CFP last date
22 April 2024
Reseach Article

SLA – Aware Trust Model for Cloud Service Deployment

by Shyamlal Kumawat, Deepak Tomar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 10
Year of Publication: 2014
Authors: Shyamlal Kumawat, Deepak Tomar
10.5120/15755-4369

Shyamlal Kumawat, Deepak Tomar . SLA – Aware Trust Model for Cloud Service Deployment. International Journal of Computer Applications. 90, 10 ( March 2014), 10-15. DOI=10.5120/15755-4369

@article{ 10.5120/15755-4369,
author = { Shyamlal Kumawat, Deepak Tomar },
title = { SLA – Aware Trust Model for Cloud Service Deployment },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 10 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 10-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number10/15755-4369/ },
doi = { 10.5120/15755-4369 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:11:12.642837+05:30
%A Shyamlal Kumawat
%A Deepak Tomar
%T SLA – Aware Trust Model for Cloud Service Deployment
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 10
%P 10-15
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is changing the way IT resources are utilized. Cloud computing dynamically delivers convenient, on-demand access to shared pools of software resources, platform and hardware as a service through internet. The cloud computing model—made promising by sophisticated automation, provisioning and virtualization technologies. Users want the ability to access these services including infrastructure resources, how and when they choose. To accommodate this shift in the consumption model technology has to deal with the security, compatibility and trust issues associated with delivering that convenience to application business owners, developers and users. Out of these issues, trust has attracted extensive attention in Cloud computing as a solution to enhance the security. This paper proposes a trusted computing technology through a "Service Level Agreement (SLA) - Aware Trust Model" to guarantee various Key Performance Indicators (KPIs) of cloud computing. The direct trust of cloud entities is computed on basis of the interaction evidences in past and sustained on its present performances. Various SLA parameters between consumer and provider are considered in trust computation and compliance process. The simulations are performed using CloudSim framework and experimental results show that the proposed model is effective and extensible.

References
  1. P. Mell, T. Grance, "The NIST Definition of Cloud Computing, National Institute of Standards and Technology", ver. 15, 9 July 2010.
  2. Sheikh Mahbub Habib, Sascha Hauke, Sebastian Ries and Max M¨ uhlh¨auser, "Trust as a facilitator in cloud computing: a survey", Journal of Cloud Computing: Advances, Systems and Applications, Springer 2012. http://www. journalofcloudcomputing. com/content/1/1/19.
  3. Jingwei Huang and David M Nicol, "Trust mechanisms for cloud computing", Journal of Cloud Computing: Advances, Systems and Applications, Springer Open Journal 2013, http://www. journalofcloudcomputing. com/content/2/1/9.
  4. Alhamad, M. , Dillon, T. , Chang, E. , "SLA-Based Trust Model for Cloud Computing", 13th International Conference on Network-Based Information Systems 2010.
  5. Chauhan T, Chaudhary S, Kumar V, Bhise M, "Service level agreement parameter matching in cloud computing", 978-1-4673-0127-5, World Congress on Information and Communication Technologies (WICT), IEEE 2011.
  6. Neil Robinson, Lorenzo Valeri, Jonathan Cave, Tony Starkey, Hans Graux, Sadie Creese, Paul Hopkins, "The Cloud: Understanding the Security, Privacy and Trust Challenges – Final Report", Directorate-General Information Society and Media, European Commission 2010.
  7. Shakeel Ahmad, Bashir Ahmad, Sheikh Muhammad Saqib and Rashid Muhammad Khattak, "Trust Model: Cloud's Provider and Cloud's User", International Journal of Advanced Science and Technology Vol. 44, July, 2012.
  8. Xiaonian Wua, Runlian Zhang, Bing Zeng, Shengyuan Zhou, "A trust evaluation model for cloud computing", Procedia Computer Science 17 ( 2013 ) 1170 – 1177, Information Technology and Quantitative Management (ITQM), Elsevier 2013.
  9. Paul Manuel, "A trust model of cloud computing based on Quality of Service", DOI 10. 1007/s10479-013-1380-x, Springer 2013.
  10. Emeakaroha, V. C. , Brandic, I. Maurer, M. , Breskovic, I. , "SLA-Aware Application Deployment and Resource Allocation in Clouds", Computer Software and Applications Conference Workshops (COMPSACW), 978-1-4577-0980-7, IEEE 2011.
  11. Pawar, C. S. , Wagh, R. B. , "Priority Based Dynamic Resource Allocation in Cloud Computing", 978-1-4673-4854-6, International Symposium on Cloud and Services Computing (ISCOS), IEEE 2012.
  12. Edna Dias Canedo, Rafael Timóteo de Sousa Junior, Robson de Oliveira Albuquerque and Fábio Lúcio Lopes deMendonça, "File Exchange in a Private Cloud supported by a Trust Model", 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, 978-0-7695-4810-4/12, IEEE Computer Society 2012.
  13. Saurabh Kumar Garg, Steve Versteeg, Rajkumar Buyyaa, "A framework for ranking of cloud computing services", Future Generation Computer Systems 29 (2013) 1012–1023, Elsevier 2012.
  14. Rajkumar Buyya, Rajiv Ranjan and Rodrigo N. Calheiros, "Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities", 978-1-4244-4907-1/09, IEEE 2009.
  15. Zhidong Shen, Li Li, Fei Yan, and Xiaoping Wu, "Cloud Computing System Based on Trusted Computing Platform," Intelligent Computation Technology and Automation (ICICTA), IEEE International Conference on Volume: 1, pp. 942-945. China. 2010.
  16. Zhimin Y. , Lixiang Q. , Chang L. ,Chi Y. , and Guangming W,"A collaborative trust model of firewall-through based on Cloud Computing," Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design. Shanghai, China. pp. 329-334, 14-16. 2010.
  17. Akhil Behl, Kanika Behl, "An Analysis of Cloud Computing Security Issues", 2012 World Congress on Information and Communication Technologies IEEE 2012.
  18. Xue Kai, Liu Zhao, Yang Shuguo, Research on Secure Frame of Cloud Computing, Computer & Telecommunication, 2010.
  19. D. Malcolm, "The five defining characteristics of cloud computing, http://news. zdnet. com/2100-9595_22-287001. html.
  20. Khaled M. Khan and Qutaibah Malluhi, "Establishing trust in cloud computing" IT Pro September/October 2010 Published by t h e IEEE Comp u t e r Society 1520-9202 IEEE 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security Trust Trust models Cloud Actors KPI SLA IaaS CloudSim