Multi-Cloud Computing A Framework of Service Operator-Aware Trust Scheme for Resource Matchmaking SANTHOSH BODDUPALLI 1, VAMSHEEDHAR KANCHAN 2

Similar documents
A Survey on Emergence of Cloud Computing Using Brokering Services

COMBINE DIFFERENT TRUST MANAGEMENT TECHNIQUE: RECOMMENDATIONAND REPUTATION IN CLOUD SERVICE. B.Brithi #1, K. Kiruthikadevi *2

A Survey Paper: Cloud Computing and Virtual Machine Migration

Efficient Cloud Management for Parallel Data Processing In Private Cloud

A Broker Based Trust Model for Cloud Computing Environment

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

EFFICIENCY INFORMATION BROKING SYSTEM SERVICE FOR COORDINATE ROUTING IN CLOUD

Infrastructure as a Service (IaaS)

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 7, JULY 2015

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

Near Sheltered and Loyal storage Space Navigating in Cloud

2 Prof, Dept of CSE, Institute of Aeronautical Engineering, Hyderabad, Andhrapradesh, India,

A Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service

Cloud Based E-Government: Benefits and Challenges

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

Figure 1. The cloud scales: Amazon EC2 growth [2].

Grid Computing Vs. Cloud Computing

AEIJST - June Vol 3 - Issue 6 ISSN Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Game Theory Modal Based On Cloud Computing For Public Cloud

Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture

Exploring Resource Provisioning Cost Models in Cloud Computing

Performance Gathering and Implementing Portability on Cloud Storage Data

EFFICIENT JOB SCHEDULING OF VIRTUAL MACHINES IN CLOUD COMPUTING

Mobile Storage and Search Engine of Information Oriented to Food Cloud

A Game Theoretic Approach for Cloud Computing Infrastructure to Improve the Performance

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

A Study on Service Oriented Network Virtualization convergence of Cloud Computing

Cloud Computing Security Issues And Methods to Overcome

Key Research Challenges in Cloud Computing

Improving Performance and Reliability Using New Load Balancing Strategy with Large Public Cloud

Cloud deployment model and cost analysis in Multicloud

ISSN Vol.04,Issue.19, June-2015, Pages:

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Cloud Data Protection for the Masses

Effective Third Party Auditing in Cloud Computing

Migration of Virtual Machines for Better Performance in Cloud Computing Environment

Effective Load Balancing Based on Cloud Partitioning for the Public Cloud

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM

Multi-dimensional Affinity Aware VM Placement Algorithm in Cloud Computing

IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization

IMPLEMENTATION OF NOVEL MODEL FOR ASSURING OF CLOUD DATA STABILITY

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing

Optimal Service Pricing for a Cloud Cache

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Public Cloud Partition Balancing and the Game Theory

A Novel Switch Mechanism for Load Balancing in Public Cloud

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University

How To Understand Cloud Computing

Improving data integrity on cloud storage services

An Open MPI-based Cloud Computing Service Architecture

Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud

Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction

Resource Selection in Collaborative Cloud Computing Based on User Preference

Optimized Offloading Services in Cloud Computing Infrastructure

Energetic Resource Allocation Framework Using Virtualization in Cloud

A Comparative Study of cloud and mcloud Computing

Public Auditing for Shared Data in the Cloud by Using AES

Privacy Preserving Public Auditing for Data in Cloud Storage

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

Efficient Service Broker Policy For Large-Scale Cloud Environments

Proof of Retrivability: A Third Party Auditor Using Cloud Computing

A SURVEY ON MAPREDUCE IN CLOUD COMPUTING

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing

Virtualization Technology using Virtual Machines for Cloud Computing

Selective dependable storage services for providing security in cloud computing

CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT

Putchong Uthayopas, Kasetsart University

DESIGN OF AGENT BASED SYSTEM FOR MONITORING AND CONTROLLING SLA IN CLOUD ENVIRONMENT

A Cloud Service Measure Index Framework to Evaluate Efficient Candidate with Ranked Technology

Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop

Cloud Computing Architecture: A Survey

Role of Cloud Computing in Education

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

A Survey on Cloud Computing

Advanced Load Balancing Mechanism on Mixed Batch and Transactional Workloads

Power Consumption Based Cloud Scheduler

Optimized Resource Allocation in Cloud Environment Based on a Broker Cloud Service Provider

Research on Trust Management Strategies in Cloud Computing Environment

Dynamic resource management for energy saving in the cloud computing environment

Multi Tenancy Access Control Using Cloud Service in MVC

Elasticity in Multitenant Databases Through Virtual Tenants

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing

A Novel Approach for Efficient Load Balancing in Cloud Computing Environment by Using Partitioning

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract

The Load Balancing Strategy to Improve the Efficiency in the Public Cloud Environment

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

LOAD BALANCING IN CLOUD COMPUTING USING PARTITIONING METHOD

Trust Model for Hybrid Security Architecture Based on Reputation for Secure Execution of Mobile Agents

Optimal Multi Server Using Time Based Cost Calculation in Cloud Computing

Private Cloud in Educational Institutions: An Implementation using UEC

A Trust Evaluation Model for QoS Guarantee in Cloud Systems *

Logical Data Models for Cloud Computing Architectures

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

Cloud/SaaS enablement of existing applications

An Enhanced Automated, Distributed, SLA for. Dynamic Infrastructure Management in Real. Cloud Environment Using SEQ-BP(R)M.

Fundamental Concepts and Models

Transcription:

ISSN 2348 2370 Vol.07,Issue.10, August-2015, Pages:1851-1855 www.ijatir.org Multi-Cloud Computing A Framework of Service Operator-Aware Trust Scheme for Resource Matchmaking SANTHOSH BODDUPALLI 1, VAMSHEEDHAR KANCHAN 2 Abstract: Multi-cloud is the concomitant use of more than two services to minimize risk of widespread data loss or downtime due to a localized component failure in a cloud computing such a failure can occur in hardware software infrastructure. A multi-cloud strategy improve overall enterprise performance by avoiding vendor lock-in using different infrastructure to meet needs of customers. Clouds might handle large numbers of requests per unit time requiring small data transfers on the average but a different cloud might perform better for smaller numbers of requests per unit time involving large data transfers on the average. Matchmaking a resource across service operator trust scheme for multiple clouds, trust management that can effectively reduce user burden and improve system dependability on multi-dimensional resource service operators. Trust evaluation as a process of multi-attribute decision making and develop and adaptive trust evaluation information entropy can overcome the limitation of traditional trust schemes trusted operators are weighted manually. Our compare analysis yields interesting observation that can facilitate the utilization of service operator trust in large multi-cloud environment. Keywords: Multi-Cloud, Service Operator, Resource Matchmaking, Reliability. I. INTRODUCTION Cloud computing is a trust, cloud service is a trustworthy of paramount concern for enterprises and users, the most sensitive data send the users to cloud service centers, which is based on the trust relationship established between users and service providers. A lack of trust between cloud users and providers will seriously handle the universal acceptance of clouds as outsourced computing services. A trust-aware brokering framework for multicloud environments, cloud brokers can provide intermediation and aggregation capabilities to enable providers to deploy their virtual infrastructures across multiple clouds. The future of cloud computing will be permeated with the emergence of cloud brokers acting as intermediaries between cloud providers and users to negotiate and allocate resources among multiple data centers. An integrated based comparison provides a number of innovative platforms have been developed for cloud brokers, such as RESERVOIR, PCMONS, RightScale and SpotCloud for more information on these brokers, to increase the adoption of cloud services, a cloud broker should establish and provide trust management capacity to alleviate the worries of their users. Trust model based on dynamic service factors of a cloud resource from a user s perspective, trust is a comprehensive index for service guarantee and there are several trust factors in a system, i.e., security, availability, and reliability. As observed that trust is beyond security, and an expanded trust model should incorporate security, reliability, and availability factors and other factors if possible into a trust vector. This data can be imported from existing models to form a comprehensive trust model. This highlights the fact that the level of trust in service resources should be objectively evaluated by dynamic service operators. However, Lance et al. did not cover trust in detail, omitting numerous key issues of trust management and computing. To the best of our knowledge, most current studies either ignore service-related operators in trust evaluation or use a unilateral context to model the trust relationship. For example, they only considered the security of services, without other trust factors. The authors only considered service operators of reliability and completely ignored dynamic operators of services major limitation of current studies is that their schemes may lead to inaccurate trust evaluation outcomes, some schemes lack adaptability with a trust fusion calculation based on multidimensional service operators. Avoiding the effect of individual favouritism on weight allocation, and confirming the weight allocation of multi-operators adaptively are very important in trust fusion calculation. In reality, some previous schemes are based on expert opinion to weight trust factors however this approach lacks adaptability and may lead to inaccurate results in trust evaluation. In a recent work the trustworthiness of a cloud resource is defined as Gi = wrcrci + wrurui + wt Ti + wssi, where Gi is the trustworthiness of a resource i; Rci, Rui, Ti, and Si reliability operators of a resource; and wrc, wru, wt, and ws are the weights for these operators. Although the model is a multi-operator-based evaluation scheme, it uses a manual approach to assign values to wrc, wru, wt, and ws they were all set to 0.25. Thus, this scheme lacks the adaptability to weight these reliabilityrelated service operators. 1.2 Our Contributions Inspired by the idea of an expanded trust evaluation approach in [12], in service operator-aware trust scheme (SOTS), we define trust as a quantified belief by a Copyright @ 2015 IJATIR. All rights reserved.

cloud broker with respect to the security, availability, and reliability of a resource within several specified time windows. This definition belongs to an approach based on Trusted Third Party (TTP) [6]. The broker acts as the TTP, which is composed of many registered resources. The key innovations of SOTS go beyond those of existing schemes in terms of the following aspects: 1) A systematic trust management scheme for multi-cloud environments, based on multi-dimensional resource service operators. SOTS evaluates the trust of a cloud resource in contrast to traditional trust schemes that always focus on unilateral trust factors of service resources. It incorporates multiple factors into a trust vector to form an expanded trust scheme to evaluate a resource. This trust scheme is more consistent with the essential attributes of a trust relationship, thus, it is more in line with the expectations of cloud users, an adaptive fused computing approach for dynamic service operators, based on information entropy theory. II. RELATED WORK Trust in the cloud system from the users perspective from a cloud scheme contain data that can be imported from existing models to form a comprehensive trust model for a multiple cloud environment. Users expectations, with respect to their data in terms of security and privacy. So far, many innovative trust schemes for cloud computing have been proposed by researchers, and three main classes can be identified as follows: Reputations-based schemes. Hwang et al. suggested using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between providers and data owners. Data coloring and software watermarking techniques protect shared data objects as well as massively distributed software modules. However, the authors only focused on reputation-based trust issues; they did not mention the trust problem at server level. Self-assessment schemes. Kim et al. presented a trust evaluation model to allocate cloud resources based on providers self-assessment. Their trust model collects and analyzes reliability based on the historical server information in a cloud data center. Although the model in is a multiple attribute scheme, the authors completely ignored the real-time situation in trust relationships, which may lead to an in complete trust decision-making outcome. In Li et al. presented a trusted data acquisition mechanism for scheduling cloud resources and satisfying various user requests. Using their trust mechanism, cloud providers can efficiently utilize their resources, as well as provide highly trustworthy resources and services to users. However, due to a lack of transparency, these self-assessment schemes do not completely eliminate users trust concerns. TTP-based schemes. Habib et al. proposed a multi-attribute trust system for a cloud marketplace. This system provides means for identifying cloud providers in terms of different attributes e.g., security, performance, compliance that are assessed by multiple sources of trust information. However, measuring these trust attributes without giving details. Although there are some similar works available in SANTHOSH BODDUPALLI, VAMSHEEDHAR KANCHAN literatures, e.g., which discussed the multiple-attribute issues of trust, little detail has been provided. III. PROBLEM DEFINITION The user request for the service to the broker with the policies so that client needs the specific services for production usability, reliability and security to the consumers, provider provides the various services through the broker so that the broker with trust worthy for the service operator and to the consumer. The Broker on viewing the request and services from the consumer and provider, matches and sends the messages and mail to the user with id and password so that files and documents can be shared and stored in the cloud. The messages send to the user with password and security key for the services can be utilised for the user convenience and broker after serving the request or responding the request, the service status has to update whether it is processed or it is pending. A. Trust Aware System The trustworthiness of a resource is evaluated by the broker according to multiple service operators with respect to the security availability and reliability of this resource within several specified time windows. The conceptual model of the trust aware resource match making depends on the cloud broker acts as TTP for users evaluate each resource performance during particular time configuring services dynamically and distributing tasks efficiently. Whenever a new resource wants to offer its services it must join the service network on the client side a user looking for service must send a query together with his polices to the trusted broker. The trust evaluation broker will select a suitable resource by applying a matching alogirthm. Whenever a service resource matches the cloud broker distribute the users task to the resource through its manager. The TTP based approach is that users must trust third-party broker decide to consult actual cases these broking systems are often managed by larger ISPs with good reputation so the services from these ISPs should have a higher dependability, all resources have unique identities such as IP address each cloud manager can register its resources through these unique identities. Fig.1. the Multi-cloud Environment.

Multi-Cloud Computing A Framework of Service Operator-Aware Trust Scheme for Resource Matchmaking A schematic architecture consists of a number of core I1 to I3 are direct operators and these reflect the hardware modules including the trusted resource matchmaking and capacity of a resource and can be obtained based on the distributing module agent-based service operator running profile of a machine. acquisition module and the resource management module, using this module the borker can dynamically sort high IV. SERVICE OPERATOR IMPLEMENTATION performance resources by analyzing the historic resource The agent-based operator acquirement involves deploying information in terms of providing highly trusted resources and managing the large collection of agents that are widely as shown in Fig.1. Trusted matchmaking and distributing distributed. Collecting and managing data generated in a fast module cloud manager registers its service resources dynamic and on-demand, use the collection of software agents though the cloud borker, service user negotiaties with the to monitor critical resources in a multi-cloud system and then service broker on the service level agreement details yield time-stamped monitoring data that can be used to prepare the SLA contract. According to the broker selects evaluate the RTD of a cloud resource as shown in Fig.3. A and then presents highly trusted resources to users from the resource monitoring system based on a eucalyptus platform of trusted resources pool. Agent publish service operator used this monitoring system is an active agent binding mechanism to monitor the usage of allocated resources in order to when a cloud provider registers its virtual machines with the gurantee the SLA with the user monitors the resource broker each registered resource is commanded to download to operators and is responsible for getting run-time service monitoring agent and bind this MA with its IP. If a computing operators. It manages and indexes all the resouces available task is distributed to this resource the MA will be activated from multiple cloud providers and obtains information and begin its monitoring task acquirement of these trusted from each particular cloud resource acting as pricing operators two types of software agents need to be deployed. interface for users database when new information is available. B. Measurement Based on Statistcs Matchmarking resource for users the cloud broker consider wheather the resource has the required capabilities and to complete ttthe task succcessfuly it is evaluated by the resource has the required which can determine whether a resource has the required capability or not. Mainly focuses on the reliability and security of the resource which can be evaluated by the resources service operators. The security pertain to the absence of unauthorized access to a system, security levels of service site to evaluate security trust attribute based on dynamic service operators are below Fig.2. Fig.2. dynamic service operators. Availability measurement based on the hardware capacity of a resource depending on the acquisition methods trust factors can be divided into two direct operators and indirect operators. Direct operators can be obtained by some specially designed software and indirect operator can be obtained by simple calculation or ststistics Fig.3. Framework for Multi cloud Service Operator. MA that run on the cloud resources and are responsible for collecting the direct service operators of resources such as CPU type and frequency memory size hard disk capacity and the others. Computing agents that run on the borer an are responsible for counting the indirect service operators which need simple calculation and statistics such as average response time and average task success ratio and monitoring system with the adaptive trust evaluation module the broker can gather VM operator and the GTD each VM and then match user tasks on specific node controllers. Trust scheme based on technologies set up a multiple cloud environment that is composed of clusters managed by cloud manager running Ubuntu Linux 10.04 kernel 2.6.35-24 and Eucalyptus version 1.6.1. Each cluster cloud operating system running in the virtual machines is a customized scientific computing as a service.

Fig.4.Implementation of Multi Cloud Service Network. Machines in each cluster act as VM providers in which an agent based service operator acquisition module is deployed and separate machine acts as the trust management server cloud broker where the core functional modules of the broker are deployed including a trusted resource matchmaking and distributing module and adaptive trust evaluation module and a resource management module as shown in Fig.4. Accuracy used to check whether the proposed scheme and its related algorithms can accurately and consistently provide trust calculation and efficiency is used to evaluate the overhand and the average job failure rate of the proposed scheme. VI. COMPARATIVE STUDY A systematic trust management scheme for multi-cloud environments based on multi-dimensional resource service operators. SOTS evaluate the trust of a cloud resource in contrast to traditional trust schemes that always focus on unilateral trust factors of service resources. An adaptive fused computing approach for dynamic service operators, based on information entropy theory and SOTS model the problem of trust evaluation as a process of multi-attribute decision-making, and then develops an adaptive trust evaluation approach. A first service, last audit (FSLA) mechanism to overcome the trust initialization problem of newly registered resources when a resource initially registers for business, no user has interacted with it, and consequently, information on past service operators is nonexistent. Hwang et al. suggested using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between providers and data owners trust model collects and analyzes reliability based on the historical server information in a cloud data center. Compare to proposed middleware architecture consists of a number of core modules, including the trusted resource matchmaking and distributing module, the adaptive trust evaluation module, the agent-based service operator acquisition module, and the resource management module, among others. This module is the core of the trust-aware cloud computing system, and is the major focus of this paper. SANTHOSH BODDUPALLI, VAMSHEEDHAR KANCHAN Using this module, the broker can dynamically sort highperformance resources by analysing the historic resource information in terms of providing highly trusted resources. In general, each cloud manager registers its service resources through the cloud broker. The service user negotiates with the service broker on the Service-Level Agreement (SLA) details; they eventually prepare an SLA contract. According to this contract, the broker selects, and then presents highly trusted resources to users from the trusted resource pool. It manages and indexes all the resources available from multiple cloud providers, and obtains information from each particular cloud resource, acting as pricing interface for users, and updating the database when new information is available. The Broker is aware of the resources seeking and providing with the matchmaking framework and makes the resource availability with using security key for sharing the content with highest security. VII. CONCLUSION This paper defines service operator trust scheme for trustworthy resource matchmaking across multiple clouds yields very good analysis results in many typical cases. However, there are still some open issues to apply to the current scheme. Our analysis combining the trust scheme with reputation management to address concerns in users feedback. A universal measurement and quantitative method to assess the security levels of a resource is another interesting direction of the proposed scheme in a larger-scale multiple cloud environment is also an important task. VIII. REFERENCE [1] K. M. Khan, Q. Malluhi, Establishing Trust in Cloud Computing, IEEE IT Professional, vol. 12, no. 5, 2010, pp. 20-27. [2] K. Hwang, D. Li, Trusted Cloud Computing with Secure Resources and Data Coloring, IEEE Internet Computing, vol. 14, no. 5, 2010, pp. 14-22. [3] H. Kim, H. Lee, W. Kim, Y. Kim, A Trust Evaluation Model for QoS Guarantee in Cloud Systems, International Journal of Grid and Distributed Computing, vol.3, no.1, pp. 1-10, 2010. [4] P. D. Manuel, S. Thamarai Selvi, M. I. A. E. Barr, Trust management system for grid and cloud resources, Proc. of the First International Conference on Advanced Computing (ICAC 2009), 2009, 13-15 Dec, pp. 176-181. [5] S. M. Habib, S. Ries, and M. Muhlhauser, Towards a Trust Management System for Cloud Computing, Proc. of IEEE TrustCom-11/IEEE ICESS-11/FCST-11, pp. 933-939, 2011. [6] N. Dragoni, A Survey on Trust-Based Web Service Provision Approaches, Proc. of the 2010 Third International Conference on Dependability, pp. 83-99, 2010. [7] Z. Liang and W. Shi, A reputation-driven scheduler for autonomic and sustainable resource sharing in Grid computing Journal of Parallel and Distributed Computing, vol. 70, no. 2, pp.111-125, 2010. [8] S. A. de Chaves, R. B. Uriarte, C. B. Westphall, Toward an Architecture for Monitoring Private Clouds, IEEE Communications Magazine, vol. 49, no. 2, pp. 130-137, 2011.

Multi-Cloud Computing A Framework of Service Operator-Aware Trust Scheme for Resource Matchmaking [9] S. Clayman, A. Galis, C. Chapman, et al., Monitoring Service Clouds in the Future Internet. Future Internet Assembly, pp. 115-126, 2010. [10] Marshall, P., Tufo, H.M., and Keahey, K. Provisioning Policies for Elastic Computing Environments. In 9th HighPerformance Grid and Cloud Computing Workshop and the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS). 2012 [11] SpotCloud, http://www.spotcloud.com/. [12] L.J. Hoffman, K. Lawson-Jenkins, and J. Blum, Trust beyond Security: An Expanded Trust Model, Communications of the ACM, vol. 49, no. 7, pp. 95-101, 2006. Author s Profile: Mr. Santhosh Boddupalli, Completed M.Tech. [CSE], MCA, Higher Diploma in Software Engineering. He served as an Associate Professor & HOD in the Dept. of Computer Science and Engineering at Brilliant Institute of Engineering and Technology in Hyderabad. He has having several years of experience in various Engineering Colleges, has guided many UG & PG students. Currently he is working as a Senior IT Trainer in the faculty of Computer Science / Computer Applications for ANUBHUTI International Residential School, Jalgaon; his areas of interest include Unix Operating System, Information security, Object Oriented Analysis & Design, Distributed Data Bases, Cloud Computing. Mr. Vamsheedhar Kanchan, Faculty, Completed MCA, B.Sc (M.S.Cs), having 12 years of experience in Education Industry, Currently he is a Senior Information Technology Trainer - Grade A at KING SAUD UNIVERSITY, PREPARATORY YEAR, Riyadh, Saudi Arabia. His areas of interest Unix Operating System, Cloud Computing, Information security.