Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2660859.2660921acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiconiaacConference Proceedingsconference-collections
research-article

Estimation of Trust values for Varying Levels of Trustworthiness based on Infrastructure as a Service

Published: 10 October 2014 Publication History
  • Get Citation Alerts
  • Abstract

    Cloud computing has emerged as a paradigm to deliver on demand resources to enable the customers with access to their infrastructure and application services on a subscription basis. In recent times, increasing number of people carry out variety of different activities on the cloud. Two important issues surrounding cloud computing relate to storing and securing data, and monitoring the use of the cloud by the service providers. Trust helps to build this consumer confidence in such open and often anonymous environments. It provides a reliable environment for customers or businesses to carry out transactions with cloud providers. The amount of trust that the trusting agent has in the trusted agent is measured by a Trustworthiness scale. Trustworthiness is determined by the trust levels specified as numeric or non-numeric values. In this paper, a hierarchical trust model has been used to compare the trust values of various cloud service providers for varying levels of trustworthiness based on Infrastructure as a Service.

    References

    [1]
    Mell P. and Grance T.2009. "A NIST definition of cloud computing". National Institute of Standards and Technology. NIST SP 800-145. http://www.nist.gov/itl/cloud/upload/clouddef-v15.pdf.
    [2]
    Siani Pearson. 2012. "Privacy, Security and Trust in Cloud Computing". HP Laboratories, Springer, June.
    [3]
    Elizabeth Chang, Tharam Dillon and Farookh K. Hussain. 2006. "Trust and Reputation for Service-Oriented Environments: Technologies for Building Business Intelligence and Consumer Confidence". John Wiley & Sons, Ltd.
    [4]
    Wang Y. and Vassileva J.2003. "Trust and Reputation model in Peer-to-Peer". www.cs.usask.ca/grads/yaw181/publications/120_wang_y.pdf.
    [5]
    Wang Y. and Vassileva J.2003. "Bayesian Network Trust Model in Peer-to-Peer Networks". Proceedings of Second International Workshop on Agent and Peer to Peer Computing, Melbourne, pp. 23--24.
    [6]
    Aberer K. and Despotovic Z. 2003. "Managing Trust in a Peer-2-Peer Information System". http://www.cs.rit.edu/~jjp1820/distributed/Managing%20Trust%20in%20a%20Peer-2-Peer%20Information%20System.pdf.
    [7]
    Xiong L. and Liu L., 2003. "A Reputation based Trust Model for Peer-to-Peer eCommerce Communities".http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.59.3205&rep=rep1&type=pdf.
    [8]
    Kamvar S.D., Schlosser M.T. and Garcia-Molina H.2003. "The EigenRep Algorithm for Reputation Management in P2P Networks". http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.125.8729&rep=rep1&type=pdf".
    [9]
    Rahman A.A. and Hailes S., 2003. "A Distributed Trust Model". http://irl.cs.ucla.edu/~yingdi/pub/papers/Rahman-DistributedTrustSystem.pdf.
    [10]
    Cornelli F., Damiani E., Vimercati S., Vimercati S.D.C., Paraboschi S. And Samarati P.2003. "Choosing Reputable Servants in a P2P Network". http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.11.9044&rep=rep1&type=pdf.
    [11]
    Huaizhi Li and Mukesh Singhal. 2007. "Trust Management in Distributed Systems", https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CD4QFjAA&url=http%3A%2F%2Fruimtool.com%2Flibrary%2Fcommon%2Ftrust_management_in_distrib_systems.pdf&ei=naMwUuPRJMiLrQf6qYDgDQ&usg=AFQjCNEVgeKnXmZN2-4dUC6k6o7QCVnNEg, February.
    [12]
    Hongwei Chen, ShengSheng Yu, Jianga Shang, Chunzhi Wang, Zhiwei Ye. 2009. "Comparison with Several Fuzzy Trust Methods for P2P-based System". International Conference on Information Technology and Computer Science, China, July. pp. 188--191.
    [13]
    H. Xia Z. Jia L. Ju Y. Zhu. 2011. "Trust Management Model for Mobile Ad hoc Network based on Analytic Hierarchy Process and Fuzzy Theory". IET Wireless Sensor Systems, December. Vol. 1, Iss. 4, pp. 248--266.
    [14]
    Supriya M., Venkataramana L.J., K. Sangeeta and G. K. Patra. 2012. "Estimating Trust Value for Cloud Service Providers using Fuzzy Logic". International Journal of Computer Applications, Volume 48--No.19, June.
    [15]
    Supriya M, K Sangeeta and G K Patra. 2013. "Comparison of Cloud Service Providers Based on Direct and Recommended Trust Rating". IEEE International Conference on Electronics, Computing and Communication Technologies, India, January. pp. 1--6.
    [16]
    Supriya M, K Sangeeta and G K Patra. 2014. "Comparison of Trust Values using Triangular and Gaussian Fuzzy Membership Functions for Infrastructure as a Service". Proceeding of International Conference on Advances in Communication, Network, and Computing, CNC, Chennai, India, February. pp. 737--747.
    [17]
    http://www.gogrid.com/cloud-hosting/dedicetadservers.php GoGrid Cloud Hosting: Dedicated Servers, Physical Servers.
    [18]
    http://www.rackspace.com/managed_hosting/configurations RackSpace: Dedicated Server, Managed Hosting and Web Hosting Configurations.
    [19]
    http://www.Amazon.com/services/configurations different entities.
    [20]
    http://www.Cloudflare.com/businesstypes/pricing/ Cloudflare services.

    Cited By

    View all
    • (2023)A Security Frame work for Data Storage in Cloud Computing by Using Cryptographic ApproachesInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology10.32628/CSEIT228659(110-120)Online publication date: 1-Jul-2023
    • (2021)A Trust Framework Utilization in Cloud Computing Environment Based on Multi-criteria Decision-Making MethodsThe Computer Journal10.1093/comjnl/bxaa13865:4(997-1005)Online publication date: 13-Jan-2021
    • (2020)A Cloud Trusting Mechanism Based on Resource RankingHandling Priority Inversion in Time-Constrained Distributed Databases10.4018/978-1-7998-2491-6.ch008(130-155)Online publication date: 2020
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICONIAAC '14: Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing
    October 2014
    374 pages
    ISBN:9781450329088
    DOI:10.1145/2660859
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    In-Cooperation

    • Amrita: Amrita Vishwa Vidyapeetham

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 October 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cloud analyst
    2. direct trust
    3. hierarchical model
    4. recommended trust
    5. service providers
    6. trustworthiness

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICONIAAC '14

    Acceptance Rates

    ICONIAAC '14 Paper Acceptance Rate 69 of 176 submissions, 39%;
    Overall Acceptance Rate 69 of 176 submissions, 39%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 11 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)A Security Frame work for Data Storage in Cloud Computing by Using Cryptographic ApproachesInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology10.32628/CSEIT228659(110-120)Online publication date: 1-Jul-2023
    • (2021)A Trust Framework Utilization in Cloud Computing Environment Based on Multi-criteria Decision-Making MethodsThe Computer Journal10.1093/comjnl/bxaa13865:4(997-1005)Online publication date: 13-Jan-2021
    • (2020)A Cloud Trusting Mechanism Based on Resource RankingHandling Priority Inversion in Time-Constrained Distributed Databases10.4018/978-1-7998-2491-6.ch008(130-155)Online publication date: 2020
    • (2020)Cloud Service Provider Selection using Non-Dominated Sorting Genetic Algorithm2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)10.1109/ICOEI48184.2020.9142934(800-807)Online publication date: Jun-2020
    • (2020)Ranking Internet Service Providers using Fuzzy Multi Criteria Decision Making Method2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA)10.1109/ICIMIA48430.2020.9074879(102-107)Online publication date: Mar-2020
    • (2019)A Fuzzy Based Trust Evaluation Model for Service Selection in Cloud EnvironmentInternational Journal of Grid and High Performance Computing10.4018/IJGHPC.201910010211:4(13-27)Online publication date: 1-Oct-2019
    • (2018)Secure Data Storage in Cloud Using Cryptographic Algorithms2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)10.1109/ICCUBEA.2018.8697550(1-6)Online publication date: Aug-2018
    • (2018)Efficient Model of Cloud Trustworthiness for Selecting Services Using Fuzzy LogicEmerging Technologies in Data Mining and Information Security10.1007/978-981-13-1951-8_23(249-260)Online publication date: 12-Dec-2018
    • (2017)Study of essential personality characteristics for the young Indian millennial: A tobit analysis2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)10.1109/ICACCI.2017.8126119(1882-1887)Online publication date: Sep-2017
    • (2016)Fuzzy logic based cloud service trustworthiness model2016 IEEE International Conference on Engineering and Technology (ICETECH)10.1109/ICETECH.2016.7569215(73-78)Online publication date: Mar-2016

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media