Opinion Model Based Security Reputation Enabling Cloud Broker Architecture
Conference paper
- 1 Citations
- 1k Downloads
Abstract
Security and trust in service providers is a major concern in the use of cloud services and the associated process of selecting a cloud service provider that meets the expectations and needs of one’s security requirements is not easy. As a solution, we propose a broker architecture model that enables us to build a security reputation framework for cloud service providers, capturing comprehensive evidence of security information to build its trust and security reputation.
Keywords
broker reputation subjective logic securityPreview
Unable to display preview. Download preview PDF.
References
- 1.Alhamad, M., Dillon, T., Chang, E.: SLA-Based Trust Model for Cloud Computing 13th International Conference on Network-Based Information Systems (2010)Google Scholar
- 2.Dumitrescu, C., Raicu, I., Foster, I.: DI-GRUBER: A Distributed Approach to Grid Resource Brokering. In: Proceedings of the ACM/IEEE Conference on Supercomputing (2005)Google Scholar
- 3.Ferrer, A.J., Hernández, F., Tordsson, J., Elmroth, E., Ali-Eldin, A., Zsigri, C., Sirvent, R., Guitart, J., Badia, R.M., Djemame, K., Ziegler, W., Dimitrakos, T., Nair, S.K., Kousiouris, G., Konstanteli, K., Varvarigou, T., Hudzia, B., Kipp, A., Wesner, S., Corrales, M., Forgó, N., Sharif, T., Sheridan, C.: OPTIMIS: a Holistic Approach to Cloud Service Provisioning. Future Generation Computer Systems 28(1), 66–77 (2012)CrossRefGoogle Scholar
- 4.Gourlay, I., Djemame, K., Padgett, J.: Reliability and Risk in Grid Resource Brokering. In: IEEE International Conference on Digital Ecosystems and Technologies (DEST) (2008)Google Scholar
- 5.Hwang, K., Kulkarni, S., Hu, Y.: Cloud Security with Virtualized Defense and Reputation-based Trust Management. In: Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (2009)Google Scholar
- 6.Jin, Y., Bloch, P., Cameron, G.: A Comparative Study: Does the Word-of-mouth Communications and Opinion Leadership Model Fit Epinions on the Internet? In: Proceedings of the Hawaii International Conference on Social Sciences (2002)Google Scholar
- 7.Jøsang, A.: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)MathSciNetCrossRefzbMATHGoogle Scholar
- 8.Jøsang, A., Ismail, R.: The Beta Reputation System. In: Proceedings of the 15th Bled Electronic Commerce Conference e-Reality: Constructing the e-Economy (2002)Google Scholar
- 9.Kerr, R., Cohen, R.: Modeling trust using transactional, numerical units. In: PST 2006: Proceedings of the Conference on Privacy, Security and Trust, Markham, Canada (2006)Google Scholar
- 10.Li, F., Wu, J.: Uncertainty Modeling and Reduction in MANETs. IEEE Transactions on Mobile Computing 9(7) (2010)Google Scholar
- 11.Nair, S.K., Porwal, S., Dimitrakos, T., Ferrer, A.J., Tordsson, J., Sharif, T., Sheridan, C., Rajarajan, M., Khan, A.U.: Towards Secure Cloud Bursting, Brokerage and Aggregation. In: IEEE 8th European Conference Web Services (ECOWS) (2010)Google Scholar
- 12.Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank Citation Ranking: Bringing Order to the Web, Technical report, Stanford Digital Library Technologies Project (1998)Google Scholar
- 13.Pawar, P.S., Rajarajan, M., Nair, S.K., Zisman, A.: Trust model for optimized cloud services. In: Dimitrakos, T., Moona, R., Patel, D., McKnight, D.H. (eds.) IFIPTM 2012. IFIP AICT, vol. 374, pp. 97–112. Springer, Heidelberg (2012)CrossRefGoogle Scholar
- 14.Ray, I., Poolsappasit, N., Dewri, R.: An Opinion Model for Evaluating Malicious Activities in Pervasive Computing SystemsGoogle Scholar
- 15.Resnick, P., Zeckhauser, R.: Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay’s Reputation System. In: Baye, M.R. (ed.) The Economics of the Internet and E-Commerce. Advances in Applied Microeconomics, vol. 11, pp. 127–157. Elsevier Science, AmsterdamGoogle Scholar
- 16.Resnick, P., Zeckhauser, R., Swanson, J., Lockwood, K.: The Value of Reputation on Ebay: A Controlled Experiment. Experimental Economics 9(2), 79-101(23) (2006)Google Scholar
- 17.Schneider, J., Kortuem, G., Jager, J., Fickas, S., Segall, Z.: Disseminating trust information in wearable communities. Personal and Ubiquitous Computing 4(4), 245–248, doi:10.1007/BF02391568Google Scholar
- 18.Srivatsa, M., Liu, L.: Secure Event Dissemination in Publish-Subscribe Networks. In: 27th International Conference on Distributed Computing Systems (ICDS 2007) (2007)Google Scholar
- 19.Venugopal, S., Buyya, R., Winton, L.: A Grid Service Broker for Scheduling e-Science Applications on Global Data Grids. In: Concurrency and Computation: Practice and Experience, vol. 18(6), pp. 685–699. Wiley Press, New York (2006)Google Scholar
- 20.Wang, Y., Singh, M.P.: Evidence-Based Trust: A Mathematical Model Geared for Multiagent Systems. ACM Transactions on Autonomous and Adaptive Systems, Vol 5(4), Article 14 (2010)Google Scholar
- 21.Wu, P., Wu, G.: A Reputation-Based Trust Model for P2P Systems. In: International Conference on Computational Intelligence and Security (2009)Google Scholar
- 22.http://csrc.nist.gov/publications/PubsSPs.html#800-145. The NIST Definition of Cloud Computing. Special Publication 800-145
Copyright information
© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2013