Abstract
Trust is one of the most challenging issues in the emerging cloud computing era. Over the past few years, numerous cloud service providers have been emerged providing similar kinds of services. It has become incredibly complex for the cloud clients to make a distinction among multiple cloud service providers offering similar kinds of services. Cloud clients need trustworthy service providers who provide services exactly as per the SLA and do not deviate from their promises. Though, there have been significant efforts to form trust between service providers and the clients by providing data, storage and network security, but relatively fewer efforts have been made in the field of trustworthiness determination by monitoring the compliance of offered services as per the SLA. This paper presents the design of a trust evaluation framework that uses the compliance monitoring mechanism to determine the trustworthiness of service providers. The compliance values are computed and then processed using a technique known as the Improved Technique for Order of Preference by Similarity to Ideal Solution (Improved TOPSIS) to obtain trust on the service providers. Case study based approach has been followed to demonstrate the usability and the applicability of the proposed framework. Experiments have been performed using the real cloud data extracted from the Cloud Harmony reports. From the experimental results, it is clear that the proposed framework can be used in real cloud environments to determine the trustworthiness of service providers by employing the real time monitoring of their services.
Similar content being viewed by others
References
Fan, W., Perros, H.: A novel trust management framework for multi-cloud environments based on trust service providers. Knowl.-Based Syst. 70, 392–406 (2014)
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing—The business perspective. Decis. Support. Syst. 51(1), 176–189 (2011)
Noor, T.H., Sheng, Q.Z., Zeadally, S., Yu, J.: Trust management of services in cloud environments: obstacles and solutions. ACM Comput. Surv. 46(1), 12 (2013)
Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, pp. 1–10. IEEE (2008)
Sotomayor, B., Montero, R.S., Llorente, I.M., Foster, I.: Virtual infrastructure management in private and hybrid clouds. IEEE Internet Comput. 13(5), 14–22 (2009)
Gottfrid, D.: Self-service prorated supercomputing fun. The New York Times [online]. http://open.blogs.nytimes.com/2007/11/01/self-service-prorated-super-computing-fun/ (2007). Accessed 14 July 2014
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
Bertino, E., Paci, F., Ferrini, R., Shang, N.: Privacy-preserving digital identity management for cloud computing. IEEE Data Eng. Bull. 32(1), 21–27 (2009)
Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE Internet Comput. 14(5), 14–22 (2010)
Viega, J.: Cloud computing and the common man. Computer 42(8), 106–108 (2009)
Hwang, K., Kulkareni, S., Hu, Y.: Cloud security with virtualized defense and reputation-based trust management. In: 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 717–722. IEEE (2009)
Noor, T.H., Sheng, Q.Z.: Trust as a service: a framework for trust management in cloud environments. In: Web Information System Engineering (WISE), pp. 314–321. Springer, Berlin Heidelberg (2011)
Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. In: 2nd International Conference on Cloud Computing Technology and Science, pp. 693–702. IEEE (2010)
Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. Journal of Cloud Computing 2 (1), 1–14 (2011)
Everett, C.: Cloud computing–A question of trust. Computer Fraud & Security 6, 5–7 (2009)
Garrison, G., Kim, S., Wakefield, R.L.: Success factors for deploying cloud computing. Commun. ACM 55(9), 62–68 (2012)
Arce, I., Ghosh, A.: In cloud computing we trust—But should we? IEEE Secur. Priv. 8(6), 14–16 (2010)
Habib, S.M., Hauke, S., Ries, S., Mühlhäuser, M.: Trust as a facilitator in cloud computing: a survey. Journal of Cloud Computing 1(1), 1–18 (2012)
Khan, K.M., Malluhi, Q.: Establishing trust in cloud computing. IT Professional 12(5), 20–27 (2010)
Michael, B., Dinolt, G.: Establishing trust in cloud computing. Cloud Computing: Silver Lining or Storm Ahead (2010)
Park, J.S., Spetka, E., Rasheed, H., Ratazzi, P., Han, K.J.: Near-real-time cloud auditing for rapid response. In: 26th International Conference on Advanced Information Networking and Applications Workshops, pp. 1252–1257. IEEE (2012)
Takabi, H., Joshi, J.B., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)
Abawajy, J.: Establishing trust in hybrid cloud computing environments. In: 10th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, pp. 118–125 (2011)
Haq, I.U., Alnemr, R., Paschke, A., Schikuta, E., Boley, H., Meinel, C.: Distributed trust management for validating sla choreographies. In: Grids and Service-Oriented Architectures for Service Level Agreements, pp. 45–55. Springer, Berlin Heidelberg New York (2010)
Pawar, P.S., Rajarajan, M., Nair, S.K., Zisman, A.: Trust model for optimized cloud services. In: Trust Management VI, pp. 97–112. Springer, Berlin Heidelberg (2012)
Hogan, M., Liu, F., Sokol, A., Tong, J.: NIST Cloud computing standards roadmap. NIST Special Publication, 35 (2011)
Schiffman, J., Sun, Y., Vijayakumar, H., Jaeger, T.: Cloud verifier: verifiable auditing service for iaas clouds. In: 9th World Congress on Services (SERVICES), pp. 239–246. IEEE (2013)
Garg, S.K., Versteeg, S., Buyya, R.: A framework for ranking of cloud computing services. Futur. Gener. Comput. Syst. 29(4), 1012–1023 (2013)
Cuomo, A., Di Modica, G., Distefano, S., Puliafito, A., Rak, M., Tomarchio, O., Venticinque, S., Villano, U.: An SLA-based broker for cloud infrastructures. J. Grid. Comput. 11(1), 1–25 (2013)
García, A.G., Blanquer, I.: Cloud services representation using SLA composition. J. Grid. Comput. 13(1), 35–51 (2015)
Ding, S., Yang, S., Zhang, Y., Liang, C., Xia, C.: Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems. Knowl.-Based Syst. 56, 216–225 (2014)
Wang, C., Wang, Y., Liu, C., Wang, X.: An audit-based trustworthiness verification scheme for monitoring the integrity of cloud servers. J. Comput. Inf. Syst. 10(23), 9923–9937 (2014)
Fan, W., Yang, S., Pei, J.: A novel two stage model for cloud service trustworthiness evaluation. Expert. Syst. 31(2), 136–153 (2014)
Song, S., Hwang, K., Kwok, Y.K.: Trusted grid computing with security binding and trust integration. J. Grid. Comput. 3(1), 53–73 (2005)
Azzedin, F., Maheswaran, M., Mitra, A.: Trust brokering and its use for resource matchmaking in public-resource grids. J. Grid. Comput. 4(3), 247–263 (2006)
Tomanek, O., Kencl, L.: CLAUdit: planetary-scale cloud latency auditing platform. In: 2nd International Conference on Cloud Networking (CloudNet), pp. 138–146. IEEE (2013)
Doelitzscher, F., Fischer, C., Moskal, D., Reich, C., Knahl, M., Clarke, N.: Validating cloud infrastructure changes by cloud audits. In: 8th World Congress on Services (SERVICES), pp. 377–384. IEEE (2012)
Shetty, S.: Auditing and analysis of network traffic in cloud environment. In: 9th World Congress on Services (SERVICES), pp. 260–267. IEEE (2013)
Liu, Q., Wang, G., Wu, J.: Consistency as a service: auditing cloud consistency. IEEE Trans. Netw. Serv. Manag. 11(1), 25–35 (2014)
Gowrigolla, B., Sivaji, S., Masillamani, M.R.: Design and auditing of cloud computing security. In: 5th International Conference on Information and Automation for Sustainability (ICIAFs), pp. 292–297. IEEE (2010)
Chen, J., Jiang, W., Yan, J.: Understanding the approach for auditing of cloud computing system. In: Information Technology and Computer Science (ITCS), pp. 581–583. IEEE (2010)
Ravindran, K.: Qos auditing for evaluation of SLA in cloud-based distributed services. In: 9th World Congress on Services (SERVICES), pp. 247–254. IEEE (2013)
Chen, Z., Yoon, J.: IT auditing to assure a secure cloud computing. In: 6th World Congress on Services (SERVICES-1), pp. 253–259. IEEE (2010)
Tajuddin, M., Busi, K.C.: An enhanced dynamic auditing protocol in cloud computing. International Journal of Engineering Trends and Technology 4(7), 3173 (2013)
Figueira, J., Greco, S., Ehrgott, M.: Multiple criteria decision analysis: state of the art surveys Springer Science & Business Media, p 78 (2005)
Hwang, C.L., Yoon, K.: Multiple Attribute Decision Making: Methods and Applications: a State-Of-The-Art Survey. Springer, London (1981)
Rao, R.V.: Decision making in the manufacturing environment: using graph theory and fuzzy multiple attribute decision making methods. Springer Science & Business Media (2007)
Ramanathan, R.: A note on the use of the analytic hierarchy process for environmental impact assessment. J. Environ. Manage. 63(1), 27–35 (2001)
Saaty, T.L.: Theory and applications of the analytic network process: decision making with benefits, opportunities, costs, and risks. Publications, Pennsylvania Pittsburgh RWS (2005)
Cloud Harmony Cloud Reports: Availablefrom: https://cloudharmony.com/reports/state-of-thecloud-compute-report (2014). Accessed 5 February 2015
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sidhu, J., Singh, S. Improved TOPSIS Method Based Trust Evaluation Framework for Determining Trustworthiness of Cloud Service Providers. J Grid Computing 15, 81–105 (2017). https://doi.org/10.1007/s10723-016-9363-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10723-016-9363-1