Skip to main content

Advertisement

Log in

Design and Comparative Analysis of MCDM-based Multi-dimensional Trust Evaluation Schemes for Determining Trustworthiness of Cloud Service Providers

  • Published:
Journal of Grid Computing Aims and scope Submit manuscript

Abstract

This paper presents the design and comparative analysis of MCDM-based multi-dimensional trust evaluation schemes for determining trustworthiness of Cloud Service Providers (CSPs) in a cloud environment. The trustworthiness has been defined as the degree of compliance provided by a CSP to the promised QoS parameters as per the Service Level Agreement (SLA). Due to large number of CSPs offering similar kinds of services in a cloud environment, it has become a challenging task for Cloud Clients (CCs) to identify and differentiate between trustworthy and untrustworthy CSPs. We present the design and comparative analysis of three MCDM-based techniques (AHP, TOPSIS and PROMETHEE) that enable CCs to determine the trustworthiness of a CSP from different perspectives. All the three schemes enable us to assess the trustworthiness of a CSP from CC’s perspective, Cloud Auditor’s perspective, Cloud Broker’s perspective and Peers’ perspective. Experimental results show that all the techniques are effective and stable in differentiating between trustworthy and untrustworthy CSPs. The PROMETHEE technique has shown advantage over the AHP and the TOPSIS methods in the sense that it has reported less uncertainty during evaluations. The applicability and validity of the schemes have been demonstrated with the help of a case study involving the use of real cloud data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Futur. Gener. Comput. Syst. 25(6), 599–616 (2009)

    Article  Google Scholar 

  2. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  3. Mell, P., Grance, T.: The NIST definition of cloud computing. J. Res. Natl. Inst. Stand. Technol. 53(6), 50 (2009)

    Google Scholar 

  4. Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Privacy 6, 24–31 (2010)

    Article  Google Scholar 

  5. Everett, C.: Cloud computing–A question of trust. Computer Fraud & Secur. 6(2009), 5–7 (2009)

    Google Scholar 

  6. Arce, I., Ghosh, A.: In Cloud Computing We Trust—But Should We? IEEE Secur. Privacy 8(6), 0014–16 (2010)

    Article  Google Scholar 

  7. Bernstein, D., Vij, D.: Intercloud security considerations. In: 2010 IEEE Second international conference on cloud computing technology and science (CloudCom), IEEE, pp. 537–544 (2010)

  8. Khan, M.K., Malluhi, Q.: Establishing trust in cloud computing. IT Prof. 12(5), 20–27 (2010)

    Article  Google Scholar 

  9. Abbadi, I.M., Martin, A.: Trust in the Cloud. Inf. Secur. Tech. Rep. 16, 108–114 (2011)

    Article  Google Scholar 

  10. Abawajy, J.: Establishing trust in hybrid cloud computing environments. In: Trust, Security and Privacy in Computing and Communications (TrustCom) 2011 IEEE 10 th International conference on, IEEE, pp. 118–125 (2011)

  11. Garrison, G., Kim, S., Wakefield, R.L.: Success factors for deploying cloud computing. Commun. ACM 55.9, 62–68 (2012)

    Article  Google Scholar 

  12. Habib, S.M., Hauke, S., Ries, S., Mühlhäuser, M.: Trust as a facilitator in cloud computing: a survey. J. Cloud Compt. 1.1, 1–18 (2012)

    Google Scholar 

  13. Noor, T.H., Sheng, Q.Z., Zeadally, S., Yu, J.: Trust management of services in cloud environments: Obstacles and solutions. ACM Comput. Surveys (CSUR) 46.1, 12 (2013)

    Google Scholar 

  14. Alhamad, M., Dillon, T., Chang, E.: Sla-based trust model for cloud computing. In: Network-BASED INFORMATION SYSTEMS (NBiS), 2010 13 th international conference on, IEEE, pp. 321–324 (2010)

  15. Muchahari, M.M., Sinha, S.K.: A new trust management architecture for cloud computing environment. In: Cloud and services computing (ISCOS), 2012 international symposium on, IEEE, pp. 136–140 (2012)

  16. Chakraborty, S., Roy, K.: An SLA-based framework for estimating trustworthiness of a cloud. In: Trust, security and privacy in computing and communications (TrustCom), 2012 IEEE 11th international conference on, IEEE, pp. 937–942 (2012)

  17. Cuomo, A., DiModica, G., Distefano, S., Puliafito, A., Rak, M., Tomarchio, O., Venticinque, S., Villano, U.: An SLA-based broker for cloud infrastructures. J. Grid Compt. 11.1, 1–25 (2013)

    Google Scholar 

  18. Azzedin, F., Maheswaran, M., Mitra, A.: Trust brokering and its use for resource matchmaking in public-resource grids. J. Grid Compt. 4.3, 247–263 (2006)

    Article  MATH  Google Scholar 

  19. Wu, X., Zhang, R., Zeng, B., Zhou, S.: A trust evaluation model for cloud computing. Proc. Compt. Sci. 17, 1170–1177 (2013)

    Article  Google Scholar 

  20. Fan, W., Yang, S., Pei, J.: A novel two-stage model for cloud service trustworthiness evaluation. Expert. Syst. 31(2), 136–153 (2014)

    Article  Google Scholar 

  21. Ding, S., Yang, S., Zhang, Y., Liang, C., Xia, C.: Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems. Knowl.-Based Syst. 56, 216–225 (2014)

    Article  Google Scholar 

  22. Wang, C., Wang, Y., Liu, C., Wang, X.: An Audit-based Trustworthiness Verification Scheme forMonitoring the Integrity of Cloud Servers. J. Comput. Inf. Syst. 10(23), 9923–9937 (2014)

    Google Scholar 

  23. Fan, W.J., Yang, S.L., Perros, H., Pei, J.: A multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning approach. Int. J. Autom. Comput. 12.2, 208–219 (2015)

    Article  Google Scholar 

  24. Deutsch, M.: Cooperation and trust: Some theoretical notes, Nebraska Symposium on Motivation. Nebraska University Press, Nebraska (1962)

    Google Scholar 

  25. Chakrabarti, A.: Grid Computing Security. Springer Berlin Heidelberg, Heidelberg (2007)

    MATH  Google Scholar 

  26. Grandison, T, Sloman, M.: A survey of trust in internet applications. IEEE Commun. Surv. Tutorials, IEEE 3(4), 2–16 (2000)

    Article  Google Scholar 

  27. Grandison, T.W.: Trust management for internet applications, DoctoralDissertation, Imperial College of Science, Technology and Medicine. University of London, London (2003)

    Google Scholar 

  28. Abawajy, J.: Determining service trustworthiness in intercloud computing environments. In: Pervasive systems, algorithms, and networks (ISPAN), 2009 10th international symposium on, IEEE, pp. 784–788 (2009)

  29. Fan, W., Perros, H.: A novel trust management framework for multi-cloud environments based on trust service providers. Knowl.-Based Syst. 70, 392–406 (2014)

    Article  Google Scholar 

  30. Huang, J., Nicol, D. M.: Trust mechanisms for cloud computing. Journal of Cloud Computing 2.1, 1–14 (2013)

    Google Scholar 

  31. Wang, S.X., Zhang, L., Wang, S., Qiu, X.: A cloud-based trust model for evaluating quality of web services. J. Commod. Sci. Technol. Qual. 25.6, 1130–1142 (2010)

    Google Scholar 

  32. Filali, F.Z., Yagoubi, B.: A General Trust Management Framework forProvider Selection in Cloud Environment, vol. 9282, pp. 446–457. Springer International Publishing, Switzerland (2015)

    Google Scholar 

  33. Guo, Q., Sun, D., Chang, G., Sun, L., Wang, X.: Modeling and evaluation of trust in cloud computing environments In: Advanced Computer Control (ICACC), 2011 3rd International Conference on, IEEE, pp. 112–116 (2011)

  34. Thirunarayan, K., Anantharam, P., Henson, C., Sheth, A.: Comparative trust management with applications: Bayesian approaches emphasis. Futur. Gener. Comput. Syst. 31, 182–199 (2014)

    Article  Google Scholar 

  35. Eymann, T., König, S., Matros, R.: A framework for trust and reputation in grid environments. J. Grid Compt. 6.3, 225–237 (2008)

    Article  Google Scholar 

  36. Chong, S.K., Abawajy, J., Ahmad, M., Hamid, I.R.A.: Enhancing Trust Management in Cloud Environment. Procedia. Soc. Behav. Sci. 129, 314–321 (2014)

    Article  Google Scholar 

  37. Garg, S.K., Versteeg, S., Buyya, R.: A framework for ranking of cloud computing services. Futur. Gener. Comput. Syst. 29(4), 1012–1023 (2013)

    Article  Google Scholar 

  38. Singh, S., Sidhu, J.: Compliance-based Multi-dimensional Trust Evaluation System for determining trustworthiness of Cloud Service Providers. Futur. Gener. Comput. Syst. 67, 109–132 (2017)

    Article  Google Scholar 

  39. Sidhu, J., Singh, S.: Improved topsis method based trust evaluation framework for determining trustworthiness of cloud service providers. J. Grid Compt., 1–25 (2016)

  40. Sidhu, J., Singh, S. : A novel cloud auditor based trust management framework for cloud computing. Int. J. Grid Util. Comput. 7(3), 219–235 (2016)

    Article  Google Scholar 

  41. Figueira, J., Greco, S., Ehrgott, M.: Multiple criteria decision analysis: state of the art surveys, 78, Springer Science and Business Media (2005)

  42. Hwang, C.L., Yoon, K.: Multiple attribute decision making: methods and applications: a state-of-the-art survey, Springer (1981)

  43. Rao, R.V.: Decision making in the manufacturing environment: using graph theory and fuzzy multiple attribute decision making methods, Springer Science and Business Media (2007)

  44. Ramanathan, R.: A note on the use of the analytic hierarchy process for environmental impact assessment. J. Environ. Manage. 63(1), 27–35 (2001)

    Article  Google Scholar 

  45. Saaty, T.L.: Theory and applications of the analytic network process: decision making with benefits, opportunities, costs, and risks, RWS publications (2005)

  46. Brans, J.P., Vincke, P., Mareschal, B.: How to select and how to rank projects: The PROMETHEE method. Eur. J. Oper. Res. 24(2), 228–238 (1986)

    Article  MathSciNet  MATH  Google Scholar 

  47. https://cloudharmony.com/reports/state-of-the-cloud-compute-report [available Feb 20, 2015]

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sarbjeet Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sidhu, J., Singh, S. Design and Comparative Analysis of MCDM-based Multi-dimensional Trust Evaluation Schemes for Determining Trustworthiness of Cloud Service Providers. J Grid Computing 15, 197–218 (2017). https://doi.org/10.1007/s10723-017-9396-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10723-017-9396-0

Keywords

Navigation