A Trusted Third Party-Based Key Agreement Scheme in Cloud Computing

Author(s):  
Ying Li ◽  
Liping Du ◽  
Guifen Zhao ◽  
Fuwei Feng
2018 ◽  
Vol 8 (2) ◽  
pp. 66-95 ◽  
Author(s):  
Adil Maarouf ◽  
Youssef Mifrah ◽  
Abderrahim Marzouk ◽  
Abdelkrim Haqiq

This article describes how currently, service level agreements (SLAs) assurance forms one of the major challenges for cloud computing (CC) in order to guarantee quality of service (QoS) in real-time and control SLA violations. However, due to the highly dynamic nature of this open environment, it is important to have a binding agreement between all the service parties for ensuring trust while fulfilling the expected QoS. To properly operate and manage such complex situations, an effective and efficient monitoring is crucial. The participation of a trusted third party (TTP) is necessary in order to resolve conflicts between involved parties. This article proposes an autonomic SLA monitoring framework managed by TTP composed of two modules: the first one SLA establishment module, which aims at providing support for automated SLA generation and management. The second one, a service monitoring module to dynamically monitor QoS metrics by detecting SLA violations at runtime to verify compliances for the respective SLAs, and to propose a mechanism for an adaptive remedy rectification, as a contribution at the third maturity level of the autonomic computing paradigm as defined by IBM. The framework is validated with scenarios on response time and availability, the results obtained are promising. They confirm that this framework manages SLAs in an efficient way as it detects all violations to be communicated to concerned parties, and identifies particular penalty clauses that can be used to modify the reputation of a provider over time. The TTP framework equipped with such reputation module can provide real-time assessment for consumers informed decision making to continue using a service or to migrate to another service provider in the case of service degradation. This creates a fair competitiveness between providers and hence improves service performance and the reliability in the cloud.


Author(s):  
Rohit Ranchal ◽  
Bharat Bhargava ◽  
Lotfi Ben Othmane ◽  
Leszek Lilien ◽  
Anya Kim ◽  
...  

Author(s):  
Adil Maarouf ◽  
Mahmoud El Hamlaoui ◽  
Abderrahim Marzouk ◽  
Abdelkrim Haqiq

Establishing and monitoring SLA violations in real-time has become a critical issue for Cloud Computing. In this paper the authors investigate this issue and propose a model to express the SLA contract requirements using Model Driven Engineering (MDE), as a mean for establishing service level agreements between a cloud provider and cloud customer in the context of a particular service provision. The participation of a Trusted Third Party (TTP) may be necessary in order to resolve conflicts between prospective signatories, likewise to monitor SLA violations in real-time in the goal to ensure online monitoring cloud services and provide better than best-effort behavior for clouds. The main focus of this work is firstly to use MDE technology for the creation of the SLA contract and then to integrate TTP that should be able to apply an advanced penalty model that guarantees the performance and the reliability of the Cloud.


Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


Sign in / Sign up

Export Citation Format

Share Document