An Adaptive Double-Quality-Guaranteed (DQG) Scheme based Quality of Service (QOS) in Heterogeneous Cloud Environment
Keywords:
Cloud Computing, Trust Model, Reliability, Availability, Quality of ServiceAbstract
In later years, the popularity of cloud registering innovation is widely grown also, most associations want to use this innovation in their business processes. But on the other hand, the use of this innovation is not easy also, numerous associations are concerned about storing their sensitive data in their data focuses instead of storing them in the cloud capacity centers. In the cloud registering environment, trust, as an arrangement to upgrade the security, has attracted the consideration of researchers. Trust is one of the most imperative ways to improve the dependability of cloud registering assets given in the cloud environment also, has an imperative role in the business environments. Trusting the client to select the suitable source helps in heterogeneous cloud infrastructure. In this paper, we present the trust model based on models of suitable administration quality also, speed of usage for cloud resources. Reproduction results appear that the proposed model compared with comparative models, in expansion to taking into account measures of the quality of service, chooses the most solid source in a cloud environment by taking into account the speed of things.
References
Wei Ou; Xiaofeng Wang; Wenbao Han; Yongjun Wang, “Research on Trust Evaluation Model Based on TPM”, 2009 Fourth International Conference on Frontier of Computer Science and Technology, Year: 2009, Pages: 593 – 597.
Junshe Wang; Xiaolong Li; Yun Zhang, “Research of P2P Network Trust Model”, Intelligent Human-Machine Systems and Cybernetics (IHMSC), 2013 5th International Conference on, Year: 2013, Volume: 1, Pages: 70 – 73.
Wenzhong Yang; Cuanhe Huang; Bo Wang; Tong Wang; Zhenyu Zhang, “A General Trust Model Based on Trust Algebra”, 2009 International Conference on Multimedia Information Networking and Security, Year: 2009, Volume: 1, Pages: 125 – 129.
Hou Liping; Shi Lei” Research on Trust Model of PKI, “Intelligent Computation Technology and Automation (ICICTA), 2011 International Conference on, Year: 2011, Volume: 1, Pages: 232 – 235.
Suhuan Sun; Changwei Zhao; Zhiyong Zhang, “A matrix factorization based trust factors model”, Information and Automation, 2015 IEEE International Conference on, Year: 2015,Pages: 803 – 808.
D. W. Chadwick; A. J. Young; N. K. Cicovic, “Merging and extending the PGP and PEM trust models-the ICE-TEL trustmodel”, IEEE Network, Year: 1997, Volume: 11, Issue: 3,Pages: 16 – 24.
Guangjie Han; Jinfang Jiang; Lei Shu; Mohsen Guizani, “An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network”, IEEE Transactions on Mobile Computing,Year: 2015, Volume: 14, Issue: 12,Pages: 2447 – 2459.
Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011.
S.Ranjitha and D. Prabakar and S. Karthik, "A Study on Security issues in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-03, Issue-09, Page No (50-53), Sep -2015, E-ISSN: 2347-2693
Yanli Yu; Keqiu Li; Yong Zhang; Lianpeng Xu, “A Service Trust Model with Passive Trust”, Network and Parallel Computing, 2008. NPC 2008. IFIP International Conference on, Year: 2008, Pages: 218 – 225.
Wei Ou; Xiaofeng Wang; Wenbao Han; Yongjun Wang, “Research on Trust Evaluation Model Based on TPM”, 2009 Fourth International Conference on Frontier of Computer Science and Technology, Year: 2009, Pages: 593 – 597.
Junshe Wang; Xiaolong Li; Yun Zhang, “Research of P2P Network Trust Model”, Research of P2P Network Trust Model, Intelligent Human-Machine Systems and Cybernetics (IHMSC), 2013 5th International Conference on, Year: 2013, Volume: 1,Pages: 70 – 73.
Wenzhong Yang; Cuanhe Huang; Bo Wang; Tong Wang; Zhenyu Zhang, “A General Trust Model Based on Trust Algebra”, 2009 International Conference on Multimedia Information Networking and Security, Year: 2009, Volume: 1,Pages: 125 – 129.
Hou Liping; Shi Lei, “Research on Trust Model of PKI”, Research on Trust Model of PKI”, Intelligent Computation Technology and Automation (ICICTA), 2011 International Conference on, Year: 2011, Volume: 1, Pages: 232 – 235.
Suhuan Sun; Changwei Zhao; Zhiyong Zhang, “A matrix factorization based trust factors model”, Information and Automation, 2015 IEEE International Conference on, Year: 2015, Pages: 803 – 808.
D. W. Chadwick; A. J. Young; N. K. Cicovic, “Merging and extending the PGP and PEM trust models-the ICE-TEL trustmodel”, IEEE Network, Year: 1997, Volume: 11, Issue: 3, Pages: 16 – 24.
Madhavi S. Kukade and Kapil N. Hande, "Analysis of Uniform Distribution of Storage Nodes in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-02, Issue-01, Page No (43-47), Jan -2014, E-ISSN: 2347-2693
Guangwei Zhang; Jianchu Kang; Rui He, “Towards a trust model with uncertainty for e-commerce systems”, IEEE International Conference on e-Business Engineering (ICEBE'05), Year: 2005, Pages: 200 – 207.
Er. Satish Kumar, "A Study of Wireless Sensor Networks- A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-03, Page No (23-27), Mar -2016, E-ISSN: 2347-2693
A. Hemalatha and D. Sasirekha, "A Survey on Energy Efficient Routing Protocols in WSN", International Journal of Computer Sciences and Engineering, Volume-04, Issue-03, Page No (77-81), Mar -2016, E-ISSN: 2347-2693
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
