.Y. Li, H.J. Meng, X.M. Shi, Membership clouds and membership cloud generators, J. Comput. Res. Dev., 32 (1995) 15-20.
[36]
S. Lins, S. Thiebes, S. Schneider, A. Sunyaev, What is really going on at your cloud service provider? Creating trustworthy certifications by continuous auditing, in: Proc. of 2015 48th Hawaii International Conference on System Sciences, HICSS, IEEE, 2015, pp. 5352-5361.
[37]
P. Liu, Y. Chu, Y. Li, Y. Chen, Some generalized neutrosophic number Hamacher aggregation operators and their application to group decision making, Int. J. Fuzzy Syst., 16 (2014) 242-255.
[38]
H. Ma, Z.G. Hu, User preferences-aware recommendation for trustworthy cloud services based on fuzzy clustering, J. Cent. South Univ., 22 (2015) 3495-3505.
[39]
H. Ma, Z.G. Hu, Recommend trustworthy services using interval numbers of four parameters via cloud model for potential users, Front. Comput. Sci., 9 (2015) 887-903.
[40]
H. Ma, Z.G. Hu, L. Yang, T. Song, User feature-aware trustworthiness measurement of cloud services via evidence synthesis for potential users, J. Vis. Lang. Comput., 25 (2014) 791-799.
[41]
P. Majumdar, S.K. Samanta, On similarity and entropy of neutrosophic sets, J. Intell. Fuzzy Syst., 26 (2014) 1245-1252.
[42]
M. Mehdi, N. Bouguila, J. Bentahar, Probabilistic approach for QoS-aware recommender system for trustworthy web service selection, Appl. Intell., 41 (2014) 503-524.
[43]
M. Menzel, M. Schönherr, S. Tai, (MC2) 2: criteria, requirements and a software prototype for Cloud infrastructure decisions, Softw. Pract. Exp., 43 (2013) 1283-1297.
[44]
Y. Mo, J. Chen, X. Xie, C. Luo, L.T. Yang, Cloud-based mobile multimedia recommendation system with user behavior information, IEEE Syst. J., 8 (2014) 184-193.
[45]
H. Mouratidis, S. Islam, C. Kalloniatis, S. Gritzalis, A framework to support selection of cloud providers based on security and privacy requirements, J. Syst. Softw., 86 (2013) 2276-2293.
[46]
P.S. Pawar, M. Rajarajan, S.K. Nair, A. Zisman, Trust model for optimized cloud services, in: Trust Management VI, Springer, 2012, pp. 97-112.
[47]
J.J. Peng, J.Q. Wang, J. Wang, L.J. Yang, X.H. Chen, An extension of ELECTRE to multi-criteria decision-making problems with multi-hesitant fuzzy sets, Inform. Sci., 307 (2015) 113-126.
[48]
A.S. Prasad, S. Rao, A mechanism design approach to resource procurement in cloud computing, IEEE Trans. Comput., 63 (2014) 17-30.
[49]
G. Prestifilippo, D. Roy, J. Reipert, Real-time risk management through the use of intelligent cloud-computing solutions, Product. Manag., 19 (2014) 62-64.
[50]
Princeton University, PlanetLab, February 2016. URL: http://www.planet-lab.org.
[51]
C. Qu, R. Buyya, A cloud trust evaluation system using hierarchical fuzzy inference system for service selection, in: 2014 IEEE 28th International Conference on Proc. of Advanced Information Networking and Applications, AINA, IEEE, 2014, pp. 850-857.
[52]
A. Ramaswamy, A. Balasubramanian, P. Vijaykumar, P. Varalakshmi, A mobile agent based approach of ensuring trustworthiness in the cloud, in: Proc. of 2011 International Conference on Recent Trends in Information Technology, ICRTIT, IEEE, 2011, pp. 678-682.
[53]
S. Ren, M. van der Schaar, Dynamic scheduling and pricing in wireless cloud computing, IEEE Trans. Mob. Comput., 13 (2014) 2283-2292.
[54]
D. Rosaci, G.M. Sarné, Recommending multimedia web services in a multi-device environment, Inf. Syst., 38 (2013) 198-212.
[55]
R. Şahin, M. Karabacak, A multi attribute decision making method based on inclusion measure for interval neutrosophic sets, Int. J. Eng. Appl. Sci., 2 (2015) 13-15.
[56]
P. Saripalli, B. Walters, Quirc: A quantitative impact and risk assessment framework for cloud security, in: Proc. of 2010 IEEE 3rd International Conference on Cloud Computing, CLOUD, IEEE, 2010, pp. 280-288.
[57]
A. Sengupta, T.K. Pal, On comparing interval numbers, European J. Oper. Res., 127 (2000) 28-43.
[58]
A. Sengur, Y. Guo, Color texture image segmentation based on neutrosophic set and wavelet transformation, Comput. Vis. Image Underst., 115 (2011) 1134-1144.
[59]
H. Shen, G. Liu, An efficient and trustworthy resource sharing platform for collaborative cloud computing, IEEE Trans. Parallel Distrib. Syst., 25 (2014) 862-875.
[60]
T. Shinoj, S.J. John, Intuitionistic fuzzy multisets and its application in medical diagnosis, World Acad. Sci. Eng. Technol., 6 (2012) 1418-1421.
[61]
S. Silas, E.B. Rajsingh, K. Ezra, Efficient service selection middleware using ELECTRE methodology for cloud environments, Inf. Technol. J., 11 (2012) 868-875.
[62]
F. Smarandache, A unifying field in logics: neutrosophic logic, philosophy, (1999) 1-141.
[63]
L. Sun, J. Ma, Y. Zhang, H. Dong, F.K. Hussain, Cloud-FuSeR: Fuzzy ontology and MCDM based cloud service selection, Future Gener. Comput. Syst., 57 (2016) 42-55.
[64]
V. Torra, Hesitant fuzzy sets, Int. J. Intell. Syst., 25 (2010) 529-539.
[65]
I.B. Turksen, Interval valued fuzzy sets based on normal forms, Fuzzy Sets and Systems, 20 (1986) 191-210.
[66]
X. Wang, J. Cao, Y. Xiang, Dynamic cloud service selection using an adaptive learning mechanism in multi-cloud computing, J. Syst. Softw., 100 (2015) 195-210.
[67]
H. Wang, F. Smarandache, R. Sunderraman, Y.-Q. Zhang, Interval Neutrosophic Sets and Logic: Theory and Applications in Computing: Theory and Applications in Computing, Hexis Phoenix Az, 2005.
[68]
J.Q. Wang, J.T. Wu, J. Wang, H.Y. Zhang, X.H. Chen, Interval-valued hesitant fuzzy linguistic sets and their applications in multi-criteria decision-making problems, Inform. Sci., 288 (2014) 55-72.
[69]
J.Q. Wang, J.T. Wu, J. Wang, H.Y. Zhang, X.H. Chen, Multi-criteria decision-making methods based on the Hausdorff distance of hesitant fuzzy linguistic numbers, Soft Comput. (2015) 1-13.
[70]
G. Wang, C. Xu, D. Li, Generic normal cloud model, Inform. Sci., 280 (2014) 1-15.
[71]
Z.S. Xu, On method for uncertain multiple attribute decision making problems with uncertain multiplicative preference information on alternatives, Fuzzy Optim. Decis. Mak., 4 (2005) 131-139.
[72]
Z.S. Xu, Dependent uncertain ordered weighted aggregation operators, Inf. Fusion, 9 (2008) 310-316.
[73]
C. Xu, G. Wang, Q. Zhang, A new multi-step backward cloud transformation algorithm based on normal cloud model, Fund. Inform., 133 (2014) 55-85.
[74]
J. Ye, Multicriteria decision-making method using the correlation coefficient under single-valued neutrosophic environment, Int. J. Gen. Syst, 42 (2013) 386-394.
[75]
J. Ye, A multicriteria decision-making method using aggregation operators for simplified neutrosophic sets, J. Intell. Fuzzy Syst., 26 (2014) 2459-2466.
[76]
J. Ye, Similarity measures between interval neutrosophic sets and their applications in multicriteria decision-making, J. Intell. Fuzzy Syst., 26 (2014) 165-172.
[77]
J. Yin, W. Lo, S. Deng, Y. Li, Z. Wu, N. Xiong, Colbar: A collaborative location-based regularization framework for QoS prediction, Inform. Sci., 265 (2014) 68-84.
[78]
C. Yu, L. Huang, Time-aware collaborative filtering for QoS-based service recommendation, in: Proc. of 2014 IEEE International Conference on Web Services, ICWS, IEEE, 2014, pp. 265-272.
[79]
L. Yuchao, Z. Haisu, M. Yutao, L. Deyi, C. Guisheng, Collective intelligence and uncertain knowledge representation in cloud computing, China Commun., 8 (2011) 58-66.
[80]
yunzhiliang.net, Quality evaluations of cloud, February 2016. URL: http://www.yunzhiliang.net/cloudtest/cloudtest.html.
[81]
L. Zeng, B. Veeravalli, X. Li, SABA: A security-aware and budget-aware workflow scheduling strategy in clouds, J. Parallel Distrib. Comput., 75 (2015) 141-151.
[82]
H.Y. Zhang, P. Ji, J.Q. Wang, X.H. Chen, An improved weighted correlation coefficient based on integrated weight for interval neutrosophic sets and its application in multi-criteria decision-making problems, Int. J. Comput. Intell. Syst., 8 (2015) 1027-1043.
[83]
L. Zhang, C. Qing, Hybrid-context-aware web service selection approach, J. Internet Technol., 14 (2013) 57-69.
[84]
H.Y. Zhang, J.Q. Wang, X. Chen, An outranking approach for multi-criteria decision-making problems with interval-valued neutrosophic sets, Neural Comput. Appl. (2015).
[85]
M. Zhang, L. Zhang, H. Cheng, A neutrosophic approach to image segmentation based on watershed method, Signal Process., 90 (2010) 1510-1517.
[86]
Y.L. Zhang, Z.B. Zheng, M.R. Lyu, WSPred: A time-aware personalized QoS prediction framework for Web services, in: Proc. of 2011 IEEE 22nd International Symposium on Software Reliability Engineering, ISSRE, IEEE, 2011, pp. 210-219.
[87]
Z.B. Zheng, H. Ma, M.R. Lyu, I. King, Collaborative web service QoS prediction via neighborhood integrated matrix factorization, IEEE Trans. Serv. Comput., 6 (2013) 289-299.
[88]
Z. Zheng, Y. Zhang, M.R. Lyu, Distributed QoS evaluation for real-world web services, in: Proc. of 2010 IEEE International Conference on Web Services, ICWS, IEEE, 2010, pp. 83-90.
[89]
Y. Zhong, Y. Fan, K. Huang, W. Tan, J. Zhang, Time-aware service recommendation for mashup creation, IEEE Trans. Serv. Comput., 8 (2015) 356-368.

Cited By

View all
  • (2024)Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculationJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-024-00694-w13:1Online publication date: 21-Aug-2024
  • (2024)Tconns: a novel time-varying context-aware offloading strategy for mobile edge computingEURASIP Journal on Wireless Communications and Networking10.1186/s13638-023-02331-72024:1Online publication date: 4-Jan-2024
  • (2023)Predicting Student Performance in Future Exams via Neutrosophic Cognitive Diagnosis in Personalized E-Learning EnvironmentIEEE Transactions on Learning Technologies10.1109/TLT.2023.324093116:5(680-693)Online publication date: 1-Oct-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Journal of Parallel and Distributed Computing
Journal of Parallel and Distributed Computing  Volume 96, Issue C
October 2016
218 pages

Publisher

Academic Press, Inc.

United States

Publication History

Published: 01 October 2016

Author Tags

  1. Cloud service selection
  2. Interval neutrosophic set
  3. Performance-costs
  4. Potential risks
  5. Time series analysis
  6. Trustworthy service

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculationJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-024-00694-w13:1Online publication date: 21-Aug-2024
  • (2024)Tconns: a novel time-varying context-aware offloading strategy for mobile edge computingEURASIP Journal on Wireless Communications and Networking10.1186/s13638-023-02331-72024:1Online publication date: 4-Jan-2024
  • (2023)Predicting Student Performance in Future Exams via Neutrosophic Cognitive Diagnosis in Personalized E-Learning EnvironmentIEEE Transactions on Learning Technologies10.1109/TLT.2023.324093116:5(680-693)Online publication date: 1-Oct-2023
  • (2023)Application of MADM methods in Industry 4.0Computers and Industrial Engineering10.1016/j.cie.2023.109075177:COnline publication date: 1-Mar-2023
  • (2023)Predicting examinee performance based on a fuzzy cloud cognitive diagnosis framework in e-learning environmentSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-023-08100-427:24(18949-18969)Online publication date: 1-Dec-2023
  • (2022)Cloud service recommendation for small and medium-sized enterprisesJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-21019242:3(1331-1351)Online publication date: 1-Jan-2022
  • (2022)Cloud service scrutinization and selection framework (C3SF)Information Sciences: an International Journal10.1016/j.ins.2021.11.024586:C(155-175)Online publication date: 1-Mar-2022
  • (2022)A novel customer-centric Methodology for Optimal Service Selection (MOSS) in a cloud environmentFuture Generation Computer Systems10.1016/j.future.2019.12.024105:C(562-580)Online publication date: 21-Apr-2022
  • (2022)Cloud services selectionComputer Science Review10.1016/j.cosrev.2022.10051446:COnline publication date: 1-Nov-2022
  • (2022)EDSAC–An Efficient Dempster Shafer Algorithm for Classification to Estimate the Service, Security and Privacy Risks with the Service ProvidersWireless Personal Communications: An International Journal10.1007/s11277-021-09105-8122:4(3649-3669)Online publication date: 1-Feb-2022
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media