Statistically Enhanced Multi-Dimensional Trust Computing Mechanism for Cloud Computing
نویسندگان
چکیده
Quality of service plays an important role in distributed systems. Cloud computing has been the recent entrant to the distributed system market and has revolutionized computing by changing the way computing resources are accessed and paid for. Users can access cloud services and pay only for the usage similar to utilities. Trust computing systems can be employed for identifying the service providers quality in terms of their adherence to the committed in SLAs. Several trust computing mechanisms have been proposed in literature based on various algorithms and functions. Almost all of them are based on a single performance parameter and modify the trust scores monotonously when performance deviations are reported. This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores. Hence the proposed mechanism is protected from momentary fluctuations in system performances. The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long term system performance than the ones that were computed without the validation of the inputs. Statistically Enhanced MultiDimensional Trust Computing Mechanism for Cloud Computing
منابع مشابه
An Effective Task Scheduling Framework for Cloud Computing using NSGA-II
Cloud computing is a model for convenient on-demand user’s access to changeable and configurable computing resources such as networks, servers, storage, applications, and services with minimal management of resources and service provider interaction. Task scheduling is regarded as a fundamental issue in cloud computing which aims at distributing the load on the different resources of a distribu...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملAn Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling
With the innovation of cloud computing industry lots of services were provided based on different deployment criteria. Nowadays everyone tries to remain connected and demand maximum utilization of resources with minimum timeand effort. Thus, making it an important challenge in cloud computing for optimum utilization of resources. To overcome this issue, many techniques have been proposed ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJMCMC
دوره 5 شماره
صفحات -
تاریخ انتشار 2013