A novel trust management framework for multi-cloud environments based on trust service providers

被引:65
作者
Fan, Wenjuan [1 ,2 ]
Perros, Harry [2 ]
机构
[1] Hefei Univ Technol, Sch Management, Hefei, Anhui, Peoples R China
[2] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
Trust management; Trust service provider; Multi-cloud; Subjective trust and objective trust; Trust propagation; COMPUTING ENVIRONMENTS;
D O I
10.1016/j.knosys.2014.07.018
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we address the problem of trust management in multi-cloud environments based on a set of distributed Trust Service Providers (TSPs). These are independent third-party providers/trust agents, trusted by Cloud Providers (CPs), Cloud Service Providers (CSPs) and Cloud Service Users (CSUs), that provide trust related services to cloud participants. TSPs are distributed over the clouds, and they elicit raw trust evidence from different sources and in different formats. This evidence is information regarding the adherence of a CSP to a Service Level Agreement (SLA) for a cloud-based service and the feedback sent by CSUs. Using this information, they evaluate an objective trust and a subjective trust of CSPs. TSPs communicate among themselves through a trust propagation network that permits a TSP to obtain trust information about a CSP from other TSPs. Experiments show that our proposed framework is effective and relatively stable in differentiating trustworthy and untrustworthy CSPs in a multi-cloud environment. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:392 / 406
页数:15
相关论文
共 61 条
[1]   Establishing Trust in Hybrid Cloud Computing Environments [J].
Abawajy, Jemal .
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, :118-125
[2]   Determining Service Trustworthiness in Intercloud Computing Environments [J].
Abawajy, Jemal .
2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, :784-788
[3]  
Abbadi Imad M., 2011, Information Security Technical Report, V16, P108, DOI 10.1016/j.istr.2011.08.006
[4]  
Alhamad Mohammed, 2010, Proceedings of the 13th International Conference on Network-Based Information Systems (NBiS 2010), P321, DOI 10.1109/NBiS.2010.67
[5]  
[Anonymous], 2009, P 8 INT C AUT AG MUL
[6]  
[Anonymous], INT J ENG RES APPL I
[7]  
[Anonymous], 2004, P 13 INT C WORLD WID, DOI DOI 10.1145/988672.988727
[8]  
[Anonymous], 2002, P 1 INT JOINT C AUT
[9]  
[Anonymous], 2010, 2010 IEEE 2 INT C CL, DOI DOI 10.1109/CLOUDCOM.2010.66
[10]  
[Anonymous], SOFTWARE PRACTICE EX