Robust Multi-Dimensional Trust Computing Mechanism for Cloud Computing
Keywords:Cloud Computing, Quality of Service, Trust Computing,
AbstractCloud computing has become the most promising way of purchasing computing resources over the Internet. The main advantage of cloud computing is its economic advantages over the traditional computing resource provisioning. For cloud computing to become acceptable to wider audience, it is necessary to maintain the QoS commitments specified in the service level agreement. In this paper, the authors propose robust multi-level trust computing mechanism that can be used track the performance of cloud systems using multiple QoS attributes. Tests carried out show that the proposed mechanism is more robust than the ones published in the literature.
R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, I. Brandic. Cloud computing and emerging IT platforms: Vision, hype and reality for delivering computing as the 5th utility, Future Generation Computer Systems, 25(6) (2009) 599-616.
B. Siddhisena, L. Warusawithana, M. Mendis. Next generation multitenant virtualization cloud computing platform. 13th International Conference on Advanced Communication Technology, Seoul, South Korea, (2011) 405-410.
A. A. Semnanian, J. Pham, B. Englert, X. Wu. Virtualization
technology and its impact on computer hardware architecture. 8th International Conference on New Generation Information
Technology, Las Vegas, NV, USA, (2011) 719-724.
S. Zaman, D. Grosu. Combinatorial auction-based allocation of virtual machine instances in clouds. 2nd IEEE International Conference on Cloud Computing Technology and Science, Indianapolis, IN, USA, (2010) 127-134.
B. P. Rimal, E. Choi, I. Lumb. A taxonomy and survey of cloud computing systems. 5th International Joint Conference on INC, IMS and IDC, Seoul, Korea, (2009) 44-51.
P. Patel, A. Ranabahu, A. Sheth. Service level agreement in cloud computing. ACM SIGPLAN International Conference on ObjectOriented Programming, Systems, Languages, and Applications, Orlando, FL, USA, (2009) 1-10.
L. Wu, R. Buyya. Service level agreement in utility computing systems. In V. Cardellini, E. Casalicchio, K. C. Branco, J. Estrella, F. Monaco (Eds.), Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, Information Science Reference, Hershey, PA, USA, (2012) 1-25.
M. Firdhous, O. Ghazali, S. Hassan, N. Z. Harun, A. Abas. Honey bee based trust management system for cloud computing. 3rd International Conference on Computing and Informatics (ICOCI 2011), Bandung, Indonesia, (2011) 327–332.
H. Chen, Z. Ye. Research of P2P trust based on fuzzy decision making. 12th International Conference on Computer Supported Cooperative Work in Design, Xi’an, China, (2008) 793-796.
CQ. Tian, SH. Zou, WD. Wang, SD. Cheng. A new trust model based on recommendation evidence for P2P networks. Chinese Journal of Computers, 31(2) (2008) 270-281.
H. Dai, Z. Jia, X. Dong. An entropy-based trust modeling and evaluation for wireless sensor networks. International Conference on Embedded Software and Systems, Chengdu, Sichuan, China, (2008) 27-34.
M. Firdhous, O. Ghazali, S. Hassan. A trust computing mechanism for cloud computing. 4th ITU Kaleidoscope Academic Conference, Cape Town, South Africa, (2011) 199-205.
M. Firdhous, O. Ghazali, S. Hassan. A trust computing mechanism for cloud computing with multilevel thresholding. 6th International Conference on Industrial & Information Systems (ICIIS2011), (2011) 457-461; Kandy, Sri Lanka.
M. Firdhous, O. Ghazali, S. Hassan. Hysteresis-based robust trust computing mechanism for cloud computing, IEEE Region 10 Conference (TENCON 2012), (2012) 796-801; Cebu, the Philippines.
M. Firdhous, O. Ghazali, S. Hassan. A memoryless trust computing mechanism for cloud computing. 4th International Conference on Networked Digital Technologies (NDT’2012), Dubai, (2012) 174-185.
A. S. Abari, T. White. DART: A distributed analysis of reputation and trust framework. Computational Intelligence, 28(4) (2012) 642-682.
How to Cite
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.