Filters








1,551 Hits in 4.9 sec

Opinion Model Based Security Reputation Enabling Cloud Broker Architecture [chapter]

Pramod S. Pawar, Srijith K. Nair, Fadi El-Moussa, Theo Dimitrakos, Muttukrishnan Rajarajan, Andrea Zisman
2013 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
As a solution we propose a broker architecture model that enables us to build a security reputation framework for cloud service providers, capturing comprehensive evidence of security information to build  ...  its trust and security reputation  ...  Cloud Broker Architecture We introduce a Cloud Broker architecture that enables building of security reputation of individual service provider and sharing the same with its customers.  ... 
doi:10.1007/978-3-319-03874-2_11 fatcat:rxb4tjpidveitdfi5jqhxlgiym

Trust Assessment Using Cloud Broker [chapter]

Pramod S. Pawar, Muttukrishnan Rajarajan, Theo Dimitrakos, Andrea Zisman
2014 IFIP Advances in Information and Communication Technology  
The cloud broker operates in different modes and this enables a variety of trust assessments.  ...  provisions security.  ...  This paper uses the opinion based trust model to perform trust assessment of cloud providers to provide recommendations, security reputation and a group reputation in the different modes of cloud broker  ... 
doi:10.1007/978-3-662-43813-8_18 fatcat:i56p6bbafnh4dfjylfv6kpv4cu

An Effective Way of Evaluating Trust in Inter-cloud Computing

Kiran Mary Matthew, Abdul Quadir Md
2017 International Journal of Computer Network and Information Security  
This is accomplished through trust management systems that calculate the trust rating of clouds from opinions from their peers.  ...  This paper proposes a method to reduce such problems by considering the latest history of communication of a particular cloud and ignore the opinions given by less trusted clouds.  ...  Each broker is responsible for all the resources in its domain. Accuracy concept is used to enable peer review-based mechanisms to function with imprecise trust metrics.  ... 
doi:10.5815/ijcnis.2017.02.05 fatcat:shjkv3w5gjfwbdcm2jro5djopi

Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing

Jie Yuan, Erxia Li, Chaoqun Kang, Fangyuan Chang, Xiaoyong Li
2019 Information  
This new network architecture model can deliver services directly from the cloud to the very edge of the network while providing the best efficiency in mobile networks.  ...  All these ways focus on enhancing the efficiency, stability, and security of MEC services in presenting trustworthy services.  ...  From the perspective of the network architecture, MEC enables some of the cloud computing tasks to be undertaken by edge computing devices.  ... 
doi:10.3390/info10080259 fatcat:zu5n2i3enjczxbbkhr2x3ptg54

Trust Models in Cloud Computing: A Review

Ritu, Sukhchandan Randhawa, Sushma Jain
2017 International Journal of Wireless and Microwave Technologies  
In this paper, a methodical literature analysis of trust management and existing trust models is presented to evaluate trust based on various QoS parameters.  ...  Trust is a vital factor, especially for service oriented systems in the area of Information Technology and Security.  ...  [22] have reported a trust model which is based on a reputation of a cloud provider. This model has used intermediate entities and brokers. This design depends on several brokers in every sphere.  ... 
doi:10.5815/ijwmt.2017.04.02 fatcat:4iizflaylfcshhu4srycwmniim

Secure service interaction for collaborative business processes in the inter-cloud

Björn Schwarzbach, Michael Glöckner, Alexander Pirogov, Martin Max Röhling, Bogdan Franczyk
2015 Proceedings of the 2015 Federated Conference on Computer Science and Information Systems  
The proposed architecture is evaluated with a sample collaborative business process of inter-cloud service interaction.  ...  The paper derives requirements and solutions in the field of inter-cloud service communication with a special focus on security.  ...  The architecture is based on proxies that are managed by a central broker engine.  ... 
doi:10.15439/2015f282 dblp:conf/fedcsis/SchwarzbachGPRF15 fatcat:medkdcu4yvavrarzduey4cmyam

HonestChain: Consortium blockchain for protected data sharing in health information systems

Soumya Purohit, Prasad Calyam, Mauro Lemus Alarcon, Naga Ramya Bhamidipati, Abu Mosa, Khaled Salah
2021 Peer-to-Peer Networking and Applications  
., HIPAA, common data model) distributed data sets that enable predictive analytics.  ...  We evaluate HonestChain using Hyperledger Composer in a realistic simulation testbed on a public cloud infrastructure.  ...  Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the author(s) and do not nec-essarily reflect the views of the National Science Founda-tion.  ... 
doi:10.1007/s12083-021-01153-y pmid:33968293 pmcid:PMC8092970 fatcat:73evd6g73fdjdg357cumnecpoe

Optimal selection techniques for Cloud service providers

Giuseppe Tricomi, Giovanni Merlino, Alfonso Panarello, Antonio Puliafito
2020 IEEE Access  
We had catalogue in three subsets: i) Selection Strategies, ii) Broker-based Architectures and Frameworks and iii) Mathematical Algorithm and Models.  ...  [69] focus on the architecture of the Cloud Coordinator component of the Broker-based architecture presented in Buyya et al. [44] .  ...  He is co-leading the design of Stack4Things IoTronic, an OpenStack-based I/Ocloud framework.  ... 
doi:10.1109/access.2020.3035816 fatcat:5iszso43qzbktmqzayv4k5rodm

Trust mechanisms for cloud computing

Jingwei Huang, David M Nicol
2013 Journal of Cloud Computing: Advances, Systems and Applications  
Trust is a critical factor in cloud computing; in present practice it depends largely on perception of reputation, and self assessment by providers of cloud services.  ...  mechanisms together to reveal chains of trust in the cloud.  ...  http://www.journalofcloudcomputing.com/content/2/1/9 Acknowledgements This material is based upon research sponsored by the U.S. Air Force Research Laboratory (AFRL) and the U.S.  ... 
doi:10.1186/2192-113x-2-9 fatcat:34olggqqxvcatp5vcge3rgns2u

Trusted Computing Model with Attestation to Assure Security for Software Services in a Cloud Environment

Udhayakumar Shanmugam, Latha Tamilselvan
2017 International Journal of Intelligent Engineering and Systems  
The model implements an attestation rule engine based on a Cloud Attestation Protocol (CAP).  ...  Predicting the behavioural patterns of an ambiguous environment is a complex task that could risk the integrity of security architecture if left unnoticed.  ...  Services Cloud Broker 2.  ... 
doi:10.22266/ijies2017.0228.16 fatcat:3sewkjjggrhhjpnqwct3vwbc6m

T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services

Xiaoyong Li, Huadong Ma, Feng Zhou, Wenbin Yao
2015 IEEE Transactions on Information Forensics and Security  
First, a trusted third party-based service brokering architecture is proposed for multiple cloud environment, in which the T-broker acts as a middleware for cloud trust management and service matching.  ...  Oriented by requirement of trust management in multiple cloud environment, this paper presents T-broker, a trustaware service brokering scheme for efficient matching cloud services (or resources) to satisfy  ...  As depicted in Fig. 2 , T-broker architecture, a service brokering system is proposed based on direct monitoring information and indirect feedbacks for the multiple cloud environment, in which T-broker  ... 
doi:10.1109/tifs.2015.2413386 fatcat:333cfuwqm5d4liqp7kchvma4m4

Trust as a facilitator in cloud computing: a survey

Sheikh Habib, Sascha Hauke, Sebastian Ries, Max Mühlhäuser
2012 Journal of Cloud Computing: Advances, Systems and Applications  
for trust and reputation models (or systems) to support the consumers in establishing trust on Cloud providers.  ...  Hence, cloud-related specific parameters (QoS+) are required for the trust and reputation systems in Cloud environments.  ...  Acknowledgements This work is supported by Center for Advanced Security Research Darmstadt (CASED).  ... 
doi:10.1186/2192-113x-1-19 fatcat:pgnqlqjq7rgetn3mwppipg5ere

Resource Allocation Based on Matchmaking Services in Multiple Clouds Using Trustworthy and Scalable Service Providers Algorithm

Palaiyah Solainayagi, Sathyabama Institute of Science and Technology, Ramalingam Ponnusamy, CVR College of Engineering
2019 International Journal of Intelligent Engineering and Systems  
To bring the better solution, Trustworthy and Scalable Service Providers Algorithm is proposed for analyzing the design the relationship among the users, the broker, and cloud service providers.  ...  Proposed method works based on information entropy theory to evaluate the multi-attribute based decision-making. Here, cloud user efficiently can find trustable cloud service providers in advance.  ...  In [17] designed a brokerage-based architecture; where, the cloud brokers are responsible for the service selection.  ... 
doi:10.22266/ijies2019.0831.03 fatcat:lfn2cslojbaxbe5xrowjqucuki

The Cloud Needs a Reputation System [article]

Murad Kablan, Carlee Joe-Won, Sangtae Ha, Hani Jamjoom, Eric Keller
2015 arXiv   pre-print
revenues for high quality service providers by enabling reputation to impact discovery.  ...  In this paper, we introduce Seit, an inter-tenant framework that manages the interactions between cloud services. Seit is a software-defined reputation-based framework.  ...  Section 3 highlights how a reputation-based system can benefit different cloud environments, and also identifies key design challenges. Section 4 describes the architecture of Seit.  ... 
arXiv:1509.09057v1 fatcat:5lo622cterapbm3rdnefgq2cmy

Modeling and Analysis of Cloud Collaborative Commerce

Hussein Al-Bahadili, Awad Al-Sabbah, Muhammad Abu Arqoub
2013 International Journal on Cloud Computing Services and Architecture  
The model consists of six main components, these are: client, provider, auditor, broker, security and privacy, and communications network.  ...  The new cc-commerce model is used to develop a simple and flexible Web-based test tool, namely, the cc-commerce test (3CT) tool.  ...  Finally, the service oriented architecture (SOA) and model-driven architecture (MDA) based-platform for c-commerce is developed to enable value-added collaboration between partners by providing new technical  ... 
doi:10.5121/ijccsa.2013.3101 fatcat:n2adec5zanfjto5tfgoogxn6ye
« Previous Showing results 1 — 15 out of 1,551 results