21 results on '"Cloud user"'
Search Results
2. Performance Study of Multi-tenant Cloud FPGAs
- Author
-
Christophe Bobda, Sujan Kumar Saha, and Joel Mandebi Mbongue
- Subjects
Computer science ,business.industry ,Cloud computing ,Cloud user ,Virtualization ,computer.software_genre ,Logic gate ,Embedded system ,Hardware acceleration ,Overhead (computing) ,System on a chip ,business ,Field-programmable gate array ,computer - Abstract
Cloud deployments now increasingly provision FPGA accelerators as part of virtual instances. While commercial clouds still essentially expose single-tenant FPGAs to the users, the growing demand for hardware acceleration raises the need for architectures supporting FPGA multi-tenancy. In this work, we explore the trade-off between hardware consolidation and performance. Experiments show that FPGA multi-tenancy increases hardware utilization and decreases IO performance in the order of microseconds compared to the single-tenant model. The experiments also demonstrate that implementing on-chip communication between the hardware workloads of a cloud user significantly reduces the overall communication overhead.
- Published
- 2021
- Full Text
- View/download PDF
3. Cloud Computing Security Issues: a Stakeholder’s Perspective
- Author
-
Garima Verma and Sandhya Adhikari
- Subjects
Cloud computing security ,Computer science ,business.industry ,Perspective (graphical) ,Stakeholder ,Cloud computing ,Cloud user ,Cloud service provider ,Computer security ,computer.software_genre ,Work (electrical) ,Resource pool ,business ,computer - Abstract
Cloud computing is a rising technology that has gained significant attention over past decades. It offers various features such as-on-demand access, broad-network access, unlimited resource pool, etc. Despite so many merits, cloud computing has been full several challenges. Security indeed has remained one of the biggest challenges. Researchers, all over world, have been working on designing different types of security mechanism which can work on different levels on cloud environment. However, the literature on cloud security is quite wide and touches several issues pertaining to different stakeholders. The current study addresses the above issue by presenting a detailed review of challenges of security that are faced by different stake holders, such as cloud service provider (CSP), cloud user (CU), etc. This study will help the various researchers to find all security concerns at one place with critical reviews.
- Published
- 2020
- Full Text
- View/download PDF
4. A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten for the Outsourced Plain Images
- Author
-
Weiming Zhang, Xiaojuan Dong, Keyang Liu, and Xianjun Hu
- Subjects
050502 law ,021110 strategic, defence & security studies ,Right to be forgotten ,Computer science ,Data_MISCELLANEOUS ,05 social sciences ,0211 other engineering and technologies ,02 engineering and technology ,Cloud user ,Computer security ,computer.software_genre ,computer ,Digital watermarking ,Protocol (object-oriented programming) ,Software ,0505 law - Abstract
This article describes how cloud storage dramatically benefits people in freeing up their local storage space, while bringing the separation of the data ownership and private manipulation. Hence, it is difficult for the cloud user to make sure that the cloud storage provider (CSP) has obeyed the request of deletion to remove all corresponding data. To solve the issue technically, this article proposes an interactive cloud-user watermarking protocol (CUW) based on the homomorphic encryption. To meet security requirements, the encrypted watermark is embedded into encrypted data. Moreover, to enjoy the convenient cloud services, the uploaded data is eventually stored in the cloud server in the form of plain text. The performance of the CUW protocol is evaluated through a prototype implementation.
- Published
- 2018
- Full Text
- View/download PDF
5. Privacy preserving model: a new scheme for auditing cloud stakeholders
- Author
-
Abdul Razaque and Syed S. Rizvi
- Subjects
Information privacy ,lcsh:Computer engineering. Computer hardware ,Computer Networks and Communications ,Computer science ,Vulnerability ,Cloud computing ,lcsh:TK7885-7895 ,02 engineering and technology ,Audit ,Computer security ,computer.software_genre ,lcsh:QA75.5-76.95 ,Insider ,020204 information systems ,Privacy preserving model ,0202 electrical engineering, electronic engineering, information engineering ,Ubiquitous network ,Authentication ,Cloud computing security ,business.industry ,Quality of service ,020206 networking & telecommunications ,Cloud service provider ,Service provider ,Shared resource ,Third party auditor ,Cloud user ,lcsh:Electronic computers. Computer science ,business ,computer ,Software - Abstract
The Cloud computing paradigm provides numerous attractive services to customers such as the provision of the on-demand self-service, usage-based pricing, ubiquitous network access, transference of risk, and location independent resource sharing. However, the security of cloud computing, especially its data privacy, is a highly challengeable task. To address the data privacy issues, several mechanisms have been proposed that use the third party auditor (TPA) to ensure the integrity of outsourced data for the satisfaction of cloud users (CUs). However, the role of the TPA could be the potential security threat itself and can create new security vulnerabilities for the customer’s data. Moreover, the cloud service providers (CSPs) and the CUs could also be the adversaries while deteriorating the stored private data. As a result, the objective of this research is twofold. Our first research goal is to analyze the data privacy-preserving issues by identifying unique privacy requirements and presenting a supportable solution that eliminates the possible threats towards data privacy. Our second research goal is to develop the privacy-preserving model (PPM) to audit all the stakeholders in order to provide a relatively secure cloud computing environment. Specifically, the proposed model ensures the quality of service (QoS) of cloud services and detects potential malicious insiders in CSPs and TPAs. Furthermore, our proposed model provides a methodology to audit a TPA for minimizing any potential insider threats. In addition, CUs can use the proposed model to periodically audit the CSPs using the TPA to ensure the integrity of the outsourced data. For demonstrating and validating the performance, the proposed PPM is programmed in C++ and tested on GreenCloud with NS2 by applying merging processes. The experimental results help to identify the effectiveness, operational efficiency, and reliability of the CSPs. In addition, the results demonstrate the successful rate of handling the negative role of the TPA and determining the TPA’s malicious insider detection capabilities.
- Published
- 2017
- Full Text
- View/download PDF
6. Exploration of Various Cloud Security Challenges and Threats
- Author
-
P. Swarnalatha and Arun Krishna Chitturi
- Subjects
Cloud computing security ,business.industry ,Computer science ,Data_MISCELLANEOUS ,Cloud computing ,02 engineering and technology ,Cloud user ,Computer security ,computer.software_genre ,Cloud provider ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,computer - Abstract
Most of the organizations are stuck in a situation to cloudify due to concerns regarding security of sensitive data. Cloud computing provides many aids to the users and organizations in accordance with expenditure and savings. Other than these benefits, cloud computing has some hurdles that result in restriction of it’s usage. Cloud security is the bigger hurdle which is regularly taken into consideration. This paper will give a broad view of major threats challenges in security which are encountered in cloud computing. Cloud computing entities include cloud user, cloud provider, and data owner. The study is carried out based on selection of open-source cloud offerings. This paper can be an exploration tool for any IT person to gain knowledge into security-related risks and challenges which are concerned with cloud computing.
- Published
- 2019
- Full Text
- View/download PDF
7. A Taxonomy and Survey of Manifold Resource Allocation Techniques of IaaS in Cloud Computing
- Author
-
Manish Parmar, Dayanand Ambawade, and Saurabh Bhosale
- Subjects
Database ,Cost efficiency ,Computer science ,business.industry ,Vendor ,Quality of service ,Cloud computing ,Resource allocation algorithm ,Cloud user ,computer.software_genre ,Software ,The Internet ,business ,computer - Abstract
In cloud computing environment there are Cloud Service Providers (CSP)/Vendor, and Cloud User/Client. CSP provides application, infrastructure, and/or software. Cloud user demand for a service to the CSP via the internet which is accounted on a pay-per-usage basis. Resource allocation related parameters are optimization, cost efficiency, security, quality of service (QoS), reliability, compatibility, efficiency, and delay. In this survey, we have reviewed resource allocation algorithms and mechanisms used by researchers in the recent past and classified these techniques according to the parameters considered in the approach. According to the survey, we noticed that few parameters are well addressed by many of the researches while some are yet not much investigated. The survey will guide the researchers to achieve more vision in the field of resource allocation for IaaS in Cloud Computing.
- Published
- 2019
- Full Text
- View/download PDF
8. Oracle Cloud User Security
- Author
-
Michelle Malcher
- Subjects
Computer science ,Separation of duties ,media_common.quotation_subject ,Cloud user ,Function (engineering) ,Computer security ,computer.software_genre ,computer ,Oracle ,media_common - Published
- 2019
- Full Text
- View/download PDF
9. A Trust Rating Model Using Fuzzy Logic in Cloud
- Author
-
Vidhika Vasani and Vipul Chudasama
- Subjects
Trusted service manager ,business.industry ,Computer science ,End user ,Data_MISCELLANEOUS ,Cloud computing ,Cloud service provider ,Cloud user ,business ,Computer security ,computer.software_genre ,Fuzzy logic ,computer - Abstract
Cloud computing provides services from the available pool of resources. Even with the available condition, cloud computing can reach the peak of success amongst cloud user. The issue they face is the barrier of trust between the end users for using the given services. Conventional security and protection controls keeps on being executed on cloud; however, because of its liquid and dynamic nature, a testable trust estimate of the cloud is required. This research paper exhibits an analysis of the present trust administration strategies for cloud operations. In this research paper, we proposed a model for trust administration using Fuzzy Logic, which can be beneficial for cloud service providers to select trusted datacenter for consumers.
- Published
- 2018
- Full Text
- View/download PDF
10. Get as you Pay Model for IaaS Cloud Computing
- Author
-
Hoda Hassan and Sherif Yehia AbdelGhany
- Subjects
Service quality ,Cloud computing services ,business.industry ,Computer science ,Service lifecycle ,Cloud computing ,Cloud user ,Computer security ,computer.software_genre ,Service-level agreement ,Elasticity (cloud computing) ,Cloud provider ,business ,computer - Abstract
The IaaS cloud computing model is the foundation over which all other cloud computing services can be built. Thus, the migration from the traditional datacenter model to the cloud-computing model is highly dependent on the guarantees that the IaaS Cloud Provider can offer Cloud User to sustain service quality. These guarantees are expressed using Service Level Agreement (SLA) whose need to be aligned and tightly coupled with the cloud service lifecycle so as to reflect the financial and technical dynamicity of the SLA. However, we argue that the SLAs used at present are deficient in expressing solid guarantees on the service quality and lack the auto-negotiation feature required by cloud services. In that respect, SLAs used in practice do not fully abide by the "Pay as you Go" model for cloud computing. In this paper, we propose the "Get as you Pay" model that extends the "Pay as You Go" model by augmenting it with a descriptive SLA that supports the auto-scaling of resources. For validating the "Get as you Pay" model, we walk through a scenario to show how applying the model provides an expressive and negotiable SLA.
- Published
- 2018
- Full Text
- View/download PDF
11. Trust evaluation model of cloud user based on behavior data
- Author
-
Zhenguo Chen, Chuang Lin, and Liqin Tian
- Subjects
020203 distributed computing ,Cloud computing security ,Degree (graph theory) ,Computer Networks and Communications ,Computer science ,business.industry ,05 social sciences ,Data_MISCELLANEOUS ,General Engineering ,Process (computing) ,Cloud computing ,02 engineering and technology ,Cloud user ,Computer security ,computer.software_genre ,lcsh:QA75.5-76.95 ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,050211 marketing ,lcsh:Electronic computers. Computer science ,business ,computer - Abstract
In the process of using the cloud platform, how to ensure the safety of users is a matter we must concern. The user authentication can provide a certain degree of security, but when the user information was leaked, this method will not be effective. Therefore, this article proposes a trust evaluation model based on user behavior data. In this model, the user’s historical behavior will be used to construct a set of trusted behavior of the cloud users. On this basis, the direct trust of the user’s behavior can be obtained. Then, the recommendation trust can be calculated by the interaction between the users and other cloud users. Given the current historical trust, the comprehensive trust can be obtained using the weighted average method. Among them, the initial value of historical trust is set to a constant and then updated by the comprehensive trust. In order to control the user’s abnormal behavior more effectively, the suspicious threshold value and the abnormal threshold value were defined, which are used to punish the historical trust. Through the simulation of the virtual digital library cloud platform, the method can effectively evaluate the cloud users.
- Published
- 2018
12. Cloud Management and Monitoring
- Author
-
Naresh Kumar Sehgal and Pramod Chandra P. Bhatt
- Subjects
Amazon web services ,Resource (project management) ,Database ,Cloud management ,Computer science ,business.industry ,Cloud computing ,Variation (game tree) ,Cloud user ,computer.software_genre ,business ,computer ,Task (project management) - Abstract
In this chapter, we start by introducing Cloud Computing management terms, with a special reference to Amazon Web Services (AWSs). Next, we review the performance characteristics of public, multi-tenanted data centers, including the concept of noisy neighbors. If a particular VM does excessive I/O or memory accesses, then other VMs running on that same server will experience a slowdown in their access of the same physical resource. This results in a performance variation experienced by a VM user over time. Such factors impact run-times of users’ applications and result in different cost to finish a task. A cloud user may want to maximize their performance or minimize their costs. We will look at various monitoring tools, to manage the user costs.
- Published
- 2018
- Full Text
- View/download PDF
13. Data Security Model in Cloud Computing Environment
- Author
-
Meena Kumari and Rajender Nath
- Subjects
business.industry ,Computer science ,Control (management) ,Data security ,Cloud computing ,Confidentiality ,Cloud user ,Computer security ,computer.software_genre ,business ,computer ,Cloud storage - Abstract
Cloud computing (CC) has emerged as the next generation of computing in IT Enterprise. Earlier, IT services are under proper physical and personnel control, CC migrates the application softwares and databases to the huge data centers, where the management of data along with services is done by the cloud provider. However, this characteristic poses many security challenges which have not been well understood. This paper focuses on security of data at cloud storage, which has always been a most important issue in CC security. Many approaches have been proposed to protect data in cloud which are not sufficient to meet the requirements of a cloud user. So in this paper, a model for data security at cloud storage site has been proposed.
- Published
- 2018
- Full Text
- View/download PDF
14. Risk Prediction Model Based on Improved AdaBoost Method for Cloud Usersse
- Author
-
Kaili Rao, Lin Zhang, Yishang Jia, and Ruchuan Wang
- Subjects
business.industry ,Computer science ,General Mathematics ,media_common.quotation_subject ,Word error rate ,Cloud computing ,Cloud user ,Machine learning ,computer.software_genre ,Adaboost algorithm ,ComputingMethodologies_PATTERNRECOGNITION ,Sampling distribution ,Control and Systems Engineering ,Voting ,AdaBoost ,Artificial intelligence ,Data mining ,business ,computer ,Classifier (UML) ,media_common - Abstract
Considering the problem how to protect the cloud services from being destroyed by cloud users, the risk- prediction model based on improved AdaBoost method is proposed. The risk prediction is regarded as two-class classifi- cation problem, and the risk of new cloud users could be predicted by the attributes of historical cloud users. In order to improve the result of predicted, AdaBoost method is adopted in this paper. The error rate of the last training is used to ad- just the sample distribution of the next training, which can make the next training have stronger ability of identification for the error-classified samples. At the same time the weight of each weak classifier is set. After all, the strong classifier is generated by combined the weak classifiers through voting, which can improve the overall result of classification. Con- sidering the wrongly-predicted cost, AdaBoost method is improved. The method of cost-sensitive is added into the model in order to minimal the misclassified-cost. Experiments show that the cost-sensitive AdaBoost method has better classifi- cation result than the traditional ones and it can predict the risk of the new cloud user effectively and protect the security of the cloud services.
- Published
- 2015
- Full Text
- View/download PDF
15. A Complete Ontological Survey of Cloud Forensic in the Area of Cloud Computing
- Author
-
Shaik Sharmila, Suresh Babu Yalavarthi, and Shaik Khaja Mohiddin
- Subjects
Relation (database) ,Point (typography) ,business.industry ,020207 software engineering ,Cloud computing ,02 engineering and technology ,Cloud user ,Cloud service provider ,Computer security ,computer.software_genre ,Field (computer science) ,World Wide Web ,Geography ,Order (business) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,business ,computer ,TRACE (psycholinguistics) - Abstract
In order to arm yourself and assess risk correctly in the cloud, carrying out investigations are necessary. Though Cloud Computing is the buzzing technology now a days, with the advent with which cloud computing is developing and providing solutions to the upcoming technologies where on the other side of it there also lies a down fall with respect to theft of data in the cloud, loss of data in the cloud which are related to forensic, these things create an distrustful relation between cloud user and cloud providers, during the past half decade cloud forensic has emerged as a challenging point that has to be solved in cloud computing, the prevailing existing solutions which were suggested at the initial stage of Cloud Forensics were satisfied at that time but those solutions cannot rule now also, due to which they are not up to the mark to give much satisfaction which there by strengthen the faith of users in cloud, and makes Cloud Service Providers to provide the services and make a path to be laid for the coming technologies to utilize the flavors of cloud computing. This paper inculcates the contents related to cloud forensic which are traced out which are being known, to be known. In this paper we have traced out the major causes of Cloud Forensics, and thrown a light on the causes and origins which are helpful for laying a success ladder for Cloud Forensic concepts, and provided relevant content which would be helpful to trace out the solutions which are causing obstacles in the field of Cloud Forensics, utilizing which one can get an overview of the challenges and if considered can definitely lead to a good solution methods which if implemented in a proper way can lead to recovery of lost data as well as to know the real cause of the effect and also in order to reduce their effect.
- Published
- 2017
- Full Text
- View/download PDF
16. User's Behavior Trust Evaluate Algorithm Based on Cloud Model
- Author
-
Li Jun-Jian and Tian Li-qin
- Subjects
Cloud computing security ,business.industry ,Computer science ,Analytic hierarchy process ,Cloud computing ,Certification ,Cloud user ,Computer security ,computer.software_genre ,Security controls ,Cloud testing ,Entropy (information theory) ,business ,Algorithm ,computer - Abstract
Cloud computing is developing rapidly and the open environment in cloud computing is much more complex and unpredictable than other applications, so just providing the identity certification cannot ensure the security of cloud user and cloud service provider, in order to find a effective way to ensure cloud security, we have to solve the problem of trustiness of cloud user's behavior first, in this paper, we propose a dynamic trust evaluate method to deal with cloud user's bahavior, through using Entropy Method to reflect the essential regular patterm of user's behavior evidence, making the evaluate way become a dynamic model, weaken the subjectivity of simply using AHP, moreover, still need AHP to make the result fit people's subjective experience, so we also put forward a integrate algorithm that combine Entropy Method and AHP, in this way, the final evaluate value will keep the balance between objective and subjective and provide quantitative analysis foundation for security control, The simulation shows that the dynamic trust evaluate method can effectively distinguish user's abnormal behavior.
- Published
- 2015
- Full Text
- View/download PDF
17. Literature Review: ICT, SDPs and System Design for User Needs
- Author
-
Martin Bergaus
- Subjects
Knowledge management ,Multimedia ,Computer science ,Service delivery framework ,Information and Communications Technology ,business.industry ,Information system ,Systems design ,Cloud user ,User needs ,computer.software_genre ,business ,computer - Abstract
Chapter 2 provides a literature review, together with theoretical topics pertaining to Information System Theory, Information and Communication Technologies (ICT), Service Delivery Platforms and System Design for User needs, and relates current literature to all of the these topics within this investigation.
- Published
- 2015
- Full Text
- View/download PDF
18. A cloud user behavior authentication model based on multi-partite graphs
- Author
-
Tian Junfeng and Cao Xun
- Subjects
Authentication ,business.industry ,Computer science ,Cloud computing ,Cloud user ,Computer security ,computer.software_genre ,Order (business) ,Credibility ,Identity (object-oriented programming) ,False positive rate ,Layer (object-oriented design) ,business ,computer ,Computer network - Abstract
The trustiness of cloud platform is the key issues relating to its success or failure, and the authentication of the trustiness of user behavior is an important part of ensuring the credibility of cloud platform. In order to solve the problem of trustiness of cloud users' behaviors, a cloud user behavior authentication model based on multi-partite graphs is proposed, including the layer of user behavior evidence, the layer of building behavior multi-partite graphs and the layer of behavior authentication; Identity re-certification and Risk Game are introduced to enhance security and accuracy of the model. Simulation experiments show that, the model is accurate and effective in measuring the normal behavior of cloud users and in distinguishing malicious user with the risk user, and has a higher detection ratio and a lower false positive ratio.
- Published
- 2013
- Full Text
- View/download PDF
19. Doubling Runtime Estimations to Improve Performance of Backfill Algorithms in Cloud Metaschedular Considering Job Dependencies
- Author
-
Ankur Jindal and P. Sateesh Kumar
- Subjects
Job scheduler ,business.industry ,Computer science ,Distributed computing ,In real life ,Cloud computing ,First come first serve ,Cloud user ,Runtime estimation ,business ,computer.software_genre ,Algorithm ,computer - Abstract
Job scheduling is a very challenging issue in cloud computing. Traditional backfill algorithms such as Easy and conservative are extensively used as job scheduling algorithms. Backfill algorithms require the shorter job to come forward if sufficient resources for the execution of this job are available and run in parallel with the currently running jobs provided it does not delay the next queued jobs. This technique is highly dependent on runtime estimations of job execution. Moreover in real life scenario it has seen that submitted job’s may or may not be independent to each other. In this paper we have proposed a technique that uses dynamic grouping method to consider job dependencies and doubling runtime estimation method in cloud metaschedular to improve performance of backfill algorithm. Results have shown that doubling runtime estimations can significantly improve performance of backfill scheduling algorithms provided that the runtime estimations are correct.
- Published
- 2013
- Full Text
- View/download PDF
20. Pattern Matching Based Forecast of Non-periodic Repetitive Behavior for Cloud Clients
- Author
-
Frédéric Desprez, Eddy Caron, Adrian Muresan, Laboratoire de l'Informatique du Parallélisme (LIP), Centre National de la Recherche Scientifique (CNRS)-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École normale supérieure - Lyon (ENS Lyon), Algorithms and Software Architectures for Distributed and HPC Platforms (AVALON), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire de l'Informatique du Parallélisme (LIP), Université de Lyon-École normale supérieure - Lyon (ENS Lyon)-Centre National de la Recherche Scientifique (CNRS)-Université de Lyon-Université Claude Bernard Lyon 1 (UCBL), École normale supérieure de Lyon (ENS de Lyon)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS), Université de Lyon-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure de Lyon (ENS de Lyon)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université de Lyon-Centre National de la Recherche Scientifique (CNRS), École normale supérieure - Lyon (ENS Lyon)-Université Claude Bernard Lyon 1 (UCBL), and Université de Lyon-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Lyon (ENS Lyon)-Université Claude Bernard Lyon 1 (UCBL)
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,020206 networking & telecommunications ,Workload ,Cloud computing ,02 engineering and technology ,Cloud user ,computer.software_genre ,Workload prediction ,Repetitive behavior ,Resource (project management) ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Data mining ,Pattern matching ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,business ,Scaling ,computer ,Software ,Information Systems - Abstract
International audience; The Cloud phenomenon brings along the cost-saving benefit of dynamic scaling. As a result, the question of efficient resource scaling arises. Prediction is necessary as the virtual resources that Cloud computing uses have a setup time that is not negligible. We propose an approach to the problem of workload prediction based on identifying similar past occurrences of the current short-term workload history. We present in detail the Cloud client resource auto-scaling algorithm that uses the above approach to help when scaling decisions are made, as well as experimental results by using real-world Cloud client application traces. We also present an overall evaluation of this approach , its potential and usefulness for enabling efficient auto-scaling of Cloud user resources.
- Published
- 2011
- Full Text
- View/download PDF
21. Building feedback rating-based reputation system for trusted delivery of cloud services
- Author
-
Chao Yan, Jiancheng Ni, and Lianyong Qi
- Subjects
Service quality ,business.industry ,Computer science ,Data_MISCELLANEOUS ,Cloud computing ,Cloud user ,Computer security ,computer.software_genre ,ComputingMilieux_GENERAL ,World Wide Web ,Cloud provider ,Reputation system ,Scalability ,Cloud architecture ,business ,computer - Abstract
Due to the open and dynamic nature of cloud environment, the service quality of a cloud service is not always trusted as advertised by cloud provider. Feedback rating-based reputation system is an effective approach to determine the trust of a cloud service. Unfortunately, a comprehensive reputation system is absent from present major cloud providers and not supported by present major cloud providers, e.g., Amazon, Google and Microsoft, which hampers a cloud user from selecting a trusted cloud service. In view of this challenge, in this paper, we first study why reputation system is absent from cloud, from perspectives of cloud provider and cloud user respectively. Afterwards, taking e-Commerce experience for reference, we put forward a novel reputation system tailored to cloud service delivery, i.e., R3 (Rating-Review-based Reputation system, R3). The proposed R3 is scalable towards more personalized cloud delivery applications, and can be easily integrated into the present cloud architecture. KeywordsTrust; Feedback rating; Reputation system; Service quality; cloud service
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.