Secure Allocation of Resources in Cloud Using Trust

Full Text (PDF, 703KB), PP.43-52

Views: 0 Downloads: 0

Author(s)

Usha Divakarla 1,* K. Chandrasekaran 1

1. Department of Computer Science and Engineering, National Institute of Technology Karnataka Surathkal, Karnataka, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.01.06

Received: 12 May 2015 / Revised: 1 Sep. 2015 / Accepted: 2 Oct. 2015 / Published: 8 Jan. 2016

Index Terms

Trust, Trust Model, Entropy, Security Issues, Family Gene Algorithm

Abstract

Cloud is the recent emerging technology in all aspects. The basic concern with the usage of this Cloud Technology is security. Security poses a major drawback with data storage, resource utilization, virtualization, etc. In the highly competitive environment the assurances are insufficient for the customers to identify the trust worthy cloud service providers. As a result all the entities in cloud and cloud computing environment should be trusted by each other and the entities that have communication should have valid trust on each other. Trust being the profound component in any network has attracted many researchers for research in various ways. The models developed so far are platform dependent and are not valid for heterogeneous platforms. An efficient model which can be ported on any platform is the current research trend in the research world. Our model is platform independent and also helps in calculating trust while migrating to another platform. The result shows that the proposed model is much more efficient in terms of computation time.

Cite This Paper

Usha Divakarla, K. Chandrasekaran, "Secure Allocation of Resources in Cloud Using Trust",International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.1,pp.43-52, 2016. DOI:10.5815/ijcnis.2016.01.06

Reference

[1]Gambetta D,G(Ed).1988. “can we trust trust?”In D.G Gambetta(Ed), Trust 213-237,NewYork:Basil Blackwell
[2]Sheikh MahbubHabib, Sebastian Ries, Max M¨uhlh¨auser, “Towards a Trust Management System for Cloud Computing”, International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11
[3]Seyyed Yasser hashemi, Parisa Sheykhi Hesarlo,” Security, Privacy and Trust Challenges in Cloud Computing and Solutions”, International Journal of Computer Network and Information Security, 2014, 8, 34-40
[4]Conner, W., Iyengar, A., Mikalsen, T., Rouvellou, I., Nahrstedt, K.: “A Trust Management Framework for Service-Oriented Environments.” In: Proc. of WWW 2009, Madrid, Spain (April 2009)
[5]Hwang, K., Li, D.: “Trusted Cloud Computing with Secure Resources and Data Coloring.” IEEE Internet Computing 14(5), 14–22 (2010)
[6]Khaled M Khan and Qutaibah Malluhi, "Establishing Trust in Cloud Computing," IT Professional, vol. 12, no. 5, pp. 20 - 27, 2010.
[7]Hiroyuki Sato, Atsushi Kanai, and Shigeaki Tanimoto, "A Cloud Trust Model in a Security Aware Cloud," in 10th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT), Seoul, South Korea, 2010, pp. 121 - 124.
[8]Wenjuan Li, Lingdi Ping, and Xuezeng Pan, "Use trust management module to achieve effective security mechanisms in cloud environment," in International Conference on Electronics and Information Engineering (ICEIE), vol. 1, Kyoto, Japan, 2010, pp. 14-19.
[9]Tie Fang Wang, Bao Sheng Ye, Yun Wen Li, and Yi Yang, "Family Gene based Cloud Trust Model," in International Conference on Educational and Network Technology (ICENT), Qinhuangdao, China, 2010, pp. 540 - 544.
[10]Tie Fang Wang, Bao Sheng Ye, Yun Wen Li, and Li Shang Zhu, "Study on Enhancing Performance of Cloud Trust Model with Family Gene Technology," in 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), vol. 9, Chengdu, China, 2010, pp. 122 - 126.
[11]Paul D Manuel, Thamarai Selve, and Mostafa Ibrahim Abd-EI Barr, "Trust management system for grid and cloudresources," in First International Conference on Advanced Computing (ICAC 2009), Chennai, India, 2009, pp. 176-181.
[12]Zhidong Shen, Li Li, Fei Yan, and Xiaoping Wu, "Cloud Computing System Based on Trusted Computing Platform," in International Conference on Intelligent Computation Technology and Automation (ICICTA), vol. 1, Changsha, China, 2010, pp. 942 - 945.
[13]Zhidong Shen and Qiang Tong, "The security of cloud computing system enabled by trusted computing technology," in 2nd International Conference on Signal Processing Systems (ICSPS), vol. 2, Dalian, China, 2010, pp. 11-15.
[14]Mohammed Alhamad, Tharam Dillon, and Elizabeth Chang, "SLA-based Trust Model for Cloud Computing," in 13th International Conference on Network-Based Information Systems, Takayama, Japan, 2010, pp. 321 - 324.
[15]Xiao Yong Li, Li Tao Zhou, Yong Shi, and Yu Guo, "A trusted computing environment model in cloud architecture," in Ninth International Conference on Machine Learning and Cybernetics (ICMLC), vol. 6, Qingdao, China, 2010, pp. 2843-2848.
[16]Zhimin Yang, Lixiang Qiao, Chang Liu, Chi Yang, and Guangming Wan, "A Collaborative Trust Model of Firewall-through based on Cloud Computing," in 14th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Shanghai, China, 2010, pp. 329 - 334.
[17]Junning Fu, Chaokun Wang, Zhiwei Yu, Jianmin Wang, and Jia Guang Sun, "A Watermark-Aware Trusted Running Environment for Software Clouds," in Fifth Annual China Grid Conference (ChinaGrid), Guangzhou, China, 2010, pp. 144 - 151.
[18]Rohit Ranchal et al., "Protection of Identity Information in Cloud Computing without Trusted Third Party," in 29th IEEE International Symposium on Reliable Distributed Systems, New Delhi, India, 2010, pp. 1060-9857.
[19]Hassan Takabi, James B.D Joshi, and Gail Joon Ahn, "Secure Cloud: Towards a Comprehensive Security Framework for Cloud Computing Environments," in 34th Annual IEEE Computer Software and Applications Conference Workshops, Seoul, South Korea, 2010, pp. 393 - 398.
[20]Shanshan Song, Kai Hwang, and Yu-Kwong Kwok. Riskresilient heuristics and genetic algorithms for security assured grid job scheduling. IEEE Trans. Computers, 55(6):703-719, 2006
[21]Fatima Zohra Filali, Belabbes Yagaubi, “Global Trust: A Trust Model for Cloud Service Selection”, International Journal of Computer Network and Information Security, 2015, 5, 41-50.
[22]Xiaodong Sun ,Guiran Chang, Fengyun Li,” A Trust Management Model to enhance security of Cloud Computing Environments”, Second International Conference on Networking and Distributed Computing,2011
[23]Hamzeh Mohammadnia, Hassan Shakeri,” HITCloud: Novel Hierarchical Model for Trust Management in Cloud Computing”, First International Congress on Technology, Communication and Knowledge (ICTCK 2014),Iran, 978-1-4799-8021-5/14, IEEE-2014.
[24]Wenjuan Fan, Harry Perros,” A Reliability-based Trust Management Mechanism for Cloud Services”, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 978-0-7695-5022-0/13, IEEE-2013.
[25]Sheikh Mahbub Habib, Sebastian Ries, Max Muhlhauser, “Towards a Trust Management System for Cloud Computing”, International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11, 978-0-7695-4600-1/11, IEEE-2011.
[26]Monoj Kumar Muchahari, Smriti Kumar Sinha, “A New Trust Management Architecture for Cloud Computing Environment”, International Symposium on Cloud and Services Computing, 978-0-7695-4931-6/12, IEEE-2012.
[27]Gansen Zhao, Haiyu Wang, Chunming Rong, Yong Tang, “Resource Pool Oriented Trust Management for Cloud Infrastructure”, International Conference on Availability, Reliability and Security, 978-0-7695-5008-4/13, IEEE-2013.
[28]Nadia Bennani, Khouloud Boukadi, Chirine Ghedira-Guegan, “A trust management solution in the context of hybrid clouds”, IEEE 23rd International WETICE Conference, 978-1-4799-4249-7/14, IEEE-2014.
[29]Marco Anisetti, Claudio A. Ardagna, Ernesto Damiani, “A Certification-Based Trust Model for Autonomic Cloud Computing Systems”, International Conference on Cloud and Autonomic Computing, 978-1-4799-5841-2/14, IEEE-2014.
[30]Mohamed Firdhous, Suhaidi Hassan , Osman Ghazali, “Hysteresis-based Robust Trust Computing Mechanism for Cloud Computing”, TENCON-2012, 978-1-4673-4823-2.
[31]Mohamed Firdhous, Osman Ghazali, Suhaidi Hassan, “A Trust Computing Mechanism for Cloud Computing with Multilevel Thresholding”, 6th International Conference on Industrial and Information Systems, ICIIS 2011, 978-1-61284-0035-4/11.
[32]Haiyu Wang, Gansen Zhao, Qi Chen,Yong Tang, “Trust Management for IaaS with Group Signature”, Fourth International Conference on Emerging Intelligent Data and Web Technologies, 978-0-7695-5044-2/13, IEEE-2013.
[33]Mohamed Firdhous, Osman Ghazali , Suhaidi Hassan, “A TRUST COMPUTING MECHANISM FOR CLOUD COMPUTING”, ITU-T Kaleidoscope Academic Conference, 978-92-61-13651-2/CFP1138-E-CDR.
[34]T M Cover and J A Thomas,’ Elements of Information Theory’, Newyork:Wiley, 1991
[35]Noraini Mohd Razali, John Geraghty, “Genetic Algorithm Performance with Different Selection Strategies in Solving TSP”, Proceedings of the World Congress on Engineering 2011 Vol II , WCE 2011.
[36]Jianhua, Li ;Xiangqian, Ding ; Sun'an, Wang ; Qing, Yu ,”Family genetic algorithms based on gene exchange and its application”, Journal of Systems Engineering and Electronics, IEEE-2006.
[37]Gowtham Bellala, “A quick Tutorial on MATLAB”, http://web.eecs.umich.edu/~aey/eecs451/matlab.pdf
[38]http://www.manjrasoft.com/aneka_architecture.html