A new trust management framework based on the experience of users in industrial cloud computing using multi-criteria decision making

Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Liudmila Ivanovna Khoruzhy ◽  
Roman Petrovich Bulyga ◽  
Olga Yuryevna Voronkova ◽  
Lidia Vladimirovna Vasyutkina ◽  
Natalya Ryafikovna Saenko ◽  
...  

PurposeNowadays, cloud platforms are used in many fields, including e-commerce, web applications, data storage, healthcare, gaming, mobile social networks, etc. However, security and privacy are still two significant concerns in this area. The target of this paper is to present a system for trust management in industrial cloud computing using the multi-criteria decision making (MCDM) approach. MCDM techniques have been developed to accommodate a wide range of applications. As a result, hundreds of approaches have been generated with even minor variations on current approaches spawning new study fields.Design/methodology/approachCloud computing provides a fully scalable, accessible and flexible computing platform for various applications. Due to the multiple applications that cloud computing has found in numerous life features, users and providers have considered providing security in cloud communications. Due to its distributive nature, dynamic space and lack of transparency in performing cloud computing, it faces many challenges in providing security. For security improvement, trust management can play a very influential role. This paper proposes a generic analytical methodology that uses a series of assessment criteria to evaluate current trust management testing prototypes in industrial cloud computing and related fields. The authors utilize a MCDM approach in the present article. Due to the multi-dimensionality of the sustainability objective and the complexities of socio-economic and biophysical processes, MCDM approaches have become progressively common in decision-making for sustainable energy.FindingsThe results of comparing and evaluating the performance of this model show its ability to manage trust and the ability to adapt to changes in the behavior of service providers quickly. Using a simulation, all results are confirmed. The results of simulations and evaluation of the present paper indicate that the proposed model provides a more accurate evaluation of the credibility of cloud service providers than other models.Practical implicationsThe number of cloud services and customers is vast and extremely competitive in cloud environments, where novel cloud services and customers can join at any time, while others can withdraw whenever they want. Because of cloud services' highly dynamic and dispersed design, trust management mechanisms must be highly flexible to obtain feedback and update trust outcomes as quickly as possible. The model presented in this article tries to improve users' trust in the cloud industry.Originality/valueUsing a method (MCDM) to find the best trust management solution based on user experience in industrial cloud computing is the novelty of this paper.

Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mahak Sharma ◽  
Ruchita Gupta ◽  
Padmanav Acharya ◽  
Karuna Jain

PurposeCloud computing (CC) services have given a tremendous boost to the creation of efficient and effective solutions. With developing countries at a slow pace of adoption, this research aims to identify factors and their interrelationships influencing the adoption of CC in a developing country context. The developing countries are enjoying numerous benefits from CC services; however, its low adoption is still a question in developing economies; hence, the authors have selected the context of information and communication technology (ICT) firms in India.Design/methodology/approachThe qualitative research method is used where experts from thirteen ICT firms in India are interviewed.FindingsSixteen factors, twenty-eight subfactors, and 25 interrelationships are revealed through content analysis. Further, causal loop diagrams are proposed to display the behavior of cause and effect of these factors from a system's perspective. This will help to understand the relationships among the factors in order to enhance the speed of CC adoption. Possible financial loss and resistance to change are found as the key barriers to adoption. The proposed interrelationships can guide both policymakers and service providers for designing effective CC policies.Originality/valueThis is the first scholarly work that identifies interrelationships among factors and subfactors, thereby providing a holistic picture to decision-makers while making a choice on whether to adopt cloud services or continue with on premise data centers and servers.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Nishant Agrawal

PurposeSupplier Selection (SS) is one of the vital decisions frequently executed by numerous industries. In recent times, the number of suppliers has increased enormously depending on a wide range of criteria. A selection of suppliers is a sensitive process that may impact various supply chain activities. The purpose of this research is to explore an underutilized technique called PROMETHEE II method for SS.Design/methodology/approachVarious tools and techniques are available under multi-criteria decision-making tools, which sometimes creates confusion in researchers' minds regarding reliability. PROMETHEE II was the most prominent method for ranking all available alternatives that ultimately avoid decision-making errors. To execute this equal and unequal weights approach has been used with three case studies.FindingsIn this research, three case studies have been used and soved with the help of the PROMETHEE II approach. The study also provides fundamental insights into the supplier's ranking on different criteria using sensitivity analysis. Further, criteria were divided as per benefits and non-beneficial to get a robust result. The pros and cons of PROMETHEE II approaches are also highlighted compared to other MCDM tools in this study.Originality/valueMost of the SS research uses either AHP or TOPSIS as per existing literature. There are very few attempts highlighted in the literature that use PROMETHEE II for the SS problem with sensitivity analysis. The proposed method is probable to motivate decision-makers to consider using a more sophisticated method like PROMETHEE II in supplier evaluation processes. This study opens a new direction for the ranking of suppliers in the field of the supply chain. The study also bears significant practical as well as managerial implications.


2015 ◽  
Vol 28 (6) ◽  
pp. 788-807 ◽  
Author(s):  
Anabel Gutierrez ◽  
Elias Boukrami ◽  
Ranald Lumsden

Purpose – The purpose of this paper is to determine the factors influencing managers’ decision to adopt cloud computing in the UK using the “Technology-Organisation-Environment” (TOE) framework. Design/methodology/approach – Data were collected through a self-created questionnaire based survey that was completed by 257 mid-to-senior level decision-making business and information technology (IT) professionals from a range of UK end-user organisations. The derived hypotheses were tested using various data analysis techniques including principal component analysis and logistic regression. Findings – The results show that four out of the eight factors examined have a significant influence on the adoption decision of cloud computing services in the UK. Those key factors include competitive pressure, complexity, technology readiness and trading partner pressure. The latter predictor; trading partner pressure, was the most significant factor for the adoption decision of cloud services reflecting organisations’ concerns on legal regulations, co-creation and customisation, service linkage and vendor locking which adds complexity to the process of selecting an appropriate vendor. Research limitations/implications – This research found trading partners (cloud service providers) significantly influence managers’ decisions to adopt cloud services, however, further research is required to fully understand all the aspects involved especially with the growing number of vendors available. Although over 250 usable responses to the questionnaire were received and analysed, there was not a sufficient quantity of responses from each industry sector or organisation size to conduct further analysis. Practical implications – The findings reveal the important role of cloud computing service providers to enable end-users to better evaluate the use of cloud computing. It also reveals that top management support is no longer a driver as organisations are starting to adopt cloud computing services on the basis of cheaper and more agile IT resources in order to support business growth. Originality/value – This research provides original insight for cloud computing adoption within the UK from a managerial perspective.


2015 ◽  
Vol 22 (3) ◽  
pp. 465-487 ◽  
Author(s):  
Dilip Kumar Sen ◽  
Saurav Datta ◽  
Saroj Kumar Patel ◽  
Siba Sankar Mahapatra

Purpose – Robot selection is one of the critical decision-making tasks frequently performed by various industries in order to choose the best suited robot for specific industrial purposes. In recent marketplace, the number of robot manufacturers has increased remarkably offering a wide range of models and specifications; thus, robot selection has become indeed confusing as well as complicated task. Selection of an appropriate robot is a sensitive process; it may result massive letdown, if not chosen properly. Therefore, for unravel the selection problem; the purpose of this paper is to explore the preference ranking organization method for enrichment evaluation (PROMETHEE) II method. Design/methodology/approach – Apart from a large variety of robotic systems, existence of various multi-criteria decision making (MCDM) tools and techniques may create confusion to the decision makers’ in regards of application feasibility as well as superiority in performance to work under different decision-making situations. In this context, the PROMETHEE II method has been found as an efficient decision-making tool which provides complete ranking order of all available alternatives prudently, thus avoiding errors in decision making. Findings – In this context, the present paper highlights application potential of aforesaid PROMETHEE II method in relation to robot selection problem subjected to a set of quantitative (objective) evaluation data collected from the available literature resources. Advantages and disadvantages of PROMETHEE II method have also been reported in comparison to other existing MCDM approaches. Originality/value – The study bears significant managerial implications. Proper evaluation and selection of appropriate candidate robot would be helpful for the industries in order to improve product quality as well as to increase productivity. Proper utilization of resources could be ensured. Functioning would be accurate with reduced timespan. As a consequence, company can increase its profit margin in long run.


2019 ◽  
Vol 8 (4) ◽  
pp. 2647-2655

Cloud computing is a technology that promises resilient and flexible computing resources to the growing business. Along with many benefits of Cloud computing, there are various complex problems such as security and privacy of data that exists on Cloud. Trust is one of the key obstacles in the adoption of Cloud by the growing market due to absence of any reliable and efficient trust evaluation mechanism. It is difficult task for Cloud consumers to choose trustworthy provider among various service providers who provide similar type of services. There is a need to have - proper techniques/methods to establish trust; proper trust based models to evaluate the trust; and awareness of various possible attacks to know the robustness of the models. Hence this paper discusses existing state of the art trust management techniques, models and attacks, to help research community interested in designing trust based schemes in Cloud environment.


2020 ◽  
Author(s):  
Mueen Uddin ◽  
Anjum Khalique ◽  
Awais Khan Jumani

This paper reviews, discusses, and highlights some of the standard cloud computing vulnerabilities primarily related to virtualization platforms and their implementations while outsourcing services and resources to different end-users and business enterprises. Furthermore, we provide Blockchain-enabled solutions for virtualized cloud computing platform involving both the end-users as well as cloud service providers (CSP) to address and solve different security and privacy-related vulnerabilities using blockchain-enabled solutions to improve their cloud services and resource provisioning facilities.


Author(s):  
Sonal Agrawal ◽  
Pradeep Tripathi

Aims & Background: Cloud Computing (CC) has received great attention from the scholarly researchers and IT companies. CC is a standard that offers services through the Internet. The standard has been manipulated by existing skills (such as collect, peer-to-peer and grid computing) and currently accepted by approximately all major associations. Various associations like as Microsoft and Facebook have revealed momentous investments in CC and currently offer services with top levels of reliability. The well-organized and precise evaluation of cloud-based communication network is an essential step in assurance both the business constancy and the continuous open services. Objectives & Methods: To select and rank the CC service providers, we introduce an Improved Score Function (ISF) based Multi-Criteria Decision-Making (MCDM) approach. The proposed approach is developed to solve the MCDM problems with partly unknown weight. To do this, the criteria preferences are given in terms of Intuitionistic Fuzzy Sets (IFSs). Numerical example is illustrated to show the effectiveness of the proposed approach over the previous ones. Results: A decision making problem of cloud computing service provider has been considered for signifying the developed technique and finishes with the outcomes coincide with the already developed methods which confirms the solidity of the developed method. Conclusion: For future, we plan to implement the proposed technique on various decision making problems, clustering and multi-objective problems. Also, we plan to extend our method under different uncertain atmosphere by using other MCDM methods.


Electronics ◽  
2021 ◽  
Vol 10 (20) ◽  
pp. 2493
Author(s):  
Mueen Uddin ◽  
Anjum Khalique ◽  
Awais Khan Jumani ◽  
Syed Sajid Ullah ◽  
Saddam Hussain

Cloud computing is a well-known technology that provides flexible, efficient, and cost-effective IT solutions for multinationals to offer improved and enhanced quality of business services to end-users. The cloud computing paradigm is instigated from the grid and parallel computing models. It uses virtualization, server consolidation, utility computing, and other computing technologies and models for providing better IT solutions for large-scale computational data centres. It encompasses different services for supporting data storage, networking, and computing for facilities and amenities for businesses and multinational corporations. The enormous elastic on-demand cloud provisioning resources and services and datasets are processed and stored in tier-level virtualized cloud data centres operated by third-party service providers called cloud owners. The primary issue with these cloud service providers is to provide and maintain data security, privacy, and confidentiality and service availability and data support for end-users. This paper reviews, highlights, and discusses some of the common cloud computing vulnerabilities primarily related to virtualization platforms and their implementations while outsourcing services and resources to different end-users and business enterprises. We then provided blockchain-enabled solutions for virtualized cloud platforms involving both the end-users and cloud service providers (CSP) to address and solve various security and privacy-related vulnerabilities. These solutions will help the data centre industry to improve its virtualized cloud services and resource provisioning facilities. Finally, we discussed different blockchain-related implementation challenges in cloud infrastructures.


Author(s):  
Supongmen Walling

Cloud computing is a type of computing where computing services such as applications, storage, infrastructure, processing power are hosted by some vendors (cloud vendors) over the Internet and delivered to users on on-demand basis. A company can benefit from cloud computing in the sense that they can rent access to anything from applications to storage to processing power rather than owning their own IT infrastructure. By using cloud-computing services, companies can avoid the various costs and complexities associated with owning and maintaining their own IT infrastructure as everything is taken care of by the service providers. Cloud computing is a paradigm in which both the users and the service providers are benefited. Service providers are greatly benefited from cloud computing by providing cloud services to a wide range of customers. The primary objective of this paper is to give an overview on cloud computing encompassing its features, the pros and cons of cloud computing and the challenges that comes with it. Furthermore, this paper also presents a list of security concerns in cloud computing which stands in the way of wide spread adoption of cloud computing thereby motivating researchers to devise competent solutions to tackle these ongoing security issues.


Sign in / Sign up

Export Citation Format

Share Document