Abstract
This paper presents the design and comparative analysis of MCDM-based multi-dimensional trust evaluation schemes for determining trustworthiness of Cloud Service Providers (CSPs) in a cloud environment. The trustworthiness has been defined as the degree of compliance provided by a CSP to the promised QoS parameters as per the Service Level Agreement (SLA). Due to large number of CSPs offering similar kinds of services in a cloud environment, it has become a challenging task for Cloud Clients (CCs) to identify and differentiate between trustworthy and untrustworthy CSPs. We present the design and comparative analysis of three MCDM-based techniques (AHP, TOPSIS and PROMETHEE) that enable CCs to determine the trustworthiness of a CSP from different perspectives. All the three schemes enable us to assess the trustworthiness of a CSP from CC’s perspective, Cloud Auditor’s perspective, Cloud Broker’s perspective and Peers’ perspective. Experimental results show that all the techniques are effective and stable in differentiating between trustworthy and untrustworthy CSPs. The PROMETHEE technique has shown advantage over the AHP and the TOPSIS methods in the sense that it has reported less uncertainty during evaluations. The applicability and validity of the schemes have been demonstrated with the help of a case study involving the use of real cloud data.
Similar content being viewed by others
References
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Futur. Gener. Comput. Syst. 25(6), 599–616 (2009)
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
Mell, P., Grance, T.: The NIST definition of cloud computing. J. Res. Natl. Inst. Stand. Technol. 53(6), 50 (2009)
Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Privacy 6, 24–31 (2010)
Everett, C.: Cloud computing–A question of trust. Computer Fraud & Secur. 6(2009), 5–7 (2009)
Arce, I., Ghosh, A.: In Cloud Computing We Trust—But Should We? IEEE Secur. Privacy 8(6), 0014–16 (2010)
Bernstein, D., Vij, D.: Intercloud security considerations. In: 2010 IEEE Second international conference on cloud computing technology and science (CloudCom), IEEE, pp. 537–544 (2010)
Khan, M.K., Malluhi, Q.: Establishing trust in cloud computing. IT Prof. 12(5), 20–27 (2010)
Abbadi, I.M., Martin, A.: Trust in the Cloud. Inf. Secur. Tech. Rep. 16, 108–114 (2011)
Abawajy, J.: Establishing trust in hybrid cloud computing environments. In: Trust, Security and Privacy in Computing and Communications (TrustCom) 2011 IEEE 10 th International conference on, IEEE, pp. 118–125 (2011)
Garrison, G., Kim, S., Wakefield, R.L.: Success factors for deploying cloud computing. Commun. ACM 55.9, 62–68 (2012)
Habib, S.M., Hauke, S., Ries, S., Mühlhäuser, M.: Trust as a facilitator in cloud computing: a survey. J. Cloud Compt. 1.1, 1–18 (2012)
Noor, T.H., Sheng, Q.Z., Zeadally, S., Yu, J.: Trust management of services in cloud environments: Obstacles and solutions. ACM Comput. Surveys (CSUR) 46.1, 12 (2013)
Alhamad, M., Dillon, T., Chang, E.: Sla-based trust model for cloud computing. In: Network-BASED INFORMATION SYSTEMS (NBiS), 2010 13 th international conference on, IEEE, pp. 321–324 (2010)
Muchahari, M.M., Sinha, S.K.: A new trust management architecture for cloud computing environment. In: Cloud and services computing (ISCOS), 2012 international symposium on, IEEE, pp. 136–140 (2012)
Chakraborty, S., Roy, K.: An SLA-based framework for estimating trustworthiness of a cloud. In: Trust, security and privacy in computing and communications (TrustCom), 2012 IEEE 11th international conference on, IEEE, pp. 937–942 (2012)
Cuomo, A., DiModica, G., Distefano, S., Puliafito, A., Rak, M., Tomarchio, O., Venticinque, S., Villano, U.: An SLA-based broker for cloud infrastructures. J. Grid Compt. 11.1, 1–25 (2013)
Azzedin, F., Maheswaran, M., Mitra, A.: Trust brokering and its use for resource matchmaking in public-resource grids. J. Grid Compt. 4.3, 247–263 (2006)
Wu, X., Zhang, R., Zeng, B., Zhou, S.: A trust evaluation model for cloud computing. Proc. Compt. Sci. 17, 1170–1177 (2013)
Fan, W., Yang, S., Pei, J.: A novel two-stage model for cloud service trustworthiness evaluation. Expert. Syst. 31(2), 136–153 (2014)
Ding, S., Yang, S., Zhang, Y., Liang, C., Xia, C.: Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems. Knowl.-Based Syst. 56, 216–225 (2014)
Wang, C., Wang, Y., Liu, C., Wang, X.: An Audit-based Trustworthiness Verification Scheme forMonitoring the Integrity of Cloud Servers. J. Comput. Inf. Syst. 10(23), 9923–9937 (2014)
Fan, W.J., Yang, S.L., Perros, H., Pei, J.: A multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning approach. Int. J. Autom. Comput. 12.2, 208–219 (2015)
Deutsch, M.: Cooperation and trust: Some theoretical notes, Nebraska Symposium on Motivation. Nebraska University Press, Nebraska (1962)
Chakrabarti, A.: Grid Computing Security. Springer Berlin Heidelberg, Heidelberg (2007)
Grandison, T, Sloman, M.: A survey of trust in internet applications. IEEE Commun. Surv. Tutorials, IEEE 3(4), 2–16 (2000)
Grandison, T.W.: Trust management for internet applications, DoctoralDissertation, Imperial College of Science, Technology and Medicine. University of London, London (2003)
Abawajy, J.: Determining service trustworthiness in intercloud computing environments. In: Pervasive systems, algorithms, and networks (ISPAN), 2009 10th international symposium on, IEEE, pp. 784–788 (2009)
Fan, W., Perros, H.: A novel trust management framework for multi-cloud environments based on trust service providers. Knowl.-Based Syst. 70, 392–406 (2014)
Huang, J., Nicol, D. M.: Trust mechanisms for cloud computing. Journal of Cloud Computing 2.1, 1–14 (2013)
Wang, S.X., Zhang, L., Wang, S., Qiu, X.: A cloud-based trust model for evaluating quality of web services. J. Commod. Sci. Technol. Qual. 25.6, 1130–1142 (2010)
Filali, F.Z., Yagoubi, B.: A General Trust Management Framework forProvider Selection in Cloud Environment, vol. 9282, pp. 446–457. Springer International Publishing, Switzerland (2015)
Guo, Q., Sun, D., Chang, G., Sun, L., Wang, X.: Modeling and evaluation of trust in cloud computing environments In: Advanced Computer Control (ICACC), 2011 3rd International Conference on, IEEE, pp. 112–116 (2011)
Thirunarayan, K., Anantharam, P., Henson, C., Sheth, A.: Comparative trust management with applications: Bayesian approaches emphasis. Futur. Gener. Comput. Syst. 31, 182–199 (2014)
Eymann, T., König, S., Matros, R.: A framework for trust and reputation in grid environments. J. Grid Compt. 6.3, 225–237 (2008)
Chong, S.K., Abawajy, J., Ahmad, M., Hamid, I.R.A.: Enhancing Trust Management in Cloud Environment. Procedia. Soc. Behav. Sci. 129, 314–321 (2014)
Garg, S.K., Versteeg, S., Buyya, R.: A framework for ranking of cloud computing services. Futur. Gener. Comput. Syst. 29(4), 1012–1023 (2013)
Singh, S., Sidhu, J.: Compliance-based Multi-dimensional Trust Evaluation System for determining trustworthiness of Cloud Service Providers. Futur. Gener. Comput. Syst. 67, 109–132 (2017)
Sidhu, J., Singh, S.: Improved topsis method based trust evaluation framework for determining trustworthiness of cloud service providers. J. Grid Compt., 1–25 (2016)
Sidhu, J., Singh, S. : A novel cloud auditor based trust management framework for cloud computing. Int. J. Grid Util. Comput. 7(3), 219–235 (2016)
Figueira, J., Greco, S., Ehrgott, M.: Multiple criteria decision analysis: state of the art surveys, 78, Springer Science and Business Media (2005)
Hwang, C.L., Yoon, K.: Multiple attribute decision making: methods and applications: a state-of-the-art survey, Springer (1981)
Rao, R.V.: Decision making in the manufacturing environment: using graph theory and fuzzy multiple attribute decision making methods, Springer Science and Business Media (2007)
Ramanathan, R.: A note on the use of the analytic hierarchy process for environmental impact assessment. J. Environ. Manage. 63(1), 27–35 (2001)
Saaty, T.L.: Theory and applications of the analytic network process: decision making with benefits, opportunities, costs, and risks, RWS publications (2005)
Brans, J.P., Vincke, P., Mareschal, B.: How to select and how to rank projects: The PROMETHEE method. Eur. J. Oper. Res. 24(2), 228–238 (1986)
https://cloudharmony.com/reports/state-of-the-cloud-compute-report [available Feb 20, 2015]
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sidhu, J., Singh, S. Design and Comparative Analysis of MCDM-based Multi-dimensional Trust Evaluation Schemes for Determining Trustworthiness of Cloud Service Providers. J Grid Computing 15, 197–218 (2017). https://doi.org/10.1007/s10723-017-9396-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10723-017-9396-0