A Probabilistic Trust Model for Cloud Services Using Bayesian Networks

Author(s):  
Mihan Hosseinnezhad ◽  
Mohammad Abdollahi Azgomi ◽  
Mohammad Reza Ebrahimi Dishabi

Abstract With the rapid adoption of cloud computing in the industry, there has been a significant challenge in managing trust between cloud service providers and service consumers. In fact, trust management in cloud computing has become very challenging given the urgent need for cloud service requesters to choose efficient, trustworthy and non-risky services. One of the most important factors that can be considered in the trust or distrust of a service by the applicant is the different quality of services related to the service. Therefore, approaches are needed to assess the trustworthiness of cloud services with respect to the values ​​of their Quality of Service (QoS). Given the uncertainty that exists for cloud services, it is more realistic to model their QoS parameters as random variables and also consider different dependencies between them. In this paper, a new trust model for cloud services is proposed using Bayesian networks. Bayesian network is a probabilistic graphical model that can be used as one of the best methods to control uncertainty. Using Bayesian network makes it possible to infer more accurate QoS values ​​will which leads to the selection of highly trustworthy services by several cloud service requesters. The results of the experiments show that the proposed trust model is highly accurate and significantly reduces the estimation error.

2019 ◽  
Vol 12 (3) ◽  
pp. 27
Author(s):  
Sara Moazzezi Eftekhar ◽  
Witold Suryn

In recent years, we have witnessed a marked rise in the number of cloud service providers with each offering a plethora of cloud services with different objectives. Gaining confidence for cloud technology adoption as well as selecting a suitable cloud service provider, both require a proper evaluation of cloud service trust characteristics. Hence, the evaluation of cloud services before used by the customer is of utmost importance. In this article, we adapt the extracted trust characteristics from both system and software quality standards and cloud computing standards, for evaluating cloud services. Moreover, we derive measures for each trust characteristics to evaluate the trustworthiness of different cloud service providers, and generalize these trust measures for any type of cloud services (e.g. Software as a Service, Platform as a Service, and Infrastructure as a Service). Our work thereby demonstrates a way to apply generalized trust measures for cloud services and therefore contributes to a better understanding of cloud services to evaluate their quality characteristics. As part of our ongoing research, the results of this study will be used to develop a comprehensive cloud trust model.


2015 ◽  
Vol 28 (1) ◽  
pp. 17-37 ◽  
Author(s):  
Noel Carroll

The globalised nature of cloud computing presents us with new challenges towards the development of effective business relationships across a dynamic service ecosystem. While availing of additional service capabilities, organisations are tasked with managing unfamiliar relationships with unfamiliar cloud service providers to generate increased business value. This calls for more attention towards the concept of trust within a cloud service environment. Cloud computing presents new economic and flexible business and technological models which supports the co-creation nature of service quality and ultimately business value. This research examined various methods to assess service quality and service capability assessment. During the course of this work, the author has identified the need to revisit the concept of ‘trust' within a cloud computing context and prescribe a method to model its complexity. The objective of this paper is to argue that, while cloud computing allows organisations to avail of increased service capabilities; it challenges the concept of trust. To support this argument the author presents the Cloud Services Trust Model to explain the dynamics of trust. In doing so, it introduces a notion of a distributed relational structure in service value co-creation. The paper also draws on theoretical developments to highlight the fundamental changes in the nature of service provision and how they impact on the assessment of service value and service quality. The author supports the need for greater transparency in the move towards greater accountability in the cloud ecosystem. The paper applies social network analysis (SNA) to model the trust relationships of a cloud brokerage environment.


Author(s):  
Sarvjit Singh Bhatia ◽  
Anurag Rai ◽  
Harsimran Kaur

Cloud computing is revolutionizing the IT industry by enabling them to offer access to the infrastructure and application services on a third party basis. Due to the vast diversity in the available Cloud services, from the customer’s point of view, it has become difficult to decide whose services they should use and what are the criteria for the selection? There are two types of QoS requirements which a user can have: functional and non-functional. Some of them cannot be measured easily given the nature of the Cloud. Attributes like security and user experience are not easy to quantify. Moreover, deciding which service matches best with all functional and non functional requirements is a decision problem. The Fundamental issue to handle such a problem is Quality of Service (QoS) parameters. Many   SLA languages and frameworks have been developed as solutions; however, there is no overall classification and the criteria for these extensive works. Therefore, the aim of this research is to present a comprehensive study that how SLAs are created, managed by fulfilling the QoS in cloud computing environment.


cloud computing model has proven to be effective and popular in offering the benefits such as virtually limitless storage volume, availability and scalability. Hence the cloud environment is managed by varied trust management models. Choosing the most suitable trust management model by the user is often a difficult task. Since there is multiple cloud services offering different level of performances with same functionalities it becomes hard for the user to detect and select the apt cloud service. Csps tend to offer cloud related services to the cloud users keeping sla in consideration. Depending on sort of csp administration offered the payment by the consumer end, each transaction is being evidently distinguished. Regrettably, since qos (quality of service) is not achieved, sla is not looked upon seriously. In various situations and recommendations, administration presence doesn’t fulfill the standards and reliability is compromised. The current research paper deals with the difficulty in choosing qualitative csp (cloud service provider). The proposal is of a methodology to reveal the csps trustworthiness pertaining to a cloud scenario. The various levels listed in this mechanism or methodology being: building up of cloud cluster environment, broker creation, machine agent, feedback provider and trust validation. The mentioned system of trust management gains fewer machine agents, feedback is given by external resources, highly effective in trust computing, cpu’s of machine won’t be left idle or sluggish. It can be stated that the proposed mechanism yield to be effective and feasible as validated by the performance analysis and experimental outcomes. The outcome demonstrates the effectiveness of the approach concerning services matching. With effective use of trust model specific service can be chosen by the cloud user.


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


Author(s):  
Вячеслав Вікторович Фролов

The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, which are provided by various cloud service providers. The aim of the study of this work is to compare existing approaches that provide information security for cloud services, as well as offer a new approach based on the principle of diversity. There are many approaches that ensure their safety, using both traditional and cloud-specific. The multi-cloud approach is one of the most promising strategies for improving reliability by reserving cloud resources on the servers of various cloud service providers. It is shown that it is necessary to use diversity to ensure the reliability and safety of critical system components. The principle of diversity is to use a unique version of each resource thanks to a special combination of a cloud computing provider, the geographical location of data centers, cloud service presentation models, and cloud infrastructure deployment models. The differences between cloud providers and which combination of services are preferable to others in terms of productivity are discussed in detail. In addition, best practices for securing cloud resources are reviewed. As a result, this paper concludes that there is a problem of insufficient security and reliability of cloud computing and how to reduce threats in order to avoid a common cause failure and, as a result, loss of confidential data or system downtime using diversity of cloud services.


Author(s):  
Jayashree K ◽  
Babu R ◽  
Chithambaramani R

The Internet of Things (IoT) architecture has gained an increased amount of attention from academia as well as the industry sector as a significant methodology for the development of innovative applications and systems. Currently, the merging of this architecture with that of Cloud computing has been largely motivated by the need for various applications and infrastructures in IoT. In addition to this, the Cloud ascends as an eminent solution that would help solve various challenges that are faced by the IoT standard when varied physical devices. There are an excessive number of Cloud service providers the web along with many other services. Thus, it becomes critical to choose the provider who can be efficient, consistent, and suitable, and who can deliver the best Quality of Service (QoS). Thus, this chapter discusses QoS for cloud computing and IoT.


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


2013 ◽  
Vol 660 ◽  
pp. 196-201 ◽  
Author(s):  
Muhammad Irfan ◽  
Zhu Hong ◽  
Nueraimaiti Aimaier ◽  
Zhu Guo Li

Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.


10.29007/j2nc ◽  
2019 ◽  
Author(s):  
Kenneth Ayong ◽  
Rennie Naidoo

The adoption of cloud computing among SMEs in developing countries, particularly South Africa, is still very low. The purpose of this study is to develop a conceptual model to assess the critical factors that influences South African SMEs to adopt cloud services. This paper proposes an integrated conceptual model that incorporates critical factors from the diffusion of innovation (DOI) theory, institutional theory, transaction cost theory, organisation theory, information security theory, and trust theories. Cloud computing adoption research dominated by the DOI perspective, can benefit from further cross- fertilization with different theories to explain and predict patterns of cloud services use in the SME context. This model is expected to offer deeper insights and practical value to SME decision makers, cloud service providers, regulatory agencies and government responsible for establishing cloud computing adoption strategies for SMEs in South Africa. We intend to apply this model to survey research in future studies.


Sign in / Sign up

Export Citation Format

Share Document