Skip to main content

Advertisement

Log in

Trust Evaluation of Public Cloud Service Providers Using Genetic Algorithm with Intelligent Rules

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The need of cloud services are rapidly increased due to resource constraints in storing the data in local environment. With that the need for securing the information stored in the cloud environment is also emerge as another important task. The users need a secure and trusted system to store and retrieve the data with cost consumption. And also, there is need to evaluate the trust value of the service provider. While the server scheduling the task to the user, it has to check the trust of service provider. In this work, the trust value of the service provider is evaluated by enhancing the standard Genetic Algorithm with Intelligent Rules. It makes the proposed system which evaluates the trust based on the parameters such as reputation, accreditation, service availability, auditing and self-assessment. Intelligent rules are included here which influences the SGA with single parameter. Specifically, the rules are applied here to predict the unpredictability using their dynamic solution providing strategy based on the Intelligent Rules helping to provides the solution to the complex dynamic systems where the most of unpredictability events occurs. Here, the Intelligent Rules combined with SGA to evaluate the trust value of the service providers either in cloud server or in cloudlets. Based on the trust value, the users can access the services without any hesitation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Tian, LQ, Lin, C & Ni, Y 2010, ‘Evaluation of user behavior trust in cloud computing’. International Conference on Computer Application and System Modeling (ICCASM), IEEE.vol. 7, pp. V7–567

  2. Habib, SM, Ries, S &Muhlhauser, M 2011, ‘Towards a trust management system for cloud computing’. IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 933–939

  3. Selvakumar, K., SaiRamesh, L., Sabena, S., & Kannayaram, G. (2019). Cloud Computing-TMACS: A robust and verifiable threshold multi-authority access control system in Public Cloud storage smart intelligent computing and applications (pp. 365–373). Springer

    Google Scholar 

  4. Chen, Z., Tian, L., & Lin, C. (2018). Trust evaluation model of cloud user based on behavior data. International Journal of Distributed Sensor Networks, 14(5), 1–10

    Google Scholar 

  5. Wu, X. (2018). Study on trust model for multi-users in Cloud computing. IJ Network Security, 20(4), 674–682

    Google Scholar 

  6. Ghazizadeh, E., & Cusack, B. (2018). Evaluation theory for characteristics of cloud identity trust framework cloud computing-technology and practices. IntechOpen

    Google Scholar 

  7. SaiRamesh, L., Sabena, S., Thangaramya, K., & Kulothungan, K. (2016). Trusted multi-owner data sharing among dynamic users in public cloud. Australian Journal of Basic and Applied Sciences, 10(2), 315–319

    Google Scholar 

  8. Bendale, Y., & Shah, S. (2013). User level trust evaluation in cloud computing’. International Journal of Computer Applications, 69(24), 31

    Article  Google Scholar 

  9. Govindaraj, P., & Jaisankar, N. (2017). A review on various trust models in Cloud environment. Journal of Engineering Science & Technology Review, 10(2), 213

    Article  Google Scholar 

  10. Li, X., He, J., Zhao, B., Fang, J., Zhang, Y., & Liang, H. (2016). A method for trust quantification in cloud computing environments. International Journal of Distributed Sensor Networks, 12(2), 502–14

    Google Scholar 

  11. Li, Y., Dai, W., Ming, Z., & Qiu, M. (2016). Privacy protection for preventing data over-collection in smart city. IEEE Transactions on Computers, 65(5), 1339–1350

    Article  MathSciNet  Google Scholar 

  12. Reshmi, V. S., & Challagidad, P. S. (2017). Secured trust model in Cloud Computing-A review. International Journal of Engineering Research & Technology (IJERT), 5(06), 1–5

    Google Scholar 

  13. Sathiyavathi, V., Reshma, R., Parvin, S. S., SaiRamesh, L., & Ayyasamy, A. (2019). Dynamic trust based secure multipath routing for mobile ad-hoc networks intelligent communication technologies and virtual mobile networks (pp. 618–625). Springer

    Google Scholar 

  14. Kamalanathan, S., Lakshmanan, S. R., & Arputharaj, K. (2017). Fuzzy-clustering-based intelligent and secured energy-aware routing handbook of research on fuzzy and rough set theory in organizational decision making (pp. 24–37). IGI Global

    Book  Google Scholar 

  15. Chen, Z., Tian, L., & Lin, C. (2018). Trust evaluation model of cloud user based on behavior data. International Journal of Distributed Sensor Networks, 14(5), 1550147718776924

    Google Scholar 

  16. Nagarajan, Rajganesh, S. Selvamuthukumaran, and Ramkumar Thirunavukarasu. "A fuzzy logic based trust evaluation model for the selection of cloud services" In 2017 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–5. IEEE, 2017

  17. Jaithunbi, A. K., Sabena, S., & Sairamesh, L. (2019). "Secure and energy efficient data sharing in Public Cloud through mobile devices. Journal of Electrical Engineering, 19(4), 9–9

    Google Scholar 

  18. Wang, T., Luo, H., Jia, W., Liu, A., & Xie, M. (2019). MTES: An intelligent trust evaluation scheme in sensor-cloud-enabled industrial Internet of Things. IEEE Transactions on Industrial Informatics, 16(3), 2054–2062

    Article  Google Scholar 

  19. Hassan, H., El-Desouky, A. I., Ibrahim, A., El-Kenawy, El.-S.M., & Arnous, R. (2020). Enhanced QoS-based model for trust assessment in cloud computing environment. IEEE Access, 8, 43752–43763

    Article  Google Scholar 

  20. Selvakumar, K., & Sai Ramesh, L. (2021). Fuzzy expert system-based node trust estimation in wireless sensor networks inventive computation and information technologies (pp. 435–444). Springer

    Google Scholar 

  21. Jayakumar, J., Sairamesh, L., Pandiyaraju, V., Muthurajkumar, S., & Rakesh, R. (2015). Secure data storage using decentralized access control in cloud. Advances in Natural and Applied Sciences, 9(6SE), 192–197

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to L. SaiRamesh.

Ethics declarations

Conflict of interest

The authors declare that they do not have any conflict of interests.

Human and Animal Rights

This research does not involve any human or animal participation. All authors have checked and agreed the submission.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jaithunbi, A.K., Sabena, S. & SaiRamesh, L. Trust Evaluation of Public Cloud Service Providers Using Genetic Algorithm with Intelligent Rules. Wireless Pers Commun 121, 3281–3295 (2021). https://doi.org/10.1007/s11277-021-08876-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08876-4

Keywords

Navigation