A Credible Cloud Service Model based on Behavior Graphs and Tripartite Decision-Making Mechanism

Author(s):  
Junfeng Tian ◽  
He Zhang

The credibility of cloud service is the key to the success of the application of cloud services. The dual servers of master server and backup server are applied to cloud services, which can improve the availability of cloud services. In the past, the failures between master server and backup server could be detected by heartbeat algorithm. Because of lacking cloud user's evaluation, the authors put forward a credible cloud service model based on behavior Graphs and tripartite decision-making mechanism. By the quantitative of cloud users' behaviors evidences, the construction of behavior Graphs and the judgment of behavior, they select the most credible cloud user. They combine the master server, the backup server and the selected credible cloud user to determine the credibility of cloud service by the tripartite decision-making mechanism. Finally, according to the result of credible judgment, the authors could decide whether it will be switched from the master server to the backup server.

2019 ◽  
pp. 903-922
Author(s):  
Junfeng Tian ◽  
He Zhang

The credibility of cloud service is the key to the success of the application of cloud services. The dual servers of master server and backup server are applied to cloud services, which can improve the availability of cloud services. In the past, the failures between master server and backup server could be detected by heartbeat algorithm. Because of lacking cloud user's evaluation, the authors put forward a credible cloud service model based on behavior Graphs and tripartite decision-making mechanism. By the quantitative of cloud users' behaviors evidences, the construction of behavior Graphs and the judgment of behavior, they select the most credible cloud user. They combine the master server, the backup server and the selected credible cloud user to determine the credibility of cloud service by the tripartite decision-making mechanism. Finally, according to the result of credible judgment, the authors could decide whether it will be switched from the master server to the backup server.


2018 ◽  
Vol 8 (1) ◽  
pp. 80-96 ◽  
Author(s):  
Sanjay P. Ahuja ◽  
Niharika Deval

Infrastructure-as-a-service is a cloud service model that allows customers to outsource computing resources such as servers and storage. This article evaluates four IaaS cloud services - Amazon EC2, Microsoft Azure, Google Compute Engine and Rackspace Cloud in a vendor-neutral approach with regards to system parameter usage including server, file I/O and network utilization. Thus, system-level benchmarking provides objective comparison of cloud providers from performance standpoint. Unixbench, Dbench and Iperf are the System-level benchmarks chosen to test the performance of server, file I/O and network respectively. In order to capture the variation in performance, the tests were performed at different times on weekdays and weekends. With each offering, the benchmarks are tested on different configurations to provide an insight to the cloud users in selection of provider followed by appropriate VM sizing according to the workload requirement. In addition to the performance evaluation, price-per-performance value of all the providers is also examined and compared.


2020 ◽  
Vol 17 (12) ◽  
pp. 5296-5306
Author(s):  
N. Keerthana ◽  
Viji Vinod ◽  
Sudhakar Sengan

Data in the Cloud, which applies to data as a cloud service provider (CSP), transmits stores, or manages it. The company will enforce the same definition of data usage while the data is resident within the enterprise and thus extend the required cryptographic security criteria to data collected, exchanged, or handled by CSP. The CSP Service Level Agreements cannot override the cryptographic access measures. When the data is transferred securely to CSP, it can be securely collected, distributed, and interpreted. Data at the rest position applies to data as it is processed internally in organized and in the unstructured ways like databases and file cabinets. The Data at the Rest example includes the use of cryptography for preserving the integrity of valuable data when processed. For cloud services, computing takes multiple forms from recording units, repositories, and many unstructured items. This paper presents a secure model for Data at rest. The TF-Sec model suggested is planned for use with Slicing, Tokenization, and Encryption. The model encrypts the given cloud data using AES 256 encryption, and then the encrypted block is sliced into the chunks of data fragments using HD-Slicer. Then it applies tokenization algorithm TKNZ to each chunk of data, applies erasure coding technique to tokens, applies the data dispersion technique to scramble encrypted data fragments, and allocates to storage nodes of the multiple CSP. In taking the above steps, this study aims to resolve the cloud security problems found and to guarantee the confidentiality of their data to cloud users due to encryption of data fragments would be of little benefit to a CSP.


2015 ◽  
pp. 1721-1731
Author(s):  
S. Srinivasan

Cloud computing is facilitated often through the open Internet, which is not designed for secure communications. From the cloud user perspective, access to the cloud through a Virtual Private Network (VPN) is a possibility, but this is not the default access method for all cloud users. Given this reality, the cloud service users must be prepared for risk management because they do not control the cloud hardware or the communication channels. Added to this uncertainty is the potential for cloud service outage for risk management planning. In this chapter, the authors discuss the various aspects of risk management from the cloud user perspective. In addition, they analyze some of the major cloud outages over the past five years that have resulted in loss of trust. This list includes the outages in Amazon Web Services, Google, Windows, and Rackspace.


Author(s):  
Ajai K. Daniel

The cloud-based computing paradigm helps organizations grow exponentially through means of employing an efficient resource management under the budgetary constraints. As an emerging field, cloud computing has a concept of amalgamation of database techniques, programming, network, and internet. The revolutionary advantages over conventional data computing, storage, and retrieval infrastructures result in an increase in the number of organizational services. Cloud services are feasible in all aspects such as cost, operation, infrastructure (software and hardware) and processing. The efficient resource management with cloud computing has great importance of higher scalability, significant energy saving, and cost reduction. Trustworthiness of the provider significantly influences the possible cloud user in his selection of cloud services. This chapter proposes a cloud service selection model (CSSM) for analyzing any cloud service in detail with multidimensional perspectives.


2020 ◽  
Author(s):  
Falak Nawaz ◽  
Naeem Khalid Janjua

Abstract The number of cloud services has dramatically increased over the past few years. Consequently, finding a service with the most suitable quality of service (QoS) criteria matching the user’s requirements is becoming a challenging task. Although various decision-making methods have been proposed to help users to find their required cloud services, some uncertainties such as dynamic QoS variations hamper the users from employing such methods. Additionally, the current approaches use either static or average QoS values for cloud service selection and do not consider dynamic QoS variations. In this paper, we overcome this drawback by developing a broker-based approach for cloud service selection. In this approach, we use recently monitored QoS values to find a timeslot weighted satisfaction score that represents how well a service satisfies the user’s QoS requirements. The timeslot weighted satisfaction score is then used in Best-Worst Method, which is a multi-criteria decision-making method, to rank the available cloud services. The proposed approach is validated using Amazon’s Elastic Compute Cloud (EC2) cloud services performance data. The results show that the proposed approach leads to the selection of more suitable cloud services and is also efficient in terms of performance compared to the existing analytic hierarchy process-based cloud service selection approaches.


2013 ◽  
Vol 427-429 ◽  
pp. 2377-2382
Author(s):  
Ying Liu ◽  
Yan Wang ◽  
Xian You Sun

Among the wide range of cloud service providers with different performance characteristics, in order to let the cloud users find cloud services which satisfy its performance preferences and specific trust levels,it needs to establish a reasonable and scientific cloud service trust evaluation system. This paper introduces a membership degree theory into trust evaluation model. First, it designs the trust evaluation system framework of cloud services, and establishes a trust evaluation model of cloud services. Next, it calculates the trust level of cloud services with the comprehensive trust cloud center of gravity evaluation method (CCGE). Finally, the experiment results show that this model can build precise trust relationship between cloud users and cloud services based on users performance demands.


2014 ◽  
Vol 631-632 ◽  
pp. 200-203
Author(s):  
Min Yao

Digital library cloud service is the development and extension of traditional digital library knowledge services under the environment of mobile cloud. Meanwhile, it’s also the new stage of knowledge services development. Based on the analysis of mobile cloud technology services model and its advantages, taking “end”, ”tube”, ”cloud” as the main line, this paper build up digital library mobile cloud knowledge services model from three aspects: knowledge collecting, knowledge processing and knowledge using. Thus, it point out the opportunities and challenges faced by mobile cloud services and present the strategies of implementing knowledge cloud services.


2019 ◽  
Vol 8 (4) ◽  
pp. 7283-7287

On-demand cloud services must be provided to customers at any time by ways of cloud service providers due to cloud demand. It is obligatory for cloud service providers to lessen large volumes of data, thereby it can reduce costs for maintaining large storage systems.Infrastructure level performance is an important problem which directly affects the overall working of cloud computing environment. The objective of our framework is enhancing the performance of cloud infrastructure. Proposed approach demonstrates high effective in cloud performance enhancement, as it displays enhancement in both the service providers as well as for cloud users.


Sign in / Sign up

Export Citation Format

Share Document