A Trust Evaluation Method for Cloud Service with Fluctuant QoS and Flexible SLA

Author(s):  
Lianyong Qi ◽  
Wanchun Dou ◽  
Jiancheng Ni ◽  
Xiaona Xia ◽  
Chunmei Ma ◽  
...  
2020 ◽  
Vol 12 ◽  
pp. 184797901989744 ◽  
Author(s):  
Panjun Sun

Recently, more and more network fraud incidents have damaged the interests of cloud service traders. To enhance mutual trust and win–win cooperation between the users and the cloud service provider, in the article, we construct a trust access control model for cloud services. First, we propose a trust evaluation method based on direct trust, trust risk, feedback trust, reward penalty, and obligation trust to express the complexity and uncertainty of trust relationship. Second, we propose trust evaluation and weight algorithm of trust factor by information entropy and maximum dispersion; therefore, our model has a better scientific and higher practical application value. Finally, we design related comparative experiments of three models to verify the efficiency, success rate, accuracy of trust evaluation, and privacy disclosure date, and these results show that our research performance is quite superior.


2013 ◽  
Vol 427-429 ◽  
pp. 2377-2382
Author(s):  
Ying Liu ◽  
Yan Wang ◽  
Xian You Sun

Among the wide range of cloud service providers with different performance characteristics, in order to let the cloud users find cloud services which satisfy its performance preferences and specific trust levels,it needs to establish a reasonable and scientific cloud service trust evaluation system. This paper introduces a membership degree theory into trust evaluation model. First, it designs the trust evaluation system framework of cloud services, and establishes a trust evaluation model of cloud services. Next, it calculates the trust level of cloud services with the comprehensive trust cloud center of gravity evaluation method (CCGE). Finally, the experiment results show that this model can build precise trust relationship between cloud users and cloud services based on users performance demands.


Kybernetes ◽  
2015 ◽  
Vol 44 (1) ◽  
pp. 7-24 ◽  
Author(s):  
Ying Huo ◽  
Yi Zhuang ◽  
Siru Ni

Purpose – The purpose of this paper is to define an evaluation model for cloud services to deal with the fuzzy information and propose a novel fuzzy evaluation method based on consistency intensity to analyze the quantitative value from the fuzzy information. Design/methodology/approach – The cloud service evaluation framework is constructed, and different trusted indicators for the infrastructure services and the application services are designed, respectively. In the novel fuzzy evaluation method, the interval values can be aggregated by the Dempster-Shafer Theory and be transformed into the certain value by linguistic discount factor. The consistency intensity is proposed to determine the value of the linguistic discount factor, which can reflect the mainstream opinions in the assessment. Findings – The proposed method can solve the problem on the analysis and synthesis of the fuzzy evaluation information. An instance of trust evaluation of cloud storage service is illustrated to verify that the proposed method can express the opinions of all evaluators more adequately. Practical implications – A serial of experiments are carried out on NetLogo, and the results show that the proposed method is practical and efficient. Originality/value – Instead of obtaining only the qualitative results by the multi-attribute decision-making method, the fuzzy evaluation method based on consistency intensity can obtain the quantitative results from the fuzzy information according to linguistic discount factor and consistency intensity.


Author(s):  
Jin Han ◽  
Jing Zhan ◽  
Xiaoqing Xia ◽  
Xue Fan

Background: Currently, Cloud Service Provider (CSP) or third party usually proposes principles and methods for cloud security risk evaluation, while cloud users have no choice but accept them. However, since cloud users and cloud service providers have conflicts of interests, cloud users may not trust the results of security evaluation performed by the CSP. Also, different cloud users may have different security risk preferences, which makes it difficult for third party to consider all users' needs during evaluation. In addition, current security evaluation indexes for cloud are too impractical to test (e.g., indexes like interoperability, transparency, portability are not easy to be evaluated). Methods: To solve the above problems, this paper proposes a practical cloud security risk evaluation method of decision-making based on conflicting roles by using the Analytic Hierarchy Process (AHP) with Aggregation of Individual priorities (AIP). Results: Not only can our method bring forward a new index system based on risk source for cloud security and corresponding practical testing methods, but also can obtain the evaluation result with the risk preferences of conflicting roles, namely CSP and cloud users, which can lay a foundation for improving mutual trusts between the CSP and cloud users. The experiments show that the method can effectively assess the security risk of cloud platforms and in the case where the number of clouds increased by 100% and 200%, the evaluation time using our methodology increased by only by 12% and 30%. Conclusion: Our method can achieve consistent decision based on conflicting roles, high scalability and practicability for cloud security risk evaluation.


IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 65066-65077
Author(s):  
Wei Ma ◽  
Xing Wang ◽  
Mingsheng Hu ◽  
Qinglei Zhou

Sign in / Sign up

Export Citation Format

Share Document