A Survey on Emergence of Cloud Computing Using Brokering Services

Authors

  • B Mahesh kumar Department of Computer Science and Engineering, Anna University ,Chennai, India
  • V Savitha Department of Computer Science and Engineering, Anna University ,Chennai, India

Keywords:

Multiple Cloud Computing, Trust-Aware Servicebrokering, Resource Matching, Feedback Aggregation

Abstract

Trust management is very crucial aspect in multiple cloud environment .To ensure this Trust-management. Our paper presents C-provider, a trust aware brokering scheme for managing efficient cloud resources (or) services. The C-provider is based on a third party brokering architecture that is proposed to act as a middleware for cloud management and service matching.Our C-provider uses a hybrid and adaptive trust model to compute the overalltrust degree of resources based on the monitored feedbackof the service resources. Also C-provider uses a minimal feedback mechanism that effectively reduces networking issue and improve system efficiency.

References

M. Singhalet al., “Collaboration in multicloud computing environments:Framework and security issues,” Computer, vol. 46, no. 2, pp. 76–84,Feb. 2013.

H. M. Fard, R. Prodan, and T. Fahringer, “A truthful dynamic workflowscheduling mechanism for commercial multicloud environments,” IEEE

Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1203–1212, Jun. 2013.

F. Paraiso, N. Haderer, P. Merle, R. Rouvoy, and L. Seinturier,“A federated multi-cloud PaaSinfrastructure,” in Proc. 5th IEEE Int.Conf. Cloud Comput. (CLOUD), Jun. 2012, pp. 392–399.

P. Jain, D. Rane, and S. Patidar, “A novel cloud bursting brokerageand aggregation (CBBA) algorithm for multi cloud environment,” inProc. 2nd Int. Conf. Adv. Comput. Commun. Technol. (ACCT), Jan. 2012,pp. 383–387.

K. M. Khan and Q. Malluhi, “Establishing trust in cloud computing,”IT Prof., vol. 12, no. 5, pp. 20–27, Sep./Oct. 2010.

K. Hwang and D. Li, “Trusted cloud computing with secure resourcesand data coloring,” IEEE Internet Comput., vol. 14, no. 5, pp. 14–22,Sep./Oct. 2010.

H. Kim, H. Lee, W. Kim, and Y. Kim, “A trust evaluation model forQoS guarantee in cloud systems,” Int. J. Grid Distrib. Comput., vol. 3,no. 1, pp. 1–10, Mar. 2010.

P. D. Manuel, S. ThamaraiSelvi, and M. I. A.-E. Barr, “Trustmanagement system for grid and cloud resources,” in Proc. 1st Int. Conf.Adv. Comput. (ICAC), Dec. 2009, pp. 176–181.

L.-Q. Tian, C. Lin, and Y. Ni, “Evaluation of user behaviortrust in cloud computing,” in Proc. Int. Conf. Comput. Appl. Syst.Modeling (ICCASM), Oct. 2010, pp. V7-576–V7-572.

X. Li and Y. Yang, “Trusted data acquisition mechanism for cloudresource scheduling based on distributed agents,” Chin. Commun., vol. 8,no. 6, pp. 108–116, 2011.

X. Li, H. Ma, F. Zhou, and X. Gui, “Service operator-aware trust schemefor resource matchmaking across multiple clouds,” IEEE Trans. ParallelDistrib. Syst., to be published, doi: 10.1109/TPDS.2014.2321750.

(2014). OPTIMIS.[Online]. Available: http://www.optimis-project.eu/

W. Fan and H. Perros, “A novel trust management frameworkfor multi-cloud environments based on trust service providers,”Knowl.-Based Syst., vol. 70, pp. 392–406, Nov. 2014.

N. Ghosh, S. K. Ghosh, and S. K. Das, “SelCSP: A framework tofacilitate selection of cloud service providers,” IEEE Trans. Cloud

Comput., vol. 3, no. 1, pp. 66–79, Jan./Mar. 2015.

A. Nagarajan and V. Varadharajan, “Dynamic trust enhanced securitymodel for trusted platform based services,” Future Generat.Comput.Syst., vol. 27, no. 5, pp. 564–573, 2011.

S. M. Habib, V. Varadharajan, and M. Muhlhauser, “A trust-awareframework for evaluating security controls of service providers in cloudmarketplaces,” in Proc. 12th IEEE Int. Conf. Trust, Secur., PrivacyComput. Commun., Jul. 2013, pp. 459–468.

T. H. Noor and Q. Z. Sheng, “Trust as a service: A framework fortrust management in cloud environments,” in Web Information System

Engineering (Lecture Notes in Computer Science), vol. 6997. Berlin,Germany: Springer-Verlag, 2011, pp. 314–321.

B. Rochwergeret al., “The RESERVOIR model and architecture foropen federated cloud computing,” IBM J. Res. Develop., vol. 53, no. 4,

pp. 535–545, 2009.

S. A. De Chaves, R. B. Uriarte, and C. B. Westphall, “Towardan architecture for monitoring private clouds,” IEEE Commun. Mag.,vol. 49, no. 12, pp. 130–137, Dec. 2011.LI et al.: C-PROVIDER: A TRUST-AWARE SERVICE BROKERING SCHEME 1415

(2014). RightScale.[Online]. Available: http://www.rightscale.com/

(2014). SpotCloud.[Online]. Available: http://www.spotcloud.com/

(2014). Aeolus. [Online]. Available: http://www.aeolusproject.org/index.html

J. Spring, “Monitoring cloud computing by layer, part 1,” IEEE SecurityPrivacy, vol. 9, no. 2, pp. 66–68, Mar./Apr. 2011.

J. L. Lucas-Simarro, R. Moreno-Vozmediano, R. S. Montero, andI. M. Llorente, “Scheduling strategies for optimal service deploymentacross multiple clouds,” Future Generat. Comput. Syst., vol. 29, no. 6,pp. 1431–1441, Aug. 2013.

K. Hwang, S. Kulkarni, and Y. Hu, “Cloud security with virtualizeddefense and reputation-based trust management,” in Proc. 8th IEEEInt. Conf. Dependable, Autonomic, Secure Comput. (DASC), Dec. 2009,pp. 717–722.

Downloads

Published

2025-11-11

How to Cite

[1]
B. Mahesh kumar and V. Savitha, “A Survey on Emergence of Cloud Computing Using Brokering Services”, Int. J. Comp. Sci. Eng., vol. 4, no. 2, pp. 85–91, Nov. 2025.