A Credible Cloud Service Model based on Behavior Graphs and Tripartite Decision-Making Mechanism

Author(s):  
Junfeng Tian ◽  
He Zhang

The credibility of cloud service is the key to the success of the application of cloud services. The dual servers of master server and backup server are applied to cloud services, which can improve the availability of cloud services. In the past, the failures between master server and backup server could be detected by heartbeat algorithm. Because of lacking cloud user's evaluation, the authors put forward a credible cloud service model based on behavior Graphs and tripartite decision-making mechanism. By the quantitative of cloud users' behaviors evidences, the construction of behavior Graphs and the judgment of behavior, they select the most credible cloud user. They combine the master server, the backup server and the selected credible cloud user to determine the credibility of cloud service by the tripartite decision-making mechanism. Finally, according to the result of credible judgment, the authors could decide whether it will be switched from the master server to the backup server.

2019 ◽  
pp. 903-922
Author(s):  
Junfeng Tian ◽  
He Zhang

The credibility of cloud service is the key to the success of the application of cloud services. The dual servers of master server and backup server are applied to cloud services, which can improve the availability of cloud services. In the past, the failures between master server and backup server could be detected by heartbeat algorithm. Because of lacking cloud user's evaluation, the authors put forward a credible cloud service model based on behavior Graphs and tripartite decision-making mechanism. By the quantitative of cloud users' behaviors evidences, the construction of behavior Graphs and the judgment of behavior, they select the most credible cloud user. They combine the master server, the backup server and the selected credible cloud user to determine the credibility of cloud service by the tripartite decision-making mechanism. Finally, according to the result of credible judgment, the authors could decide whether it will be switched from the master server to the backup server.


2018 ◽  
Vol 8 (1) ◽  
pp. 80-96 ◽  
Author(s):  
Sanjay P. Ahuja ◽  
Niharika Deval

Infrastructure-as-a-service is a cloud service model that allows customers to outsource computing resources such as servers and storage. This article evaluates four IaaS cloud services - Amazon EC2, Microsoft Azure, Google Compute Engine and Rackspace Cloud in a vendor-neutral approach with regards to system parameter usage including server, file I/O and network utilization. Thus, system-level benchmarking provides objective comparison of cloud providers from performance standpoint. Unixbench, Dbench and Iperf are the System-level benchmarks chosen to test the performance of server, file I/O and network respectively. In order to capture the variation in performance, the tests were performed at different times on weekdays and weekends. With each offering, the benchmarks are tested on different configurations to provide an insight to the cloud users in selection of provider followed by appropriate VM sizing according to the workload requirement. In addition to the performance evaluation, price-per-performance value of all the providers is also examined and compared.


2020 ◽  
Vol 17 (12) ◽  
pp. 5296-5306
Author(s):  
N. Keerthana ◽  
Viji Vinod ◽  
Sudhakar Sengan

Data in the Cloud, which applies to data as a cloud service provider (CSP), transmits stores, or manages it. The company will enforce the same definition of data usage while the data is resident within the enterprise and thus extend the required cryptographic security criteria to data collected, exchanged, or handled by CSP. The CSP Service Level Agreements cannot override the cryptographic access measures. When the data is transferred securely to CSP, it can be securely collected, distributed, and interpreted. Data at the rest position applies to data as it is processed internally in organized and in the unstructured ways like databases and file cabinets. The Data at the Rest example includes the use of cryptography for preserving the integrity of valuable data when processed. For cloud services, computing takes multiple forms from recording units, repositories, and many unstructured items. This paper presents a secure model for Data at rest. The TF-Sec model suggested is planned for use with Slicing, Tokenization, and Encryption. The model encrypts the given cloud data using AES 256 encryption, and then the encrypted block is sliced into the chunks of data fragments using HD-Slicer. Then it applies tokenization algorithm TKNZ to each chunk of data, applies erasure coding technique to tokens, applies the data dispersion technique to scramble encrypted data fragments, and allocates to storage nodes of the multiple CSP. In taking the above steps, this study aims to resolve the cloud security problems found and to guarantee the confidentiality of their data to cloud users due to encryption of data fragments would be of little benefit to a CSP.


2015 ◽  
pp. 1721-1731
Author(s):  
S. Srinivasan

Cloud computing is facilitated often through the open Internet, which is not designed for secure communications. From the cloud user perspective, access to the cloud through a Virtual Private Network (VPN) is a possibility, but this is not the default access method for all cloud users. Given this reality, the cloud service users must be prepared for risk management because they do not control the cloud hardware or the communication channels. Added to this uncertainty is the potential for cloud service outage for risk management planning. In this chapter, the authors discuss the various aspects of risk management from the cloud user perspective. In addition, they analyze some of the major cloud outages over the past five years that have resulted in loss of trust. This list includes the outages in Amazon Web Services, Google, Windows, and Rackspace.


Author(s):  
Ajai K. Daniel

The cloud-based computing paradigm helps organizations grow exponentially through means of employing an efficient resource management under the budgetary constraints. As an emerging field, cloud computing has a concept of amalgamation of database techniques, programming, network, and internet. The revolutionary advantages over conventional data computing, storage, and retrieval infrastructures result in an increase in the number of organizational services. Cloud services are feasible in all aspects such as cost, operation, infrastructure (software and hardware) and processing. The efficient resource management with cloud computing has great importance of higher scalability, significant energy saving, and cost reduction. Trustworthiness of the provider significantly influences the possible cloud user in his selection of cloud services. This chapter proposes a cloud service selection model (CSSM) for analyzing any cloud service in detail with multidimensional perspectives.


2020 ◽  
Author(s):  
Falak Nawaz ◽  
Naeem Khalid Janjua

Abstract The number of cloud services has dramatically increased over the past few years. Consequently, finding a service with the most suitable quality of service (QoS) criteria matching the user’s requirements is becoming a challenging task. Although various decision-making methods have been proposed to help users to find their required cloud services, some uncertainties such as dynamic QoS variations hamper the users from employing such methods. Additionally, the current approaches use either static or average QoS values for cloud service selection and do not consider dynamic QoS variations. In this paper, we overcome this drawback by developing a broker-based approach for cloud service selection. In this approach, we use recently monitored QoS values to find a timeslot weighted satisfaction score that represents how well a service satisfies the user’s QoS requirements. The timeslot weighted satisfaction score is then used in Best-Worst Method, which is a multi-criteria decision-making method, to rank the available cloud services. The proposed approach is validated using Amazon’s Elastic Compute Cloud (EC2) cloud services performance data. The results show that the proposed approach leads to the selection of more suitable cloud services and is also efficient in terms of performance compared to the existing analytic hierarchy process-based cloud service selection approaches.


2013 ◽  
Vol 427-429 ◽  
pp. 2377-2382
Author(s):  
Ying Liu ◽  
Yan Wang ◽  
Xian You Sun

Among the wide range of cloud service providers with different performance characteristics, in order to let the cloud users find cloud services which satisfy its performance preferences and specific trust levels,it needs to establish a reasonable and scientific cloud service trust evaluation system. This paper introduces a membership degree theory into trust evaluation model. First, it designs the trust evaluation system framework of cloud services, and establishes a trust evaluation model of cloud services. Next, it calculates the trust level of cloud services with the comprehensive trust cloud center of gravity evaluation method (CCGE). Finally, the experiment results show that this model can build precise trust relationship between cloud users and cloud services based on users performance demands.


2014 ◽  
Vol 631-632 ◽  
pp. 200-203
Author(s):  
Min Yao

Digital library cloud service is the development and extension of traditional digital library knowledge services under the environment of mobile cloud. Meanwhile, it’s also the new stage of knowledge services development. Based on the analysis of mobile cloud technology services model and its advantages, taking “end”, ”tube”, ”cloud” as the main line, this paper build up digital library mobile cloud knowledge services model from three aspects: knowledge collecting, knowledge processing and knowledge using. Thus, it point out the opportunities and challenges faced by mobile cloud services and present the strategies of implementing knowledge cloud services.


Author(s):  
Yasmine M. Afify ◽  
Ibrahim F. Moawad ◽  
Nagwa. L. Badr ◽  
Mohamed F. Tolba

Cloud computing is an information technology delivery model accessed over the Internet. Its adoption rate is dramatically increasing. Diverse cloud service advertisements introduce more challenges to cloud users to locate and identify required service offers. These challenges highlight the need for a consistent cloud service registry to serve as a mediator between cloud providers and users. In this chapter, state-of-the-art research work related to cloud service publication and discovery is surveyed. Based on the survey findings, a set of key limitations are emphasized. Discussion of challenges and future requirements is presented. In order to contribute to cloud services publication and discovery area, a semantic-based system for unified Software-as-a-Service (SaaS) service advertisements is proposed. Its back-end foundation is the focus on business-oriented perspective of the SaaS services and semantics. Service registration template, guided registration model, and registration system are introduced. Additionally, a semantic similarity model for services metadata matchmaking is presented.


2014 ◽  
Vol 687-691 ◽  
pp. 1704-1707
Author(s):  
Jin Yu Lv

Cloud computing is still in the stage of rapid development. So in this article the origin and concept of cloud computing will be summarized in detail, the character, basic structure of the cloud computing and its application and impact in each field will be analyzed strongly. In the cloud computing environment, the construction and service of digital library has changed greatly. The cloud storage based on digital library,the digital library infrastructure integration and construction based on cloud service, and even the library automation based on cloud computing, all of these need to research deeply in library field in the cloud computing. Besides,the changes of digital library service model based on cloud computing are also the one of the important content. In this article three kinds of service model is proposed:personalized cloud platform service model based on the needs of the users, user active push-service model and sharing cloud platform service model. Structure model is designed respectively, the working process and model of service model is explained, and their application scope is analyzed in this article.


Sign in / Sign up

Export Citation Format

Share Document