Skip to main content

Advertisement

Log in

Improved TOPSIS Method Based Trust Evaluation Framework for Determining Trustworthiness of Cloud Service Providers

  • Published:
Journal of Grid Computing Aims and scope Submit manuscript

Abstract

Trust is one of the most challenging issues in the emerging cloud computing era. Over the past few years, numerous cloud service providers have been emerged providing similar kinds of services. It has become incredibly complex for the cloud clients to make a distinction among multiple cloud service providers offering similar kinds of services. Cloud clients need trustworthy service providers who provide services exactly as per the SLA and do not deviate from their promises. Though, there have been significant efforts to form trust between service providers and the clients by providing data, storage and network security, but relatively fewer efforts have been made in the field of trustworthiness determination by monitoring the compliance of offered services as per the SLA. This paper presents the design of a trust evaluation framework that uses the compliance monitoring mechanism to determine the trustworthiness of service providers. The compliance values are computed and then processed using a technique known as the Improved Technique for Order of Preference by Similarity to Ideal Solution (Improved TOPSIS) to obtain trust on the service providers. Case study based approach has been followed to demonstrate the usability and the applicability of the proposed framework. Experiments have been performed using the real cloud data extracted from the Cloud Harmony reports. From the experimental results, it is clear that the proposed framework can be used in real cloud environments to determine the trustworthiness of service providers by employing the real time monitoring of their services.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Fan, W., Perros, H.: A novel trust management framework for multi-cloud environments based on trust service providers. Knowl.-Based Syst. 70, 392–406 (2014)

    Article  Google Scholar 

  2. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing—The business perspective. Decis. Support. Syst. 51(1), 176–189 (2011)

    Article  Google Scholar 

  3. Noor, T.H., Sheng, Q.Z., Zeadally, S., Yu, J.: Trust management of services in cloud environments: obstacles and solutions. ACM Comput. Surv. 46(1), 12 (2013)

    Article  Google Scholar 

  4. Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, pp. 1–10. IEEE (2008)

  5. Sotomayor, B., Montero, R.S., Llorente, I.M., Foster, I.: Virtual infrastructure management in private and hybrid clouds. IEEE Internet Comput. 13(5), 14–22 (2009)

    Article  Google Scholar 

  6. Gottfrid, D.: Self-service prorated supercomputing fun. The New York Times [online]. http://open.blogs.nytimes.com/2007/11/01/self-service-prorated-super-computing-fun/ (2007). Accessed 14 July 2014

  7. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    Article  Google Scholar 

  8. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  9. Bertino, E., Paci, F., Ferrini, R., Shang, N.: Privacy-preserving digital identity management for cloud computing. IEEE Data Eng. Bull. 32(1), 21–27 (2009)

    Google Scholar 

  10. Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE Internet Comput. 14(5), 14–22 (2010)

    Article  Google Scholar 

  11. Viega, J.: Cloud computing and the common man. Computer 42(8), 106–108 (2009)

    Article  Google Scholar 

  12. Hwang, K., Kulkareni, S., Hu, Y.: Cloud security with virtualized defense and reputation-based trust management. In: 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 717–722. IEEE (2009)

  13. Noor, T.H., Sheng, Q.Z.: Trust as a service: a framework for trust management in cloud environments. In: Web Information System Engineering (WISE), pp. 314–321. Springer, Berlin Heidelberg (2011)

    Google Scholar 

  14. Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. In: 2nd International Conference on Cloud Computing Technology and Science, pp. 693–702. IEEE (2010)

  15. Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. Journal of Cloud Computing 2 (1), 1–14 (2011)

    Google Scholar 

  16. Everett, C.: Cloud computing–A question of trust. Computer Fraud & Security 6, 5–7 (2009)

    Google Scholar 

  17. Garrison, G., Kim, S., Wakefield, R.L.: Success factors for deploying cloud computing. Commun. ACM 55(9), 62–68 (2012)

    Article  Google Scholar 

  18. Arce, I., Ghosh, A.: In cloud computing we trust—But should we? IEEE Secur. Priv. 8(6), 14–16 (2010)

    Article  Google Scholar 

  19. Habib, S.M., Hauke, S., Ries, S., Mühlhäuser, M.: Trust as a facilitator in cloud computing: a survey. Journal of Cloud Computing 1(1), 1–18 (2012)

    Article  Google Scholar 

  20. Khan, K.M., Malluhi, Q.: Establishing trust in cloud computing. IT Professional 12(5), 20–27 (2010)

    Article  Google Scholar 

  21. Michael, B., Dinolt, G.: Establishing trust in cloud computing. Cloud Computing: Silver Lining or Storm Ahead (2010)

  22. Park, J.S., Spetka, E., Rasheed, H., Ratazzi, P., Han, K.J.: Near-real-time cloud auditing for rapid response. In: 26th International Conference on Advanced Information Networking and Applications Workshops, pp. 1252–1257. IEEE (2012)

  23. Takabi, H., Joshi, J.B., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)

    Article  Google Scholar 

  24. Abawajy, J.: Establishing trust in hybrid cloud computing environments. In: 10th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, pp. 118–125 (2011)

  25. Haq, I.U., Alnemr, R., Paschke, A., Schikuta, E., Boley, H., Meinel, C.: Distributed trust management for validating sla choreographies. In: Grids and Service-Oriented Architectures for Service Level Agreements, pp. 45–55. Springer, Berlin Heidelberg New York (2010)

  26. Pawar, P.S., Rajarajan, M., Nair, S.K., Zisman, A.: Trust model for optimized cloud services. In: Trust Management VI, pp. 97–112. Springer, Berlin Heidelberg (2012)

    Chapter  Google Scholar 

  27. Hogan, M., Liu, F., Sokol, A., Tong, J.: NIST Cloud computing standards roadmap. NIST Special Publication, 35 (2011)

  28. Schiffman, J., Sun, Y., Vijayakumar, H., Jaeger, T.: Cloud verifier: verifiable auditing service for iaas clouds. In: 9th World Congress on Services (SERVICES), pp. 239–246. IEEE (2013)

  29. Garg, S.K., Versteeg, S., Buyya, R.: A framework for ranking of cloud computing services. Futur. Gener. Comput. Syst. 29(4), 1012–1023 (2013)

    Article  Google Scholar 

  30. Cuomo, A., Di Modica, G., Distefano, S., Puliafito, A., Rak, M., Tomarchio, O., Venticinque, S., Villano, U.: An SLA-based broker for cloud infrastructures. J. Grid. Comput. 11(1), 1–25 (2013)

    Article  Google Scholar 

  31. García, A.G., Blanquer, I.: Cloud services representation using SLA composition. J. Grid. Comput. 13(1), 35–51 (2015)

    Article  Google Scholar 

  32. Ding, S., Yang, S., Zhang, Y., Liang, C., Xia, C.: Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems. Knowl.-Based Syst. 56, 216–225 (2014)

    Article  Google Scholar 

  33. Wang, C., Wang, Y., Liu, C., Wang, X.: An audit-based trustworthiness verification scheme for monitoring the integrity of cloud servers. J. Comput. Inf. Syst. 10(23), 9923–9937 (2014)

    Google Scholar 

  34. Fan, W., Yang, S., Pei, J.: A novel two stage model for cloud service trustworthiness evaluation. Expert. Syst. 31(2), 136–153 (2014)

    Article  Google Scholar 

  35. Song, S., Hwang, K., Kwok, Y.K.: Trusted grid computing with security binding and trust integration. J. Grid. Comput. 3(1), 53–73 (2005)

    Article  Google Scholar 

  36. Azzedin, F., Maheswaran, M., Mitra, A.: Trust brokering and its use for resource matchmaking in public-resource grids. J. Grid. Comput. 4(3), 247–263 (2006)

    Article  MATH  Google Scholar 

  37. Tomanek, O., Kencl, L.: CLAUdit: planetary-scale cloud latency auditing platform. In: 2nd International Conference on Cloud Networking (CloudNet), pp. 138–146. IEEE (2013)

  38. Doelitzscher, F., Fischer, C., Moskal, D., Reich, C., Knahl, M., Clarke, N.: Validating cloud infrastructure changes by cloud audits. In: 8th World Congress on Services (SERVICES), pp. 377–384. IEEE (2012)

  39. Shetty, S.: Auditing and analysis of network traffic in cloud environment. In: 9th World Congress on Services (SERVICES), pp. 260–267. IEEE (2013)

  40. Liu, Q., Wang, G., Wu, J.: Consistency as a service: auditing cloud consistency. IEEE Trans. Netw. Serv. Manag. 11(1), 25–35 (2014)

    Article  Google Scholar 

  41. Gowrigolla, B., Sivaji, S., Masillamani, M.R.: Design and auditing of cloud computing security. In: 5th International Conference on Information and Automation for Sustainability (ICIAFs), pp. 292–297. IEEE (2010)

  42. Chen, J., Jiang, W., Yan, J.: Understanding the approach for auditing of cloud computing system. In: Information Technology and Computer Science (ITCS), pp. 581–583. IEEE (2010)

  43. Ravindran, K.: Qos auditing for evaluation of SLA in cloud-based distributed services. In: 9th World Congress on Services (SERVICES), pp. 247–254. IEEE (2013)

  44. Chen, Z., Yoon, J.: IT auditing to assure a secure cloud computing. In: 6th World Congress on Services (SERVICES-1), pp. 253–259. IEEE (2010)

  45. Tajuddin, M., Busi, K.C.: An enhanced dynamic auditing protocol in cloud computing. International Journal of Engineering Trends and Technology 4(7), 3173 (2013)

    Google Scholar 

  46. Figueira, J., Greco, S., Ehrgott, M.: Multiple criteria decision analysis: state of the art surveys Springer Science & Business Media, p 78 (2005)

  47. Hwang, C.L., Yoon, K.: Multiple Attribute Decision Making: Methods and Applications: a State-Of-The-Art Survey. Springer, London (1981)

    Book  MATH  Google Scholar 

  48. Rao, R.V.: Decision making in the manufacturing environment: using graph theory and fuzzy multiple attribute decision making methods. Springer Science & Business Media (2007)

  49. Ramanathan, R.: A note on the use of the analytic hierarchy process for environmental impact assessment. J. Environ. Manage. 63(1), 27–35 (2001)

    Article  Google Scholar 

  50. Saaty, T.L.: Theory and applications of the analytic network process: decision making with benefits, opportunities, costs, and risks. Publications, Pennsylvania Pittsburgh RWS (2005)

  51. Cloud Harmony Cloud Reports: Availablefrom: https://cloudharmony.com/reports/state-of-thecloud-compute-report (2014). Accessed 5 February 2015

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sarbjeet Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sidhu, J., Singh, S. Improved TOPSIS Method Based Trust Evaluation Framework for Determining Trustworthiness of Cloud Service Providers. J Grid Computing 15, 81–105 (2017). https://doi.org/10.1007/s10723-016-9363-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10723-016-9363-1

Keywords

Navigation