Classification and Evaluation Criteria for the Selection of Cloud Service Providers with QoS based on SLA

Author(s):  
Sarvjit Singh Bhatia ◽  
Anurag Rai ◽  
Harsimran Kaur

Cloud computing is revolutionizing the IT industry by enabling them to offer access to the infrastructure and application services on a third party basis. Due to the vast diversity in the available Cloud services, from the customer’s point of view, it has become difficult to decide whose services they should use and what are the criteria for the selection? There are two types of QoS requirements which a user can have: functional and non-functional. Some of them cannot be measured easily given the nature of the Cloud. Attributes like security and user experience are not easy to quantify. Moreover, deciding which service matches best with all functional and non functional requirements is a decision problem. The Fundamental issue to handle such a problem is Quality of Service (QoS) parameters. Many   SLA languages and frameworks have been developed as solutions; however, there is no overall classification and the criteria for these extensive works. Therefore, the aim of this research is to present a comprehensive study that how SLAs are created, managed by fulfilling the QoS in cloud computing environment.

2018 ◽  
Vol 7 (2.20) ◽  
pp. 150
Author(s):  
L Archana ◽  
K P. K. Devan ◽  
P Harikumar

Cloud Computing has already grabbed its roots in many industries. It has become a fascinating choice for small budget organizations, as On-demand resources are available on pay as you use basis. However, security of data being stored at cloud servers is still a big question for organizations in today’s digital era where information is money. Large organizations are reluctant to switch to cloud services since they have threat of their data being manipulated. Cloud service provider’s claim of providing robust security mechanism being maintained by third party, but still there are many reported incidents of security breach in cloud environment in past few years. Thus, there is need for ro-bust security mechanism to be adopted by cloud service providers in order for excelling cloud computing. Since there are n number of data’s in cloud, Storage of those data are to be placed with high rank of Significance. In Existing system, no efficient hybrid algorithms are used there by security and storage is compromised to significant ratio. We propose AES and Fully Homomorphic algorithm to encrypt the data, thereby file size get is compressed thereby increasing Data security and stack pile.  


2019 ◽  
Vol 2019 ◽  
pp. 1-8 ◽  
Author(s):  
K. V. Pradeep ◽  
V. Vijayakumar ◽  
V. Subramaniyaswamy

Cloud computing is a platform to share the data and resources used among various organizations, but the survey shows that there is always a security threat. Security is an important aspect of cloud computing. Hence, the responsibility underlines to the cloud service providers for providing security as the quality of service. However, cloud computing has many challenges in security that have not yet been addressed well. The data accessed or shared through any devices from the cloud environment are not safe because they are likely to have various attacks like Identity Access Management (IAM), hijacking an account or a service either by internal/external intruders. The cryptography places a major role to secure the data within the cloud environment. Therefore, there is a need for standard encryption/decryption mechanism to protect the data stored in the cloud, in which key is the mandatory element. Every cloud provider has its own security mechanisms to protect the key. The client cannot trust the service provider completely in spite of the fact that, at any instant, the provider has full access to both data and key. In this paper, we have proposed a new system which can prevent the exposure of the key as well as a framework for sharing a file that will ensure security (CIA) using asymmetric key and distributing it within the cloud environment using a trusted third party. We have compared RSA with ElGamal and Paillier in our proposed framework and found RSA gives a better result.


2021 ◽  
Vol 23 (11) ◽  
pp. 86-98
Author(s):  
Raziqa Masood ◽  
◽  
Q.P. Rana ◽  

Today cloud computing has been the most popular service enjoyed by people due to the easy maintenance provided by it. Cloud computing is cost-efficient and people pay according to the services they use. Many organizations are using cloud storage and the reason behind it is that the outsourcing services are provided by the cloud computing. Most of people do not trust the legality of the services provided by cloud (CSPs i.e. cloud service providers) because they are afraid of the security breach of their data. The public auditing of the data by their owners is a technique that can maintain the trust of people on cloud services. This research paper is about cloud storage services based on the distributed hash table (DHT).This is required for dynamic auditing of information as this is new two-dimensional data and Third-party Auditor (TPA) is responsible for recording the information to do dynamic auditing and the dimensional data is located at TPA. The computational costs gets reduced when the authorized information is migrated to the two dimensional data and the Cloud service provider shifts it to the TPA DHT has many structural advantages and the services can be updated efficiently. The comparison with the present system is also made and is assured that it is the security system for the cloud storage. To secure the data information by blinding it, random masking is provided as a proof for securing process. The authentication is done via hashing technique and integrity and performance checks are made with this authentication process.


2021 ◽  
Author(s):  
Mihan Hosseinnezhad ◽  
Mohammad Abdollahi Azgomi ◽  
Mohammad Reza Ebrahimi Dishabi

Abstract With the rapid adoption of cloud computing in the industry, there has been a significant challenge in managing trust between cloud service providers and service consumers. In fact, trust management in cloud computing has become very challenging given the urgent need for cloud service requesters to choose efficient, trustworthy and non-risky services. One of the most important factors that can be considered in the trust or distrust of a service by the applicant is the different quality of services related to the service. Therefore, approaches are needed to assess the trustworthiness of cloud services with respect to the values ​​of their Quality of Service (QoS). Given the uncertainty that exists for cloud services, it is more realistic to model their QoS parameters as random variables and also consider different dependencies between them. In this paper, a new trust model for cloud services is proposed using Bayesian networks. Bayesian network is a probabilistic graphical model that can be used as one of the best methods to control uncertainty. Using Bayesian network makes it possible to infer more accurate QoS values ​​will which leads to the selection of highly trustworthy services by several cloud service requesters. The results of the experiments show that the proposed trust model is highly accurate and significantly reduces the estimation error.


2020 ◽  
Vol 8 (6) ◽  
pp. 1412-1416

One of the advanced rising technology is Cloud computing. The storage of information could be a massive complication for bushed this world. the simplest associated quickest storage and retrieval of information is an economical answer for Cloud computing. The main issue in cloud computing is security. Present study developed model which helps the new user in comparing the different services provided by different Cloud Service Providers. It works on quality of service (QoS), which plays the vital role in the selection of best CSP. Before this study, many tools were developed, but they did not focus on Quality of Service (QoS). This model assists cloud customer in assessing cloud providers trustworthiness based on predefined trust attributes such as business factors, Quality of Services attributes and the 11 security control domains defined by the CSA. In this study, a mechanism is designed through which integrity of Third Party Auditor is checked with the help of access control. Security is the main concern for the development of the proposed system.


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


Author(s):  
Вячеслав Вікторович Фролов

The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, which are provided by various cloud service providers. The aim of the study of this work is to compare existing approaches that provide information security for cloud services, as well as offer a new approach based on the principle of diversity. There are many approaches that ensure their safety, using both traditional and cloud-specific. The multi-cloud approach is one of the most promising strategies for improving reliability by reserving cloud resources on the servers of various cloud service providers. It is shown that it is necessary to use diversity to ensure the reliability and safety of critical system components. The principle of diversity is to use a unique version of each resource thanks to a special combination of a cloud computing provider, the geographical location of data centers, cloud service presentation models, and cloud infrastructure deployment models. The differences between cloud providers and which combination of services are preferable to others in terms of productivity are discussed in detail. In addition, best practices for securing cloud resources are reviewed. As a result, this paper concludes that there is a problem of insufficient security and reliability of cloud computing and how to reduce threats in order to avoid a common cause failure and, as a result, loss of confidential data or system downtime using diversity of cloud services.


Author(s):  
Jayashree K ◽  
Babu R ◽  
Chithambaramani R

The Internet of Things (IoT) architecture has gained an increased amount of attention from academia as well as the industry sector as a significant methodology for the development of innovative applications and systems. Currently, the merging of this architecture with that of Cloud computing has been largely motivated by the need for various applications and infrastructures in IoT. In addition to this, the Cloud ascends as an eminent solution that would help solve various challenges that are faced by the IoT standard when varied physical devices. There are an excessive number of Cloud service providers the web along with many other services. Thus, it becomes critical to choose the provider who can be efficient, consistent, and suitable, and who can deliver the best Quality of Service (QoS). Thus, this chapter discusses QoS for cloud computing and IoT.


2018 ◽  
pp. 54-76
Author(s):  
Tabassum N. Mujawar ◽  
Ashok V. Sutagundar ◽  
Lata L. Ragha

Cloud computing is recently emerging technology, which provides a way to access computing resources over Internet on demand and pay per use basis. Cloud computing is a paradigm that enable access to shared pool of resources efficiently, which are managed by third party cloud service providers. Despite of various advantages of cloud computing security is the biggest threat. This chapter describes various security concerns in cloud computing. The clouds are subject to traditional data confidentiality, integrity, availability and various privacy issues. This chapter comprises various security issues at different levels in environment that includes infrastructure level security, data level and storage security. It also deals with the concept of Identity and Access Control mechanism.


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


Sign in / Sign up

Export Citation Format

Share Document