Advertisement

Soft Computing

, Volume 22, Issue 4, pp 1247–1262 | Cite as

Research on the measurement and evaluation of trusted cloud service

  • Zifei Ma
  • Rong Jiang
  • Ming Yang
  • Tong Li
  • Qiujin Zhang
Methodologies and Application

Abstract

The survey shows that most of the potential cloud users worry about the trustworthiness problem of cloud computing service, and this problem has become one of the most important reasons to hinder development of cloud computing. Therefore, it is very necessary to measure and evaluate the trustworthy degree of cloud service provider (CSP). In consideration of lacking the trustworthiness evaluation and measurement studies for CSP, besides this, a few research results have not considered uncertainty and relevance among trustworthiness factors in the measuring process. So, this paper summarizes factors affecting cloud service trustworthiness in terms of six aspects: controllability, visualization, security, reliability, provider viability and user satisfaction, constructs the trustworthy cloud service attribute model, based on this model, proposes to use the Information Entropy and Markov Chain as the trustworthiness evaluation method to establish a model and proves the scientificity and rationality of this method, as well as verifies the feasibility through case analysis.

Keywords

Trusted cloud service Attribute model Measurement model Information Entropy Markov Chain 

Notes

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61263022, 61303234, 61379032 and 71362016), National Social Science Foundation of China (Grant No. 12XTQ012), Science and Technology Innovation Talents Program of Yunnan Province(Grant No. 2015HB038), and the 7th Yunnan University graduate research and innovation project (Grant No. ynuy201426), Science Foundation of Education Department of Yunnan Province (Grant No. 2015J005). The authors would like to thank the anonymous reviewers and the editors for their suggestions.

Compliance with ethical standards

Conflict of interest

The authors declare no conflict of interest.

References

  1. Abawajy J (2011) Establishing trust in hybrid cloud computing environments. In: 2011 IEEE 10th international conference on trust, security and privacy in computing and communications. IEEE Computer Society, Changsha, pp 118–125Google Scholar
  2. Cachin C, Keidar I, Shraer A (2009) Trusting the cloud. ACM SIGACT News 40:1–6CrossRefGoogle Scholar
  3. Canedo ED, de Sousa Junior RT, de Oliveira Albuquerque R (2012) Trust model for reliable file exchange in cloud computing. Int J Comput Sci Inf Technol 4:1–18Google Scholar
  4. Chen YR, Tian LQ, Yang Y (2011) Model and analysis of user behavior based on dynamic game theory in cloud computing. Acta Electron Sin 39:1818–1823 (in Chinese)Google Scholar
  5. Chitra R (2012) Trust based interoperability security protocol for grid and cloud computing. In: 2012 third international conference on computing communication & networking technologies. IEEE Computer Society, Coimbatore, Tamilnadu, IndiaGoogle Scholar
  6. Choi M, Lee C (2015) Information security management as a bridge in cloud systems from private to public organizations. Sustainability 7:12032–12051CrossRefGoogle Scholar
  7. Chong SK, Abawajy J, Ahmad M, Hamid I, Rahmi A (2014) Enhancing trust management in cloud environment. Procedia Soc Behav Sci 129:314–321CrossRefGoogle Scholar
  8. Feng DG, Zhang M, Zhang Y, Xu Z (2011) Study on cloud computing security. J Softw 22:71–83 (in Chinese)CrossRefGoogle Scholar
  9. Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud computing and grid computing 360-degree compared. Grid computing environments workshop. GCE ’08, IEEE, Austin, TX, pp 1–10Google Scholar
  10. Gao YL, Shen BJ, Kong HF (2012) Trust model for cloud computing based on SLA and user ratings. Comput Eng 38:28–30 (in Chinese)Google Scholar
  11. Habib SM, Ries S, Muhlhauser M (2011) Towards a trust management system for cloud computing. 2011 IEEE 10th international conference on trust, security and privacy in computing and communications. IEEE Computer Society, Changsha, China, pp 933–939Google Scholar
  12. Hwang K, Kulkareni S, Hu Y (2009) Cloud security with virtualized defense and reputation-based trust mangement. In: Proceedings of the 2009 eighth IEEE international conference on dependable, autonomic and secure computing. Chengdu, China, pp 717–722Google Scholar
  13. Jiang R (2015) A novel risk metric for staff turnover in a software project based on information entropy. Entropy 17:2834–2852CrossRefGoogle Scholar
  14. Khalil IM, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Computers 3:1–35CrossRefGoogle Scholar
  15. Khan KM, Malluhi Q (2013) Trust in cloud services: providing more controls to clients. Computer 46:94–96CrossRefGoogle Scholar
  16. Kim M, Park SO (2013) Trust management on user behavioral patterns for a mobile cloud computing. Clust Comput 16:725–731CrossRefGoogle Scholar
  17. Kim S-H, Lee I-Y (2015) Study on user authority management for safe data protection in cloud computing environments. Symmetry 7:269–283CrossRefGoogle Scholar
  18. Li W (2014) Certification standards and evaluation methods of trusted cloud service. In: Trusted cloud service summit in 2014, China communications standards association; China academy of telecommunication research of MIIT. Beijing, China, pp 1–15 (in Chinese)Google Scholar
  19. Lou YH, Wang WL (2013) The research of trusted technology under cloud environment. In: 2013 international conference on information science and cloud computing companion (ISCC-C), pp 231–235Google Scholar
  20. Luo HY, Lv P, Liu LZ, Yang X (2014) Enterprises trust comprehensive evaluation based on fussy rough AHP in cloud computing. J Shandong Univ (Nat Sci) 49:111–117 (in Chinese)MathSciNetGoogle Scholar
  21. Lv YX, Tian LQ, Sun SS (2013) Trust evaluation and control analysis of FANP-based user behavior in cloud computing environment. Comput Sci 40:132-135+138 (in Chinese)Google Scholar
  22. Macky M, Baker T, Al-Yasiri A (2012) Security-oriented cloud computing platform for critical infrastructures. Comput Law Secur Rev 28(6):679–686CrossRefGoogle Scholar
  23. Mohammed Alhamad T, Dillon TS, Chang E (2010) SLA-based trust model for cloud computing. In: 2010 13th international conference on network-based information systems, pp 321–324Google Scholar
  24. Pearson S (2013) Privacy, security and trust in cloud computing. In: Privacy and security for cloud computing. Springer, London, pp 3–42Google Scholar
  25. Rong C, Nguyen ST, Jaatun MG, lightning B (2013) A survey on security challenges in cloud computing. Comput Electr Eng 39:47–54CrossRefGoogle Scholar
  26. Sarma A, Girao J (2012) Supporting trust and privacy with an identity-enabled architecture. Future Internet 4:1016–1025CrossRefGoogle Scholar
  27. Shen ZD, Tong Q (2010) The security of cloud computing system enabled by trusted computing technology. In: 2010 2nd international conference on signal processing systems (ICSPS), pp V2-11–V2-15Google Scholar
  28. Sun DW, Chang GR, Sun LN, Wang XW (2011) Surveying and analyzing security, privacy and trust issues in cloud computing environments. Proc Eng 15(1):2852–2856CrossRefGoogle Scholar
  29. Syed Z, Katie C, Christopher G (2014) A trusted third-party (TTP) based encryption scheme for ensuring data confidentiality in cloud environment. Procedia Comput Sci 36:381–386CrossRefGoogle Scholar
  30. Tian LQ (2011) Safety credible analysis and control of network users behavior. Tsinghua University Press, Beijing (in Chinese)Google Scholar
  31. Wang L, Huang MX (2013) Research on trust evaluation of supplier based on gray AHP in cloud computing. Appl Res Comput 30:742-744+750 (in Chinese)Google Scholar
  32. Wu XN, Zhang RL, Zeng B, Zhou SY (2013) A trust evaluation model for cloud computing. Procedia Comput Sci 17:1170–1177Google Scholar
  33. Xiong LZ, Xu ZQ, Gu X (2014) Trusted secure model for data services in cloud computing. J Commun 35:127-137+144 (in Chinese)Google Scholar
  34. Yang C, Li XY, Ling MQ (2012) A trusted cloud service platform architecture. In: 2012 international conference on information science and applications (ICISA), pp 1–6Google Scholar
  35. Zhang YJ (2013) Software trust evaluation model study based on Markov. Hebei University, Hebei (in Chinese)Google Scholar
  36. Zhao XY, Yang Y, Sun LL, Zhang JL (2013) Trust model research for cloud service focused on user experience. J Chin Comput Syst 34:450–452 (in Chinese)Google Scholar
  37. Zhao PT, Han Z, He YZ (2013) SLA-based dynamic trust evaluation for cloud computing. J Beijing Jiaotong Univ 37:80–87 (in Chinese)Google Scholar
  38. Zhou Q, Yu J (2011) Defense system model based on trust for cloud computing. J Comput Appl 31:1531–1535Google Scholar
  39. Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583–592CrossRefGoogle Scholar
  40. Zou DQ, Zhang WR, Qiang WZ, Xiang GF, Yang TR, Jin H, Hu K (2013) Design and implementation of a trusted monitoring framework for cloud platforms. Future Gener Comput Syst 29:2092–2102CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2016

Authors and Affiliations

  • Zifei Ma
    • 2
  • Rong Jiang
    • 1
  • Ming Yang
    • 1
  • Tong Li
    • 2
  • Qiujin Zhang
    • 2
  1. 1.School of InformationYunnan University of Finance and EconomicsKunmingChina
  2. 2.School of SoftwareYunnan UniversityKunmingChina

Personalised recommendations