Abstract
The survey shows that most of the potential cloud users worry about the trustworthiness problem of cloud computing service, and this problem has become one of the most important reasons to hinder development of cloud computing. Therefore, it is very necessary to measure and evaluate the trustworthy degree of cloud service provider (CSP). In consideration of lacking the trustworthiness evaluation and measurement studies for CSP, besides this, a few research results have not considered uncertainty and relevance among trustworthiness factors in the measuring process. So, this paper summarizes factors affecting cloud service trustworthiness in terms of six aspects: controllability, visualization, security, reliability, provider viability and user satisfaction, constructs the trustworthy cloud service attribute model, based on this model, proposes to use the Information Entropy and Markov Chain as the trustworthiness evaluation method to establish a model and proves the scientificity and rationality of this method, as well as verifies the feasibility through case analysis.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Abawajy J (2011) Establishing trust in hybrid cloud computing environments. In: 2011 IEEE 10th international conference on trust, security and privacy in computing and communications. IEEE Computer Society, Changsha, pp 118–125
Cachin C, Keidar I, Shraer A (2009) Trusting the cloud. ACM SIGACT News 40:1–6
Canedo ED, de Sousa Junior RT, de Oliveira Albuquerque R (2012) Trust model for reliable file exchange in cloud computing. Int J Comput Sci Inf Technol 4:1–18
Chen YR, Tian LQ, Yang Y (2011) Model and analysis of user behavior based on dynamic game theory in cloud computing. Acta Electron Sin 39:1818–1823 (in Chinese)
Chitra R (2012) Trust based interoperability security protocol for grid and cloud computing. In: 2012 third international conference on computing communication & networking technologies. IEEE Computer Society, Coimbatore, Tamilnadu, India
Choi M, Lee C (2015) Information security management as a bridge in cloud systems from private to public organizations. Sustainability 7:12032–12051
Chong SK, Abawajy J, Ahmad M, Hamid I, Rahmi A (2014) Enhancing trust management in cloud environment. Procedia Soc Behav Sci 129:314–321
Feng DG, Zhang M, Zhang Y, Xu Z (2011) Study on cloud computing security. J Softw 22:71–83 (in Chinese)
Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud computing and grid computing 360-degree compared. Grid computing environments workshop. GCE ’08, IEEE, Austin, TX, pp 1–10
Gao YL, Shen BJ, Kong HF (2012) Trust model for cloud computing based on SLA and user ratings. Comput Eng 38:28–30 (in Chinese)
Habib SM, Ries S, Muhlhauser M (2011) Towards a trust management system for cloud computing. 2011 IEEE 10th international conference on trust, security and privacy in computing and communications. IEEE Computer Society, Changsha, China, pp 933–939
Hwang K, Kulkareni S, Hu Y (2009) Cloud security with virtualized defense and reputation-based trust mangement. In: Proceedings of the 2009 eighth IEEE international conference on dependable, autonomic and secure computing. Chengdu, China, pp 717–722
Jiang R (2015) A novel risk metric for staff turnover in a software project based on information entropy. Entropy 17:2834–2852
Khalil IM, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Computers 3:1–35
Khan KM, Malluhi Q (2013) Trust in cloud services: providing more controls to clients. Computer 46:94–96
Kim M, Park SO (2013) Trust management on user behavioral patterns for a mobile cloud computing. Clust Comput 16:725–731
Kim S-H, Lee I-Y (2015) Study on user authority management for safe data protection in cloud computing environments. Symmetry 7:269–283
Li W (2014) Certification standards and evaluation methods of trusted cloud service. In: Trusted cloud service summit in 2014, China communications standards association; China academy of telecommunication research of MIIT. Beijing, China, pp 1–15 (in Chinese)
Lou YH, Wang WL (2013) The research of trusted technology under cloud environment. In: 2013 international conference on information science and cloud computing companion (ISCC-C), pp 231–235
Luo HY, Lv P, Liu LZ, Yang X (2014) Enterprises trust comprehensive evaluation based on fussy rough AHP in cloud computing. J Shandong Univ (Nat Sci) 49:111–117 (in Chinese)
Lv YX, Tian LQ, Sun SS (2013) Trust evaluation and control analysis of FANP-based user behavior in cloud computing environment. Comput Sci 40:132-135+138 (in Chinese)
Macky M, Baker T, Al-Yasiri A (2012) Security-oriented cloud computing platform for critical infrastructures. Comput Law Secur Rev 28(6):679–686
Mohammed Alhamad T, Dillon TS, Chang E (2010) SLA-based trust model for cloud computing. In: 2010 13th international conference on network-based information systems, pp 321–324
Pearson S (2013) Privacy, security and trust in cloud computing. In: Privacy and security for cloud computing. Springer, London, pp 3–42
Rong C, Nguyen ST, Jaatun MG, lightning B (2013) A survey on security challenges in cloud computing. Comput Electr Eng 39:47–54
Sarma A, Girao J (2012) Supporting trust and privacy with an identity-enabled architecture. Future Internet 4:1016–1025
Shen ZD, Tong Q (2010) The security of cloud computing system enabled by trusted computing technology. In: 2010 2nd international conference on signal processing systems (ICSPS), pp V2-11–V2-15
Sun DW, Chang GR, Sun LN, Wang XW (2011) Surveying and analyzing security, privacy and trust issues in cloud computing environments. Proc Eng 15(1):2852–2856
Syed Z, Katie C, Christopher G (2014) A trusted third-party (TTP) based encryption scheme for ensuring data confidentiality in cloud environment. Procedia Comput Sci 36:381–386
Tian LQ (2011) Safety credible analysis and control of network users behavior. Tsinghua University Press, Beijing (in Chinese)
Wang L, Huang MX (2013) Research on trust evaluation of supplier based on gray AHP in cloud computing. Appl Res Comput 30:742-744+750 (in Chinese)
Wu XN, Zhang RL, Zeng B, Zhou SY (2013) A trust evaluation model for cloud computing. Procedia Comput Sci 17:1170–1177
Xiong LZ, Xu ZQ, Gu X (2014) Trusted secure model for data services in cloud computing. J Commun 35:127-137+144 (in Chinese)
Yang C, Li XY, Ling MQ (2012) A trusted cloud service platform architecture. In: 2012 international conference on information science and applications (ICISA), pp 1–6
Zhang YJ (2013) Software trust evaluation model study based on Markov. Hebei University, Hebei (in Chinese)
Zhao XY, Yang Y, Sun LL, Zhang JL (2013) Trust model research for cloud service focused on user experience. J Chin Comput Syst 34:450–452 (in Chinese)
Zhao PT, Han Z, He YZ (2013) SLA-based dynamic trust evaluation for cloud computing. J Beijing Jiaotong Univ 37:80–87 (in Chinese)
Zhou Q, Yu J (2011) Defense system model based on trust for cloud computing. J Comput Appl 31:1531–1535
Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583–592
Zou DQ, Zhang WR, Qiang WZ, Xiang GF, Yang TR, Jin H, Hu K (2013) Design and implementation of a trusted monitoring framework for cloud platforms. Future Gener Comput Syst 29:2092–2102
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant Nos. 61263022, 61303234, 61379032 and 71362016), National Social Science Foundation of China (Grant No. 12XTQ012), Science and Technology Innovation Talents Program of Yunnan Province(Grant No. 2015HB038), and the 7th Yunnan University graduate research and innovation project (Grant No. ynuy201426), Science Foundation of Education Department of Yunnan Province (Grant No. 2015J005). The authors would like to thank the anonymous reviewers and the editors for their suggestions.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Additional information
Communicated by Rong Jiang.
Rights and permissions
About this article
Cite this article
Ma, Z., Jiang, R., Yang, M. et al. Research on the measurement and evaluation of trusted cloud service. Soft Comput 22, 1247–1262 (2018). https://doi.org/10.1007/s00500-016-2412-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-016-2412-7