COMBINE DIFFERENT TRUST MANAGEMENT TECHNIQUE: RECOMMENDATIONAND REPUTATION IN CLOUD SERVICE. B.Brithi #1, K. Kiruthikadevi *2



Similar documents
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

Near Sheltered and Loyal storage Space Navigating in Cloud

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Logical Data Models for Cloud Computing Architectures

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas

Table of Contents. Abstract... Error! Bookmark not defined. Chapter 1... Error! Bookmark not defined. 1. Introduction... Error! Bookmark not defined.

Compliance in Clouds A cloud computing security perspective

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

Security Issues in Cloud Computing

Architectural Implications of Cloud Computing

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service


Common Capabilities for Service Oriented Infrastructures In A Grid & Cloud Computing

Cloud deployment model and cost analysis in Multicloud

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

Multi-Cloud Computing A Framework of Service Operator-Aware Trust Scheme for Resource Matchmaking SANTHOSH BODDUPALLI 1, VAMSHEEDHAR KANCHAN 2

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

AEIJST - June Vol 3 - Issue 6 ISSN Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha

THE highly dynamic, distributed, and nontransparent

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

Cloud Computing Technology

Customer Security Issues in Cloud Computing

Trust as a Service: A Framework for Trust Management in Cloud Environments

Soft Computing Models for Cloud Service Optimization

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Security & Trust in the Cloud

6 Cloud computing overview

Security Issues in Cloud Computing

Trust as a facilitator in cloud computing: asurvey

A Broker Based Trust Model for Cloud Computing Environment

A Trust-Evaluation Metric for Cloud applications

SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government

Security Model for VM in Cloud

How To Understand Cloud Usability

NATO s Journey to the Cloud Vision and Progress

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

A Survey on Trust Based Security and Privacy Issues of Cloud Computing Framework

Accountability in Cloud Computing An Introduction to the Issues, Approaches, and Tools

A Study of Infrastructure Clouds

Infrastructure as a Service (IaaS)

Evolving Technology Issues: Cloud Computing

A Survey Paper: Cloud Computing and Virtual Machine Migration

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS

IS PRIVATE CLOUD A UNICORN?

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT

Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration

Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs)

NIST Cloud Computing Reference Architecture & Taxonomy Working Group

Research on Trust Management Strategies in Cloud Computing Environment

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

Cloud Based E-Government: Benefits and Challenges

Dynamic Query Updation for User Authentication in cloud Environment

Federation of Cloud Computing Infrastructure

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II

Analytical Survey Model on Consumption of Cloud Service Models

Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES

Survey on software testing techniques in cloud computing

Assessing Risks in the Cloud

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Secure Cloud Computing through IT Auditing

Ch. 4 - Topics of Discussion

journey to a hybrid cloud

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

Cloud Computing Guide & Handbook. SAI USA Madhav Panwar

Security and Compliance in Clouds: Challenges and Solutions

Managing Cloud Computing Risk

Cloud Computing An Introduction

Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen

Full Length Research Article

NIST Cloud Computing Reference Architecture

Top 10 Cloud Risks That Will Keep You Awake at Night

Identity Federation Broker for Service Cloud

Seminar: Security Metrics in Cloud Computing ( se)

John Essner, CISO Office of Information Technology State of New Jersey

Interoperable Clouds

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Inter-cloud Introduction. Yisheng Wang

OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105

Permanent Link:

Cloud Computing; What is it, How long has it been here, and Where is it going?

The NIST Definition of Cloud Computing (Draft)

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

A Study on Service Oriented Network Virtualization convergence of Cloud Computing

Transcription:

COMBINE DIFFERENT TRUST : RECOMMENDATIONAND REPUTATION IN CLOUD SERVICE B.Brithi #1, K. Kiruthikadevi *2 1 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode. 2 Assistant Professor, Department of computer science and engineering, Nandha College of Technology, Erode. Abstract Trust management is responsible for setting authorization roles and implementing security policies. Preserving consumer s privacy is not an easy task due to the penetrating data involved in the interactions between consumers and the trust management service. In Existing works, presented the novel techniques that help in detecting reputation based attacks and allowing users to effectively identify trustworthy cloud services. Proposed approach is to combine different trust management techniques such as reputation and recommendation to increase the trust results accuracy. Index Terms Cloud computing, trust management, recommendation, reputation, credibility, security, privacy, availability 1. INTRODUCTION Cloud computing has been receiving much attention as a new computing paradigm for providing exile and on-demand infrastructures, platforms and software as services. Cloud services are established based on five essential characteristics [1], namely, (i) on-demand selfservice where cloud service consumers are able to automatically provision computing resources without the need for human interaction with each cloud service provider, (ii) broad network access where cloud service consumers can access available computing resources over the network, (iii) resource pooling where computing resources are pooled to serve multiple cloud service consumers based on a multi-tenant model where physical and virtual computing resources are dynamically reassigned on-demand, (iv) rapid elasticity where computing resources are elastically provisioned to scale rapidly based on the cloud service consumers need, and (v) measured service where computing resources usage is monitored, metered (i.e., using pay-as-you-go mechanism), controlled and reported to provide transparency for both cloud service providers and consumers. Based on the definition provided by the National Institute of Standards and Technology (NIST) [1], cloud computing can be defined as follows: Cloud Service Models Cloud Service Deployment Models Trust management is one of the most important issues in the area of information security and several surveys have been conducted. This survey overviews trust definitions from computer science, economic and social psychology perspectives. It also

summarizes the International Journal of Innovative Research in Engineering Science and Technology trust relationship properties and trust classes that represent different types of trust. Classify trust management into four types, namely policy-based,reputation-based, Recommendation based and social networkbased. The authors compare nine trust Cloud service consumers and providers management systems based on eleven different criteria parameters. They define trust actors and classify trust management into three tasks, including i) initialization of trust relationships, ii) behavior observation and iii) actions after a new experience. In particular, the authors discuss the relevance of trust and the semantic are connected with lines representing trusted relations between them (denoted Tr). The values of Tr can be either 0 (the trusted relationship does not exist) or 1 (the trusted relationship exists). An unrecognized relation, denoted in a dashed line, occurs when a cloud service consumer x approaches a cloud service Web and point out some unique trust provider y for the first time. management challenges for the area. 2.1 POLICIES AS A TRUST TRUSTMANAGEMENTTECHNIQUES (PocT): Different trust management techniques have been reported in the literature, which can be classified into four different categories: For the trust results-based threshold, Policy Recommendation Reputation Prediction FIG: 1. Trust management perspectives To ease the discussion, we focus on explaining these trust management techniques using the service requester perspective (i.e., cloud service consumers per spective). The same techniques can be applied to the other perspective (i.e., clouds service providers perspective). several approaches can be used. For instance, the monitoring and auditing approach proves Service Level Agreement (SLA) violations in cloud services (i.e., if the SLA is satisfied, then the cloud service is considered as trustworthy and vice versa). The entities credibility approach specifies a set of parameters to measure the credibility of parties while the feedback credibility approach considers a set of factors to measure the credibility of feedbacks. SLA can be considered as a service plan and as a service assurance where penalties can be assigned to the cloud service provider if there is a service level violation in the provisioned cloud services. SLA can establish trust between cloud service consumers and providers by specifying technical and functional descriptions with strict clauses. The entities credibility (i.e.,

the credibility of cloud services) can be measured from qualitative and quantitative attributes such as security, availability, response time, and customer support. The feedback credibility can be measured using several factors such as cloud service consumers experience. Many researchers identify two features of credibility including trustworthiness and expertise. For credential-based threshold, PocT follows either the Single-Sign-On (SSO) approach where the credentials disclosure and authentication take place once and then the cloud service consumers have an access approval for several cloud services, or the state machine approach where the credentials disclosure and authentication take place for each state of the execution of cloud services. Credentials are generally established based on standards such as the X.509v3, the Simple Public Key Infrastructure (SPKI), or the Security Assertion Markup Language (SAML). Many researchers use the digital certificates perspective to define the credential term where a trusted third party (i.e., certificate authority) is required to certify the credential. However, not all credentials require a trusted certificate authority for establishing identities such as the Simple Public Key Infrastructure (SPKI) credentials where the certificate authority is not required. 2.2 REPUTATION AS A TRUST (RocT): Reputation as a trust management technique (RepT) is important because the feedback of the various cloud service consumers can dramatically influence the reputation of a particular cloud service either positively or negatively. RepT has been used in the cloud environment, the grid, P2P, as well as the service-oriented environment. Reputation can have direct or indirect influence on the trustworthiness of a particular entity (e.g., cloud service) as pointed in [3]. There are several online reputation based systems such as the auction systems (e.g., ebay and Amazon [5]) where new and used goods are found and the review systems where the consumer s opinions and reviews on specific products or services are expressed. How RepT supports trust management. Similarly, there exist several efforts that use RepT in trust management of cloud computing. Focus on aggregating the reputation of a particular cloud service based on feedback using QoS and other attributes (e.g., elasticity, geographical location). The approach is applicable for different cloud service models. In a reputation-based trust model is proposed that focuses on Infrastructure as a Service (IaaS) cloud services. Noor and Sheng propose a reputation based trust management frame work that distinguishes the credible feedbacks from the misleading ones. 2.3 PREDICTION AS A TRUST (PrdT): Prediction as a trust management technique (PrdT) is very useful especially when there is no prior information regarding the cloud service s interactions (e.g., previous interactions, history records). PrdT has been proposed in the cloud environment and the service-oriented environment. The basic idea behind PrdT is that similar minded entities (e.g., cloud service consumers) are more likely to trust each other. The cloud service consumer x has some

capabilities and interests (denoted ix) represented in a vector space model by binary data, ix = _i1, i2,..., ij _, and a certain minimum trust threshold TX are used to determine whether to trust the other cloud service consumers. 2.4 RECOMMENDATION AS A TRUST (RecT): Recommendation as a trust management technique (RecT) has been widely used in the cloud environment, the grid, and the serviceoriented environment. Recommendations take advantage of participant s knowledge about the trusted parties, especially given that the party at least knows the source of the trust feedback. It is well known in the social psychology theory that the role of a person has a considerable influence on another person s trust assessment if a recommendation is given. Recommendations can appear in different forms such as the explicit recommendation or the transitive recommendation. An explicit recommendation happens when a cloud service consumer clearly recommends a certain cloud service to his/her well-established and trusted relations (e.g., friends). A transitive recommendation happens, on the other hand, when a cloud service consumer trusts a certain cloud service because at least one of his/her trusted relations trust the service. RecT approach where the cloud service consumer x has a trusted relation with another cloud service consumer z. Essentially, the cloud service consumer z recommends consumer x to cloud service provider y, or x transitively trusts y because there is a trusted relation between z and y. In the work, trust is derived from recommendations using several operations including consensus (i.e., where trust feedbacks are aggregated from different cloud service consumers) and discounting (i.e., where trust feedbacks are weighted based on the trustworthiness of cloud service consumers). In, a cloud trust model is proposed based on transitive trust where a chain of trusted relations is built from a single root of trust. Similarly, RecT is applicable for all three cloud service models. 3. SLA VERIFICATION BASED TRUST Trust, but verify is a good advice for dealing with the relationships between cloud users and cloud service providers. After establishing the initial trust and employing a cloud service, the cloud user needs to verify and reevaluate the trust. A service level agreement (SLA) is a legal contract between a cloud user and a cloud service provider. Therefore, quality of service (QoS) is monitoring and SLA verification is an important basis of trust management for cloud computing. A number of models that derive trust from SLA verification have been proposed. A major issue is that SLA focuses on the visible elements of cloud service performance, and does not address invisible elements such as security and privacy. Another issue is that many cloud users lack the capability to do fine grain QoS monitoring and SLA verification on their own; a professional third party is needed to provide these services. In a private cloud, there may be a cloud broker or a trust authority (e.g. RSA s CTA, to be discussed later in Cloud transparency mechanisms ), whom is trusted in the trust domain of the private cloud; so the trusted broker or trust authority can provide the

users in the private cloud the services of QoS monitoring and SLA verification. In a hybrid cloud or interclouds, a user within a private cloud might still rely on the private cloud trust authority to conduct QoS monitoring and SLA verification; however, in a public cloud, individual users and some small organizations without technical capability may use a commercial professional cloud entity as trust broker. the answers later in subsections Trust judgments on a cloud broker and Trust judgment on a cloud service provider. 4. TRUST AS A SERVICE We have already noted the need for employing third-party professionals for QoS monitoring and SLA verification. Independent assessment has utility in other aspects of cloud computing, as well. RSA announced the Cloud Trust Authority (CTA) as a cloud service, called Trust as a Service (TaaS) to provide a single point for configuring and managing security of cloud services from multiple providers. The initial release of the CTA includes: identity service, enabling single sign-on among multiple cloud providers, and compliance profiling service, enabling a user to view the security profiles of multiple cloud providers against a common benchmark. The CTA is a tool specialized on cloud trust management, and is developed from RSA s philosophy of trust = visibility + control. However, a cloud user must still make trust judgment about the cloud service assertions streamed in the CTA, because those assertions were made by cloud service providers themselves. Most importantly, a cloud user needs to judge the trustworthiness of the CTA in role as an intermediary. The essential issue of any TaaS mechanism is about what is the basis of the trust relation between cloud users and those commercial trust brokers. We will discuss REFERENCE [1] Talal H. Noor, Quan Z. Sheng, Lina Yao, Schahram Dustdar, and Anne H.H. Ngu CloudArmor: Supporting Reputation-based Trust Management for Cloud Services DOI 10.1109/TPDS.2015. [2] S. Pearson, Privacy, Security and Trust in Cloud Computing, in Privacy and Security for Cloud Computing, ser. Computer Communications and Networks, 2013, pp. 3 42. [3] J. Huang and D. M. Nicol, Trust Mechanisms for Cloud Computing, Journal of Cloud Computing, vol. 2, no. 1, pp. 1 14, 2013. [4] S. M. Khan and K. W. Hamlen, Hatman: Intra-Cloud Trust Management for Hadoop, in Proc. CLOUD 12, 2012. [5] S. Habib, S. Ries, and M. Muhlhauser, Towards a Trust Management System for Cloud Computing, in Proc. of TrustCom 11, 2011. [6] K. Hwang and D. Li, Trusted Cloud Computing with Secure Resources and Data Coloring, IEEE Internet Computing, vol. 14, no. 5, pp. 14 22, 2010.