A Survey on Emergence of Cloud Computing Using Brokering Services
Keywords:
Multiple Cloud Computing, Trust-Aware Servicebrokering, Resource Matching, Feedback AggregationAbstract
Trust management is very crucial aspect in multiple cloud environment .To ensure this Trust-management. Our paper presents C-provider, a trust aware brokering scheme for managing efficient cloud resources (or) services. The C-provider is based on a third party brokering architecture that is proposed to act as a middleware for cloud management and service matching.Our C-provider uses a hybrid and adaptive trust model to compute the overalltrust degree of resources based on the monitored feedbackof the service resources. Also C-provider uses a minimal feedback mechanism that effectively reduces networking issue and improve system efficiency.
References
M. Singhalet al., “Collaboration in multicloud computing environments:Framework and security issues,” Computer, vol. 46, no. 2, pp. 76–84,Feb. 2013.
H. M. Fard, R. Prodan, and T. Fahringer, “A truthful dynamic workflowscheduling mechanism for commercial multicloud environments,” IEEE
Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1203–1212, Jun. 2013.
F. Paraiso, N. Haderer, P. Merle, R. Rouvoy, and L. Seinturier,“A federated multi-cloud PaaSinfrastructure,” in Proc. 5th IEEE Int.Conf. Cloud Comput. (CLOUD), Jun. 2012, pp. 392–399.
P. Jain, D. Rane, and S. Patidar, “A novel cloud bursting brokerageand aggregation (CBBA) algorithm for multi cloud environment,” inProc. 2nd Int. Conf. Adv. Comput. Commun. Technol. (ACCT), Jan. 2012,pp. 383–387.
K. M. Khan and Q. Malluhi, “Establishing trust in cloud computing,”IT Prof., vol. 12, no. 5, pp. 20–27, Sep./Oct. 2010.
K. Hwang and D. Li, “Trusted cloud computing with secure resourcesand data coloring,” IEEE Internet Comput., vol. 14, no. 5, pp. 14–22,Sep./Oct. 2010.
H. Kim, H. Lee, W. Kim, and Y. Kim, “A trust evaluation model forQoS guarantee in cloud systems,” Int. J. Grid Distrib. Comput., vol. 3,no. 1, pp. 1–10, Mar. 2010.
P. D. Manuel, S. ThamaraiSelvi, and M. I. A.-E. Barr, “Trustmanagement system for grid and cloud resources,” in Proc. 1st Int. Conf.Adv. Comput. (ICAC), Dec. 2009, pp. 176–181.
L.-Q. Tian, C. Lin, and Y. Ni, “Evaluation of user behaviortrust in cloud computing,” in Proc. Int. Conf. Comput. Appl. Syst.Modeling (ICCASM), Oct. 2010, pp. V7-576–V7-572.
X. Li and Y. Yang, “Trusted data acquisition mechanism for cloudresource scheduling based on distributed agents,” Chin. Commun., vol. 8,no. 6, pp. 108–116, 2011.
X. Li, H. Ma, F. Zhou, and X. Gui, “Service operator-aware trust schemefor resource matchmaking across multiple clouds,” IEEE Trans. ParallelDistrib. Syst., to be published, doi: 10.1109/TPDS.2014.2321750.
(2014). OPTIMIS.[Online]. Available: http://www.optimis-project.eu/
W. Fan and H. Perros, “A novel trust management frameworkfor multi-cloud environments based on trust service providers,”Knowl.-Based Syst., vol. 70, pp. 392–406, Nov. 2014.
N. Ghosh, S. K. Ghosh, and S. K. Das, “SelCSP: A framework tofacilitate selection of cloud service providers,” IEEE Trans. Cloud
Comput., vol. 3, no. 1, pp. 66–79, Jan./Mar. 2015.
A. Nagarajan and V. Varadharajan, “Dynamic trust enhanced securitymodel for trusted platform based services,” Future Generat.Comput.Syst., vol. 27, no. 5, pp. 564–573, 2011.
S. M. Habib, V. Varadharajan, and M. Muhlhauser, “A trust-awareframework for evaluating security controls of service providers in cloudmarketplaces,” in Proc. 12th IEEE Int. Conf. Trust, Secur., PrivacyComput. Commun., Jul. 2013, pp. 459–468.
T. H. Noor and Q. Z. Sheng, “Trust as a service: A framework fortrust management in cloud environments,” in Web Information System
Engineering (Lecture Notes in Computer Science), vol. 6997. Berlin,Germany: Springer-Verlag, 2011, pp. 314–321.
B. Rochwergeret al., “The RESERVOIR model and architecture foropen federated cloud computing,” IBM J. Res. Develop., vol. 53, no. 4,
pp. 535–545, 2009.
S. A. De Chaves, R. B. Uriarte, and C. B. Westphall, “Towardan architecture for monitoring private clouds,” IEEE Commun. Mag.,vol. 49, no. 12, pp. 130–137, Dec. 2011.LI et al.: C-PROVIDER: A TRUST-AWARE SERVICE BROKERING SCHEME 1415
(2014). RightScale.[Online]. Available: http://www.rightscale.com/
(2014). SpotCloud.[Online]. Available: http://www.spotcloud.com/
(2014). Aeolus. [Online]. Available: http://www.aeolusproject.org/index.html
J. Spring, “Monitoring cloud computing by layer, part 1,” IEEE SecurityPrivacy, vol. 9, no. 2, pp. 66–68, Mar./Apr. 2011.
J. L. Lucas-Simarro, R. Moreno-Vozmediano, R. S. Montero, andI. M. Llorente, “Scheduling strategies for optimal service deploymentacross multiple clouds,” Future Generat. Comput. Syst., vol. 29, no. 6,pp. 1431–1441, Aug. 2013.
K. Hwang, S. Kulkarni, and Y. Hu, “Cloud security with virtualizeddefense and reputation-based trust management,” in Proc. 8th IEEEInt. Conf. Dependable, Autonomic, Secure Comput. (DASC), Dec. 2009,pp. 717–722.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
