Skip to main content
Log in

Research on the measurement and evaluation of trusted cloud service

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

The survey shows that most of the potential cloud users worry about the trustworthiness problem of cloud computing service, and this problem has become one of the most important reasons to hinder development of cloud computing. Therefore, it is very necessary to measure and evaluate the trustworthy degree of cloud service provider (CSP). In consideration of lacking the trustworthiness evaluation and measurement studies for CSP, besides this, a few research results have not considered uncertainty and relevance among trustworthiness factors in the measuring process. So, this paper summarizes factors affecting cloud service trustworthiness in terms of six aspects: controllability, visualization, security, reliability, provider viability and user satisfaction, constructs the trustworthy cloud service attribute model, based on this model, proposes to use the Information Entropy and Markov Chain as the trustworthiness evaluation method to establish a model and proves the scientificity and rationality of this method, as well as verifies the feasibility through case analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Abawajy J (2011) Establishing trust in hybrid cloud computing environments. In: 2011 IEEE 10th international conference on trust, security and privacy in computing and communications. IEEE Computer Society, Changsha, pp 118–125

  • Cachin C, Keidar I, Shraer A (2009) Trusting the cloud. ACM SIGACT News 40:1–6

    Article  Google Scholar 

  • Canedo ED, de Sousa Junior RT, de Oliveira Albuquerque R (2012) Trust model for reliable file exchange in cloud computing. Int J Comput Sci Inf Technol 4:1–18

    Google Scholar 

  • Chen YR, Tian LQ, Yang Y (2011) Model and analysis of user behavior based on dynamic game theory in cloud computing. Acta Electron Sin 39:1818–1823 (in Chinese)

    Google Scholar 

  • Chitra R (2012) Trust based interoperability security protocol for grid and cloud computing. In: 2012 third international conference on computing communication & networking technologies. IEEE Computer Society, Coimbatore, Tamilnadu, India

  • Choi M, Lee C (2015) Information security management as a bridge in cloud systems from private to public organizations. Sustainability 7:12032–12051

    Article  Google Scholar 

  • Chong SK, Abawajy J, Ahmad M, Hamid I, Rahmi A (2014) Enhancing trust management in cloud environment. Procedia Soc Behav Sci 129:314–321

    Article  Google Scholar 

  • Feng DG, Zhang M, Zhang Y, Xu Z (2011) Study on cloud computing security. J Softw 22:71–83 (in Chinese)

    Article  Google Scholar 

  • Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud computing and grid computing 360-degree compared. Grid computing environments workshop. GCE ’08, IEEE, Austin, TX, pp 1–10

  • Gao YL, Shen BJ, Kong HF (2012) Trust model for cloud computing based on SLA and user ratings. Comput Eng 38:28–30 (in Chinese)

    Google Scholar 

  • Habib SM, Ries S, Muhlhauser M (2011) Towards a trust management system for cloud computing. 2011 IEEE 10th international conference on trust, security and privacy in computing and communications. IEEE Computer Society, Changsha, China, pp 933–939

  • Hwang K, Kulkareni S, Hu Y (2009) Cloud security with virtualized defense and reputation-based trust mangement. In: Proceedings of the 2009 eighth IEEE international conference on dependable, autonomic and secure computing. Chengdu, China, pp 717–722

  • Jiang R (2015) A novel risk metric for staff turnover in a software project based on information entropy. Entropy 17:2834–2852

    Article  Google Scholar 

  • Khalil IM, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Computers 3:1–35

    Article  Google Scholar 

  • Khan KM, Malluhi Q (2013) Trust in cloud services: providing more controls to clients. Computer 46:94–96

    Article  Google Scholar 

  • Kim M, Park SO (2013) Trust management on user behavioral patterns for a mobile cloud computing. Clust Comput 16:725–731

    Article  Google Scholar 

  • Kim S-H, Lee I-Y (2015) Study on user authority management for safe data protection in cloud computing environments. Symmetry 7:269–283

    Article  Google Scholar 

  • Li W (2014) Certification standards and evaluation methods of trusted cloud service. In: Trusted cloud service summit in 2014, China communications standards association; China academy of telecommunication research of MIIT. Beijing, China, pp 1–15 (in Chinese)

  • Lou YH, Wang WL (2013) The research of trusted technology under cloud environment. In: 2013 international conference on information science and cloud computing companion (ISCC-C), pp 231–235

  • Luo HY, Lv P, Liu LZ, Yang X (2014) Enterprises trust comprehensive evaluation based on fussy rough AHP in cloud computing. J Shandong Univ (Nat Sci) 49:111–117 (in Chinese)

    MathSciNet  Google Scholar 

  • Lv YX, Tian LQ, Sun SS (2013) Trust evaluation and control analysis of FANP-based user behavior in cloud computing environment. Comput Sci 40:132-135+138 (in Chinese)

    Google Scholar 

  • Macky M, Baker T, Al-Yasiri A (2012) Security-oriented cloud computing platform for critical infrastructures. Comput Law Secur Rev 28(6):679–686

    Article  Google Scholar 

  • Mohammed Alhamad T, Dillon TS, Chang E (2010) SLA-based trust model for cloud computing. In: 2010 13th international conference on network-based information systems, pp 321–324

  • Pearson S (2013) Privacy, security and trust in cloud computing. In: Privacy and security for cloud computing. Springer, London, pp 3–42

  • Rong C, Nguyen ST, Jaatun MG, lightning B (2013) A survey on security challenges in cloud computing. Comput Electr Eng 39:47–54

    Article  Google Scholar 

  • Sarma A, Girao J (2012) Supporting trust and privacy with an identity-enabled architecture. Future Internet 4:1016–1025

    Article  Google Scholar 

  • Shen ZD, Tong Q (2010) The security of cloud computing system enabled by trusted computing technology. In: 2010 2nd international conference on signal processing systems (ICSPS), pp V2-11–V2-15

  • Sun DW, Chang GR, Sun LN, Wang XW (2011) Surveying and analyzing security, privacy and trust issues in cloud computing environments. Proc Eng 15(1):2852–2856

    Article  Google Scholar 

  • Syed Z, Katie C, Christopher G (2014) A trusted third-party (TTP) based encryption scheme for ensuring data confidentiality in cloud environment. Procedia Comput Sci 36:381–386

    Article  Google Scholar 

  • Tian LQ (2011) Safety credible analysis and control of network users behavior. Tsinghua University Press, Beijing (in Chinese)

    Google Scholar 

  • Wang L, Huang MX (2013) Research on trust evaluation of supplier based on gray AHP in cloud computing. Appl Res Comput 30:742-744+750 (in Chinese)

  • Wu XN, Zhang RL, Zeng B, Zhou SY (2013) A trust evaluation model for cloud computing. Procedia Comput Sci 17:1170–1177

  • Xiong LZ, Xu ZQ, Gu X (2014) Trusted secure model for data services in cloud computing. J Commun 35:127-137+144 (in Chinese)

    Google Scholar 

  • Yang C, Li XY, Ling MQ (2012) A trusted cloud service platform architecture. In: 2012 international conference on information science and applications (ICISA), pp 1–6

  • Zhang YJ (2013) Software trust evaluation model study based on Markov. Hebei University, Hebei (in Chinese)

    Google Scholar 

  • Zhao XY, Yang Y, Sun LL, Zhang JL (2013) Trust model research for cloud service focused on user experience. J Chin Comput Syst 34:450–452 (in Chinese)

    Google Scholar 

  • Zhao PT, Han Z, He YZ (2013) SLA-based dynamic trust evaluation for cloud computing. J Beijing Jiaotong Univ 37:80–87 (in Chinese)

    Google Scholar 

  • Zhou Q, Yu J (2011) Defense system model based on trust for cloud computing. J Comput Appl 31:1531–1535

    Google Scholar 

  • Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583–592

    Article  Google Scholar 

  • Zou DQ, Zhang WR, Qiang WZ, Xiang GF, Yang TR, Jin H, Hu K (2013) Design and implementation of a trusted monitoring framework for cloud platforms. Future Gener Comput Syst 29:2092–2102

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61263022, 61303234, 61379032 and 71362016), National Social Science Foundation of China (Grant No. 12XTQ012), Science and Technology Innovation Talents Program of Yunnan Province(Grant No. 2015HB038), and the 7th Yunnan University graduate research and innovation project (Grant No. ynuy201426), Science Foundation of Education Department of Yunnan Province (Grant No. 2015J005). The authors would like to thank the anonymous reviewers and the editors for their suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rong Jiang.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Communicated by Rong Jiang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ma, Z., Jiang, R., Yang, M. et al. Research on the measurement and evaluation of trusted cloud service. Soft Comput 22, 1247–1262 (2018). https://doi.org/10.1007/s00500-016-2412-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-016-2412-7

Keywords

Navigation