Trust Evaluation Factors in Cloud Computing with Open Stack

2019 ◽  
Vol 16 (12) ◽  
pp. 5073-5077
Author(s):  
Shakti Arora ◽  
Surjeet Dalal

Cloud computing can be used with three deploying models SAAS, IAAS, and PAAS. IAAS is the most adopted model used for research and innovations. On daily basis Tera bytes of data are being uploaded on the cloud. The Public cloud, Private cloud and hybrid clouds services are used by the people for hosting their applications and computations. One of the major obstacle used in selection of cloud service providers is the lack of trust on CSPs. CSPs are providing different levels of security according to the requirements of users. Proposed paper demonstrates the Trust evaluation, Trust calculation models, based on different security parameters like Turnaround time, Integrity, and reliability of data on cloud. How to select a cloud provider’s service, based on the derived parameters determines the trust value of service provider. A new dynamic trust calculation approach is proposed in this paper. Integrity, Turnaround time (TE) and reliability parameters are considered for trust evaluation. Comparative analysis of different cloud providers with real time calculations of different cloud machines are done and made a comparative analysis of the parameter, approximately 63% efficiency level is achieved while compiling the trust factor with standard cloud nodes. Open stack cloud software is used to create a cloud environment of the local machine which helps in compilation of the data at real time. Fog computing is used to calculate the results.

Author(s):  
Rajanpreet Kaur Chahal ◽  
Sarbjeet Singh

Cloud Computing is the latest rage in the world of technology. It has vast potential that can be tapped to the advantage of mankind. But there are some challenges which need to be resolved in order to fully utilise its potential. One of these challenges is trust evaluation. Since services are provided by service providers to clients, there has to be some notion of trust between them. This chapter first provides the basic introduction to cloud computing and fuzzy logic. On the basis of extensive literature survey, this chapter discusses trust and its need, in addition to use of fuzzy logic for the purpose of trust calculation in distributed environments and cloud computing till now. Trust calculation using fuzzy logic has been explained through the use of various models. At the end, the difficulties and applications of using fuzzy logic for trust evaluation are discussed along with research directions for future.


Fuzzy Systems ◽  
2017 ◽  
pp. 1314-1366
Author(s):  
Rajanpreet Kaur Chahal ◽  
Sarbjeet Singh

Cloud Computing is the latest rage in the world of technology. It has vast potential that can be tapped to the advantage of mankind. But there are some challenges which need to be resolved in order to fully utilise its potential. One of these challenges is trust evaluation. Since services are provided by service providers to clients, there has to be some notion of trust between them. This chapter first provides the basic introduction to cloud computing and fuzzy logic. On the basis of extensive literature survey, this chapter discusses trust and its need, in addition to use of fuzzy logic for the purpose of trust calculation in distributed environments and cloud computing till now. Trust calculation using fuzzy logic has been explained through the use of various models. At the end, the difficulties and applications of using fuzzy logic for trust evaluation are discussed along with research directions for future.


Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Yutong Zhou ◽  
Wei Shi ◽  
Fei Song

Mobile Fog Computing (MFC), as a crucial supplement to cloud computing, has its own special traits in many aspects. As smart mobile devices grow and vary in shapes and formats over the years, the need for real-time interactions and an easy-to-use network is imminent. In this paper, we propose a smart collaborative policy for MFC scenarios by considering the target of rural vitalization. The challenges and drawbacks of extending cloud to fog are reviewed at the beginning. Then, the analysis of policy design is presented from the perspectives of feature comparisons, urgent requirements, and possible solutions. The details of policy establishment are introduced with necessary examples. Finally, performance evaluations are provided based on simulation platforms. Validation results related to round trip time and transmission time illustrate the significant improvements of our proposal in certain ways compared to the original candidate, which enables larger deployment in impoverished areas.


2019 ◽  
pp. 1686-1711
Author(s):  
Vijay L. Hallappanavar ◽  
Mahantesh N. Birje

Cloud computing is a model for enabling everywhere, suitable, on-demand network access. There are a number of challenges to provide cloud computing services and to accomplish this, it is necessary to establish trust across the cloud, between the user and the service provider. It is becoming increasingly complex for cloud users to make distinction among service providers offering similar kinds of services. There must be some mechanisms in the hands of users to determine trustworthiness of service providers so that they can select service providers with confidence and with some degree of assurance that service provider will not behave unpredictably or maliciously. An effective trust management system helps cloud service providers and consumers reap the benefits brought about by cloud computing technologies. Hence the objective of this chapter is to describe existing mechanisms that are used to determine a trust worthiness of a cloud service, various models that are used for calculating a trust value and method to establish trust management system.


Author(s):  
Mais Haj Qasem ◽  
Alaa Abu-Srhan ◽  
Hutaf Natoureah ◽  
Esra Alzaghoul

Fog-computing is a new network architecture and computing paradigm that uses user or near-users devices (network edge) to carry out some processing tasks. Accordingly, it extends the cloud computing with more flexibility the one found in the ubiquitous networks. A smart city based on the concept of fog-computing with flexible hierarchy is proposed in this paper. The aim of the proposed design is to overcome the limitations of the previous approaches, which depends on using various network architectures, such as cloud-computing, autonomic network architecture and ubiquitous network architecture. Accordingly, the proposed approach achieves a reduction of the latency of data processing and transmission with enabled real-time applications, distribute the processing tasks over edge devices in order to reduce the cost of data processing and allow collaborative data exchange among the applications of the smart city. The design is made up of five major layers, which can be increased or merged according to the amount of data processing and transmission in each application. The involved layers are connection layer, real-time processing layer, neighborhood linking layer, main-processing layer, data server layer. A case study of a novel smart public car parking, traveling and direction advisor is implemented using IFogSim and the results showed that reduce the delay of real-time application significantly, reduce the cost and network usage compared to the cloud-computing paradigm. Moreover, the proposed approach, although, it increases the scalability and reliability of the users’ access, it does not sacrifice much time, nor cost and network usage compared to fixed fog-computing design.


2021 ◽  
Author(s):  
Md Ahsan Ullah

Cloud service broker (CSB) as an emerging technology intermediates heterogeneous multiple cloud services for both the providers and consumers. Recently, Cloud computing & mobile cloud computing applications (MCA) have gained an enormous popularity, which has led to an increasing need for the development of platform independent Middleware/CSB to support all types of cloud service consumer applications including x86*x64 based standard OS & ARM based mobile applications, web browsers, etc. Developing Platform Independent Hybrid CSB, however, is not an easy task. Developers have to deal with difficulties inherent from the different cloud controllers, cloud service providers environments, clients’ application types, network connection types (wired, wireless), GPS (Global Positioning Systems) information of cloud resources and clients’ etc. In this thesis, the proposed design of a middleware/CSB that abstracts the real-time resources of various clouds (private, public, home, Local) and stores the resources in its own Database. It will also store clients requests then analyzes the request to find the nearest available servers which is running the appropriate applications. Then the CSB will forward the destination servers information to the clients. Thesis goal is to achieve context awareness, location awareness, platform independence, portability, efficiency, and usability. Portability is achieved by following the J2ME platform specifications. The middleware has been implemented and tested on a real time Openstack cloud using by our newly designed Android Clients and platform independent Mozilla Firefox browser. The performance measurements of the middleware show that it achieves its efficiency requirements. Furthermore, the middleware’s database can be used for resource algorithm, pattern analysis, and for future requirements.


2021 ◽  
Author(s):  
Kashif Mehboob Khan ◽  
Junaid Arshad ◽  
Waheed Iqbal ◽  
Sidrah Abdullah ◽  
Hassan Zaib

AbstractCloud computing is an important technology for businesses and individual users to obtain computing resources over the Internet on-demand and flexibly. Although cloud computing has been adopted across diverse applications, the owners of time-and-performance critical applications require cloud service providers’ guarantees about their services, such as availability and response times. Service Level Agreements (SLAs) are a mechanism to communicate and enforce such guarantees typically represented as service level objectives (SLOs), and financial penalties are imposed on SLO violations. Due to delays and inaccuracies caused by manual processing, an automatic method to periodically verify SLA terms in a transparent and trustworthy manner is fundamental to effective SLA monitoring, leading to the acceptance and credibility of such service to the customers of cloud services. This paper presents a blockchain-based distributed infrastructure that leverages fundamental blockchain properties to achieve immutable and trustworthy SLA monitoring within cloud services. The paper carries out an in-depth empirical investigation for the scalability of the proposed system in order to address the challenge of transparently enforcing real-time monitoring of cloud-hosted services leveraging blockchain technology. This will enable all the stakeholders to enforce accurate execution of SLA without any imprecisions and delays by maintaining an immutable ledger publicly across blockchain network. The experimentation takes into consideration several attributes of blockchain which are critical in achieving optimum performance. The paper also investigates key characteristics of these factors and their impact to the behaviour of the system for further scaling it up under various cases for increased service utilization.


Author(s):  
Pijush Kanti Dutta Pramanik ◽  
Saurabh Pal ◽  
Aditya Brahmachari ◽  
Prasenjit Choudhury

This chapter describes how traditionally, Cloud Computing has been used for processing Internet of Things (IoT) data. This works fine for the analytical and batch processing jobs. But most of the IoT applications demand real-time response which cannot be achieved through Cloud Computing mainly because of inherent latency. Fog Computing solves this problem by offering cloud-like services at the edge of the network. The computationally powerful edge devices have enabled realising this idea. Witnessing the exponential rise of IoT applications, Fog Computing deserves an in-depth exploration. This chapter establishes the need for Fog Computing for processing IoT data. Readers will be able to gain a fair comprehension of the various aspects of Fog Computing. The benefits, challenges and applications of Fog Computing with respect to IoT have been mentioned elaboratively. An architecture for IoT data processing is presented. A thorough comparison between Cloud and Fog has been portrayed. Also, a detailed discussion has been depicted on how the IoT, Fog, and Cloud interact among them.


Sign in / Sign up

Export Citation Format

Share Document