Skip to main content
Log in

Risk analysis of cloud service providers by analyzing the frequency of occurrence of problems using E-Eclat algorithm

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Cloud is a large scale distributed system where the resource provisioning is a challenging and important problem. It may be statically or dynamically provisioned and must meet the QoS parameters such as throughput, availability, security, transit delay and thereby ensuring SLA. Nowadays the number of service providers tends to increase tremendously in the market, hence selecting an optimal service provider is a tedious process which leads to trust a third party known as cloud service brokers. They analyzes the problems with the provider and explores the providers to the consumers to make the service available. But the risks with the providers are not known by the consumers and as well as the trusted cloud service brokers. Hence the proposed work indulges in finding the risk with the providers in the broker’s registry by analyzing the past histories of them. The analysis will be carried out for a period of time for all the providers and the most important problems that occur during the period will be considered for prioritizing the providers. Hence this paper proposes a novel Enhanced Eclat algorithm for finding the frequent problems at the providers level and also the frequency of occurrence of the same with each provider. The proposed E-Eclat algorithm is compared with two other algorithms and found that it consumes reduced time than other algorithms. It is also observed that the complexity is much low than other two algorithms as transpose scanning is used.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Mouratidis, H., Islam, S., Kalloniatis, C., & Gritzalis, S. (2013). A framework to support selection of cloud providers based on security and privacy requirements. The Journal of Systems and Software, 83, 2276–2293.

    Article  Google Scholar 

  2. Sun, L., Dong, H., Hussain, F. K., Hussain, O. K., & Chang, E. (2014). Cloud service selection: State-of-the-art and future research directions. Journal of Network and Computer Applications, 45, 134–150.

    Article  Google Scholar 

  3. Fan, W., & Perros, H. (2014). A novel trust management framework for multi-cloud environments based on trust service providers. Knowledge-Based Systems, 70, 392–406.

    Article  Google Scholar 

  4. Javed, B., Bloodsworth, P., Rasool, R., Munir, K., & Rana, O. (2015). Cloud market maker: An automated dynamic pricing marketplace for cloud users. Future Generation Computer Systems, 54, 52–67.

    Article  Google Scholar 

  5. Wang, X., Cao, J., & Xiang, Y. (2014). Dynamic cloud service selection using an adaptive learning mechanism in multi-cloud computing. The Journal of Systems and Software, 100, 195–210.

    Article  Google Scholar 

  6. Sun, L., Ma, J., Zhang, Y., Dong, H., & Hussain, F. K. (2015). Cloud-FuSeR: Fuzzy ontology and MCDM based cloud service selection. Future Generation Computer Systems, 57, 42–55.

    Article  Google Scholar 

  7. Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012–1023.

    Article  Google Scholar 

  8. Grandison, T., & Sloman, M. (2000). A survey of trust in internet applications. IEEE Communications Surveys and Tutorials, 3, 2–16.

    Article  Google Scholar 

  9. Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618–644.

    Article  Google Scholar 

  10. Sato, H., Kanai, A., & Tanimoto, S. (2010). A cloud trust model in a security aware cloud. In Proceedings of 10th IEEE/IPSJ international symposium on applications and the internet (SAINT) (pp. 121–124). IEEE.

  11. Li, X., Zhou, L., Shi, Y., & Guo, Y. (2010). A trusted computing environment model in cloud architecture. In Proceedings of 2010 international conference on machine learning and cybernetics (ICMLC) (Vol. 6, pp. 2843–2848). IEEE.

  12. Schryen, G., Volkamer, M., Ries, S., & Habib, S. M. (2011) A formal approach towards measuring trust in distributed systems. In Proceedings of the 2011 ACM symposium on applied computing (pp. 1739–1745). ACM.

  13. Alhamad, M., Dillon, T., & Chang, E. (2011). A trust-evaluation metric for cloud applications. Proceedings of International Journal of Machine Learning and Computing, 1(4), 416–421.

    Article  Google Scholar 

  14. Noor, T., & Sheng, Q. (2011). Trust as a service: A framework for trust management in cloud environments. In Web information system engineeringWISE 2011 (pp. 314–321).

  15. Abbadi, I. M., & Alawneh, M. (2012). A framework for establishing trust in the cloud. Computers & Electrical Engineering, 38(5), 1073–1087.

    Article  Google Scholar 

  16. Petri, I., Rana, O. F., Silaghi, G. C., & Rezgui, Y. (2014). Risk assessment in service provider communities. Future Generation Computer Systems, 41, 32–43.

    Article  Google Scholar 

  17. Ghosh, N., Ghosh, S. K., & Das, S. K. (2015). SelCSP: A framework to facilitate selection of cloud service providers. IEEE Transactions on Cloud Computing, 3(1),  66–79.

    Article  Google Scholar 

  18. Madria, S., & Sen, A. (2015). Offline risk assessment of cloud service providers. IEEE Cloud Computing, 2, 50–57.

    Article  Google Scholar 

  19. Anitha, R., & Mukherjee, S. (2014). Bloom filter based metadata placement and management in cloud computing. Internationl Journal of Recent Trends in Engineering & Technology, 11, 93–104.

    Article  Google Scholar 

  20. Pacheco, C. (2005). Eclat: Automatic generation and classification of test inputs. Massachusetts: Massachusetts Institute of Technology.

    Google Scholar 

  21. Zak, M. J., Gouda, K. (2003) Fast vertical mining using diffsets. In Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining (pp. 326–335).

  22. Agrawal, R., & Srikant, R. (1994) Fast algorithms for mining association rules in large databases. In Proceedings 20th international conference very large data bases (VLDB "94) (pp. 478–499).

  23. Moens, S., Aksehirli, E., & Goethals, B. (2013). Frequent itemset mining for big data. In IEEE international conference on big data (pp. 111–118).

  24. Huang, Y., & Lin, S. (2003). Mining sequential patterns using graph search techniques. In Proceedings 27th annual international computer software and applications conference (pp. 4–9).

Download references

Acknowledgements

This work is financially supported by Science and Engineering Research Board (SERB), Department of Science and Technology (DST), Government of India, under the Early Career Research Award Scheme. The Grant Number of the project is ECR/2016/000546.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Muralidharan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Muralidharan, C., Anitha, R. Risk analysis of cloud service providers by analyzing the frequency of occurrence of problems using E-Eclat algorithm. Wireless Netw 27, 5587–5595 (2021). https://doi.org/10.1007/s11276-019-02191-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-019-02191-4

Keywords

Navigation