Advertisement

Trust Computing Model Based on Meta-Heuristic Approach for Collaborative Cloud Environment

  • Pooja Pol
  • V. K. Pachghare
Chapter
  • 32 Downloads
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 637)

Abstract

Collaborative cloud environment required trustworthiness from and to consumer and provides services associated with it. Operations related to consumer’s side are able to send task and crucial data to the cloud data center, that operation raises high trust between both the parties. Large flow of user request becomes complicated and heavy to mange in collaborative computation offered by the cloud. So, inter-service bed must provide and tackle large number of consumer request efficiently and provide or allocated trustworthy resources to associate the request. In this context, precision-based manageable service provider platform with respect to trust is emerging as a vital problem. In this paper, we have proposed a precise and collaborative trust computing mechanism by using meta-heuristic approach for trustworthy cloud computing. In initial module, inter-service platform relay response and request for managing and logging of allocated virtual machine. In the second module, resource selection by using nonlinear objective functions with the help of meta-heuristic approach to improve trust evaluation. All those operation depend on quality parameter. Therefore, in the third module, we proposed QoS prediction by appling learning approach, i.e., neural network to understand historical information in collaborative cloud computing environments. Performance analysis and experimental results verified the feasibility and effectiveness of the proposed scheme.

Keywords

Meta-heuristic optimization Evolutionary algorithms Neural network QoS cloud parameter Trust-based system Cloud computing 

References

  1. 1.
    Ivona, B., Schahram, D.: Grid vs cloud—a technology comparison. Vienna University of Technology, 4 (2011).  https://doi.org/10.1524/itit.2011.0640CrossRefGoogle Scholar
  2. 2.
    Wenjuan, L., Lingdi, P., Qinlong, Q., Qifei, Z.: Research on trust management strategies in cloud computing environment. J. Comput. Inf. Syst. 8(4), 1757–1763 (2012)Google Scholar
  3. 3.
    Parameswari, R., Priya, C., Prabakaran, N.: A trust, privacy and security infrastructure for the inter-cloud. Int. J. Comput. Technol. Appl. 3(2), 691–695 (2012)Google Scholar
  4. 4.
    Talal, N., Quan, S., Sherali, Z., Jian, Y.: Trust management of services in cloud environments: obstacles and solutions. ACM Computing Surveys (2013)Google Scholar
  5. 5.
    Zhi-Yong, Y., Heng-Wei, Z., Kan, N., Jin-Dong, W.: Research on service trust evaluation approach under cloud computing environment. IET (2015)Google Scholar
  6. 6.
    Xianrong, Z.: QoS representation, negotiation and assurance in cloud services. A thesis submitted to the school of computing (2014)Google Scholar
  7. 7.
    Jinbo, X., Ximeng, L., Zhiqiang, Y., Jianfeng, M., Qi, L., Kui, G., Patrick, C.: A secure data self-destructing scheme in cloud computing. IEEE Trans. Cloud. Comput. (2014)Google Scholar
  8. 8.
    Priya, C., Prabakaraan, N.: A research on trusted cloud computing with secure resources for multiple clouds using data coloring. IJIRCCE 3(4) (2015)Google Scholar
  9. 9.
    Salman, M., Ahmedand, T., Neeraj, S.: Trust validation of cloud IaaS: a customer centric approach. IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. (2016)Google Scholar
  10. 10.
    Jingjing, G., Jianfeng, M., Xinghua, L., Junwei, Z., Tao, Z.: An attribute-based trust negotiation protocol for D2D communication in smart city balancing trust and privacy. J. Inf. Sci. Eng. 32 (2016)Google Scholar
  11. 11.
    Bahador, S., Amir, M., Nooruldeen, Q.: Cloud computing service negotiation: a systematic review. Comput. Stand. Interfaces (Jan 2018).  https://doi.org/10.1016/j.csi.2017.08.006CrossRefGoogle Scholar
  12. 12.
    Xiaoyong, L., Yuan, J., Huadong, M., Yao, W.: Fast and parallel trust computing scheme based on big data analysis for collaborative cloud service. IEEE Trans. Inf. Forensics Secur. (Feb 2018).  https://doi.org/10.1109//tfis.2018.2806925

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Pooja Pol
    • 1
  • V. K. Pachghare
    • 1
  1. 1.Department of Computer Engineering and Information TechnologyCollege of Engineering PunePuneIndia

Personalised recommendations