SlideShare a Scribd company logo
1 of 41
Service Operator-aware Trust Scheme for Resource
Matchmaking across Multiple Clouds
Presented by
Jisa Joy
Guided by
Er. Asha Yeldose
ABSTRACT
 Service Operator-aware Trust Scheme (SOTS)[multi-dimentional
resource service operator]
 For resource matchmaking across multiple clouds
 Explain relationship between the users, broker, the service
resources(middleware framework of trust)
 Reduce user burden and improve system dependability
 Model the problem of trust evaluation by multi-attribute decision-making
 Develop an adaptive trust evaluation approach on information entropy
theory
 To overcome the limitations of traditional trust schemes
 the broker can efficiently and accurately prepare the most trusted resources
 provide more dependable resources to users
What is cloud computing??
INTRODUCTION
Service
provider
user
Requests
provides
Trust
Fig :- Basic model of Trust
EXISTING SYSTEM
user
Service
provider
Cloud
Broker
provides
Requests
Fig :- Trust model with Cloud Broker
1.Focused on a trust-aware brokering framework for multi-
cloud environments
user
Service
provider
provides
Requests
Trust vectors
Availability Reliability
Security
Fig :- Trust model using Trust vectors
2. Focused on expanded trust model based on dynamic service factors
of a cloud resource
 Trustworthiness of a cloud resource :-
- Gi << trustworthiness of a resource i
- Rci, Rui, Ti, Si << reliability operators of a resource
- wRc, wRu, wT , wS <<weights for these operators
3.Some schemes lack adaptability with a trust fusion calculation
on multi-dimensional service operators
• Avoiding the effect of individual favoritism on weight allocation
• Give inaccurate results in trust evaluation
TRUST SCHEMES
 Reputations-based schemes
 Self-assessment schemes.
 TTP-based schemes
Reputation Based system
Service
providers
user
Fig :- Reputation Based Scheme
databasedatabase database database
Service
providers
database databasedatabase
Historical server
information
user
Fig:- Self-assessment schemes
Service
providers
Service provider1
Availability
Reliability
Security
Service provider3
Availability
Reliability
Security
Service provider2
Availability
Reliability
Security
TTP
Fig:- TTP-based schemes
User
PROPOSED SYSTEM
 Inspired from an idea
- Service Operator-aware Trust Scheme (SOTS)
Definitions for Trust :-
1) Trust of a resource :-
Qualification of
a resource
Historical
service operator
Trust
2) TTP-based Trust Relationship
Matchmaker
User Service
Operator
TrustTrust
3) Trust Evaluation Factors
Service
Providers
Service
Providers
Service
Providers
Cloud Broker
Evaluation
Availability
Reliability
Security
Conceptual Model
Trust-aware Brokering System
Architecture
Cloud Broker Trust Evaluation
Availability Security
Reliability
Fig :- Real-time and dynamic service operators
 Direct Operators
 Indirect Operators
Availability measurement
Fig :- Example of the hardware capacity.
Direct Operators
Security measurement
Fig :- Security level evaluation
Reliability measurement
For a resource performing g computing tasks within time window Δt
- B(i) is the i-th measured value of the network bandwidth
- C(i) is the i-th measured value of the CPU utilization rate
- M(i) is the i-th measured value of the memory utilization rate
- H(i) is the i-th measured value of the hard disk utilization rate
- R(i) is the i-th measured value of the response time
I4 to I9- Indirect Operators
S(Δt) is the number of successful interactions
U(Δt) is the number of unsuccessful interactions.
ADAPTIVE AND EFFICIENT
TRUST EVALUATION
 Evaluation Matrix Normalization
 Real-trust Trust Degree (RTD)
 Entropy-based and Adaptive Weight Calculation
 Global Trust Degree (GTD)
Evaluation Matrix Normalization
 In j-th time-stamp window Δtj
 n cloud resources are assumed to require evaluation
n= {x1, x2, · · · , xz, · · · , xn}
Case 1:- xzk is a positive increasing value
- CPU frequency
- memory size
- hard disk capacity
- Average network bandwidth
where max(xzk) and min(xzk) are the maximum and minimum
values of row operator xzk
1
Case 2 :- xzk is a positive decreasing value
 Small value of ztk expect; this value only covers
the average response time
where max(xzk) and min(xzk) are the maximum and minimum
values of row operator xzk,
2
Normalized Trust Operator :-
3
Real-trust Trust Degree (RTD)
 Evaluate recent cloud resource service operators
 Evaluated by resource’s quality of service
- time window-based trusted indicator for service operators
- more sensitive to new operators
- generates time window interaction takes place b/w user and
resource
 Definition :-
Ω = {N1,N2, · · · ,Nn} denotes n registered resources in the broker
TNz(Δtj) denote the RTD of resource Nn
TNz(Δtj) = rz × W
rz=(rz1, rz2, · · · , rzk, · · · , rzm),
W = { 1, 2, · · · ,ϖ ϖ ϖk, · · ·ϖm} ϖk [0, 1],∈
Entropy-based and Adaptive Weight
Calculation
 Adaptive data fusion tool
 A low time and space overhead in dealing with large-scale data
 Definition, Theorem 1 :-
- X with possible values e1, e2, · · · en is H(X) = E(S(X)).
- E is the expected value function
- S(X) is the information content or self-information of X
(S(X) = logb(1/p(xt))
- p(et) denotes the probability mass
4
Theorem 2 :-
 I = {I1, I2, · · · , Ik, · · · , Im} = {r1k, r2k, · · · , rzk, · · · , rnk}
 Ik denotes row attribute k k={1,2,3,…….m}
K=1/ln m
Then entropy value of H(Ik) calculated by the each value of weight
{ 1, 2, · · · ,ϖ ϖ ϖk, · · ·ϖm}
5
6
7
Global Trust Degree (GTD)
 Time window v = (Δt1,Δt2, · · · ,Δtn)
 Time series D = {TNi(Δt1), TNi(Δt2), · · · , TNi(Δtn)}
A = {a(Δt1), a(Δt2), · · · , a(Δtj), · · · , a(Δtn)}
a(Δtj) [0, 1] is the weights assigned∈ to each RTD TNi(Δtj)
λ [0, 1]∈
8
9
Theorem 1:-
In A = {a(Δt1), a(Δt2), · · · , a(Δtj), · · · , a(Δtn)}
2 time stamps are used :-
Δtj
Δtk
Time Based attenuation property :-
a(Δtj) < a(Δtk)
Time complexity :-
O(g)+O(mn)+O(m)+O(n2)+O(n) = O(g)+O(mn)+O(n2).
Conclusion
Here explains a new scheme knows as SOTS
 For resource matchmaking across multiple clouds
 Explain relationship between the users, broker, the service
resources(middleware framework of trust)
 Reduce user burden and improve system dependability
 Model the problem of trust evaluation by multi-attribute decision-making
 Develop an adaptive trust evaluation approach on information entropy
theory
 To overcome the limitations of traditional trust schemes
 the broker can efficiently and accurately prepare the most trusted resources
 provide more dependable resources to users
Advantages
 Trust management scheme for multi-cloud, multi-dimensional resource
services
 Adaptive fused computing approach for dynamic service operators,
entropy theory
 FSLA mechanism overcomes trust initialization problem for newly
registered resources.
Disadvantages and Future Scope
1) Combining trust scheme with reputation management to concerns users’
feedback
2) Universal measurement and quantitative method to assess the security
levels of a resource
3) Evaluation of the proposed scheme in a larger-scale multiple cloud
environment
Applications
References
1. K. M. Khan, Q. Malluhi, “Establishing Trust in Cloud Comput-ing”,
IEEE IT Professional, vol. 12, no. 5, 2010, pp. 20-27.
2. K. Hwang, D. Li, “Trusted Cloud Computing with Secure Resources and
Data Coloring”, IEEE Internet Computing, vol. 14, no. 5, 2010, pp. 14-
22.
3. H. Kim, H. Lee, W. Kim, Y. Kim, “A Trust Evaluation Model for QoS
Guarantee in Cloud Systems”, International Journal of Grid and
Distributed Computing, vol.3, no.1, pp. 1-10, 2010.
4. P. D. Manuel, S. Thamarai Selvi, M. I. A. E. Barr, “Trust management
system for grid and cloud resources”, Proc. of the First International
Conference on Advanced Computing (ICAC 2009), 2009, 13-15 Dec, pp.
176-181.
END OF PRESENTATION
THANK YOU…...
ANY DOUBTS ??…..

More Related Content

What's hot

Grid computing standards
Grid computing standardsGrid computing standards
Grid computing standardsPooja Dixit
 
Ogsa ogsi-a more detailed view
Ogsa ogsi-a more detailed viewOgsa ogsi-a more detailed view
Ogsa ogsi-a more detailed viewPooja Dixit
 
secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.Venkat Projects
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudsibidlegend
 
Ogsi practicalview
Ogsi practicalviewOgsi practicalview
Ogsi practicalviewPooja Dixit
 
Ieeepro techno solutions ieee java project - budget-driven scheduling algor...
Ieeepro techno solutions   ieee java project - budget-driven scheduling algor...Ieeepro techno solutions   ieee java project - budget-driven scheduling algor...
Ieeepro techno solutions ieee java project - budget-driven scheduling algor...hemanthbbc
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...Bharath Nair
 
Azure Events and Messages
Azure Events and MessagesAzure Events and Messages
Azure Events and MessagesNeeraj Kumar
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationJSPM's JSCOE , Pune Maharashtra.
 
Secure Computing IEEE 2014 Projects
Secure Computing IEEE 2014 ProjectsSecure Computing IEEE 2014 Projects
Secure Computing IEEE 2014 ProjectsVijay Karan
 
Secure computing-ieee-2014-projects
Secure computing-ieee-2014-projectsSecure computing-ieee-2014-projects
Secure computing-ieee-2014-projectsVijay Karan
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
 

What's hot (16)

Grid computing standards
Grid computing standardsGrid computing standards
Grid computing standards
 
Ogsa ogsi-a more detailed view
Ogsa ogsi-a more detailed viewOgsa ogsi-a more detailed view
Ogsa ogsi-a more detailed view
 
secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
 
Ogsi practicalview
Ogsi practicalviewOgsi practicalview
Ogsi practicalview
 
Ieeepro techno solutions ieee java project - budget-driven scheduling algor...
Ieeepro techno solutions   ieee java project - budget-driven scheduling algor...Ieeepro techno solutions   ieee java project - budget-driven scheduling algor...
Ieeepro techno solutions ieee java project - budget-driven scheduling algor...
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
 
Azure Events and Messages
Azure Events and MessagesAzure Events and Messages
Azure Events and Messages
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
 
[IJET-V1I3P3]
[IJET-V1I3P3][IJET-V1I3P3]
[IJET-V1I3P3]
 
Secure Computing IEEE 2014 Projects
Secure Computing IEEE 2014 ProjectsSecure Computing IEEE 2014 Projects
Secure Computing IEEE 2014 Projects
 
Secure computing-ieee-2014-projects
Secure computing-ieee-2014-projectsSecure computing-ieee-2014-projects
Secure computing-ieee-2014-projects
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
Ogsi standards
Ogsi standardsOgsi standards
Ogsi standards
 

Viewers also liked

Qo s ranking prediction for cloud services
Qo s ranking prediction for cloud servicesQo s ranking prediction for cloud services
Qo s ranking prediction for cloud servicesIEEEFINALYEARPROJECTS
 
Geometric range search on encrypted spatial data
Geometric range search on encrypted spatial dataGeometric range search on encrypted spatial data
Geometric range search on encrypted spatial dataShakas Technologies
 
Fast nearest neighbor search with keywords
Fast nearest neighbor search with keywordsFast nearest neighbor search with keywords
Fast nearest neighbor search with keywordsIEEEFINALYEARPROJECTS
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsShakas Technologies
 
Geometric range search on encrypted spatial data
Geometric range search on encrypted spatial dataGeometric range search on encrypted spatial data
Geometric range search on encrypted spatial dataieeepondy
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via  deniable attribute based encryptionAudit free cloud storage via  deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryptionMano Sriram
 
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudA secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudPvrtechnologies Nellore
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full reportdeepakmarndi
 
Progressive duplicate detection
Progressive duplicate detectionProgressive duplicate detection
Progressive duplicate detectionieeepondy
 
Matrix Factorization Techniques For Recommender Systems
Matrix Factorization Techniques For Recommender SystemsMatrix Factorization Techniques For Recommender Systems
Matrix Factorization Techniques For Recommender SystemsLei Guo
 

Viewers also liked (11)

Qo s ranking prediction for cloud services
Qo s ranking prediction for cloud servicesQo s ranking prediction for cloud services
Qo s ranking prediction for cloud services
 
Geometric range search on encrypted spatial data
Geometric range search on encrypted spatial dataGeometric range search on encrypted spatial data
Geometric range search on encrypted spatial data
 
Fast nearest neighbor search with keywords
Fast nearest neighbor search with keywordsFast nearest neighbor search with keywords
Fast nearest neighbor search with keywords
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Geometric range search on encrypted spatial data
Geometric range search on encrypted spatial dataGeometric range search on encrypted spatial data
Geometric range search on encrypted spatial data
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via  deniable attribute based encryptionAudit free cloud storage via  deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryption
 
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudA secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
 
Progressive duplicate detection
Progressive duplicate detectionProgressive duplicate detection
Progressive duplicate detection
 
Courier services
Courier servicesCourier services
Courier services
 
Matrix Factorization Techniques For Recommender Systems
Matrix Factorization Techniques For Recommender SystemsMatrix Factorization Techniques For Recommender Systems
Matrix Factorization Techniques For Recommender Systems
 

Similar to cloud computing- service operator aware trust scheme

IRJET- Trust Value Calculation for Cloud Resources
IRJET- Trust Value Calculation for Cloud ResourcesIRJET- Trust Value Calculation for Cloud Resources
IRJET- Trust Value Calculation for Cloud ResourcesIRJET Journal
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...IJMER
 
BNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid ComputingBNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid ComputingIRJET Journal
 
Quality of Service based Task Scheduling Algorithms in Cloud Computing
Quality of Service based Task Scheduling Algorithms in  Cloud Computing  Quality of Service based Task Scheduling Algorithms in  Cloud Computing
Quality of Service based Task Scheduling Algorithms in Cloud Computing IJECEIAES
 
Adaptive check-pointing and replication strategy to tolerate faults in comput...
Adaptive check-pointing and replication strategy to tolerate faults in comput...Adaptive check-pointing and replication strategy to tolerate faults in comput...
Adaptive check-pointing and replication strategy to tolerate faults in comput...IOSR Journals
 
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...ijccsa
 
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...neirew J
 
IRJET- Distributed Resource Allocation for Data Center Networks: A Hierar...
IRJET-  	  Distributed Resource Allocation for Data Center Networks: A Hierar...IRJET-  	  Distributed Resource Allocation for Data Center Networks: A Hierar...
IRJET- Distributed Resource Allocation for Data Center Networks: A Hierar...IRJET Journal
 
Ieeepro techno solutions 2013 ieee dotnet project -building confidential an...
Ieeepro techno solutions   2013 ieee dotnet project -building confidential an...Ieeepro techno solutions   2013 ieee dotnet project -building confidential an...
Ieeepro techno solutions 2013 ieee dotnet project -building confidential an...ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2013 ieee java project -building confidential and ...
Ieeepro techno solutions   2013 ieee java project -building confidential and ...Ieeepro techno solutions   2013 ieee java project -building confidential and ...
Ieeepro techno solutions 2013 ieee java project -building confidential and ...hemanthbbc
 
IJSETR-VOL-3-ISSUE-12-3358-3363
IJSETR-VOL-3-ISSUE-12-3358-3363IJSETR-VOL-3-ISSUE-12-3358-3363
IJSETR-VOL-3-ISSUE-12-3358-3363SHIVA REDDY
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
 
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET Journal
 
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...ijafrc
 
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud ComputingSecure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud ComputingIJMER
 
A review on various optimization techniques of resource provisioning in cloud...
A review on various optimization techniques of resource provisioning in cloud...A review on various optimization techniques of resource provisioning in cloud...
A review on various optimization techniques of resource provisioning in cloud...IJECEIAES
 
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...ijgca
 
Cost-Based Task Scheduling in Cloud Computing
Cost-Based Task Scheduling in Cloud ComputingCost-Based Task Scheduling in Cloud Computing
Cost-Based Task Scheduling in Cloud ComputingIRJET Journal
 

Similar to cloud computing- service operator aware trust scheme (20)

IRJET- Trust Value Calculation for Cloud Resources
IRJET- Trust Value Calculation for Cloud ResourcesIRJET- Trust Value Calculation for Cloud Resources
IRJET- Trust Value Calculation for Cloud Resources
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
 
BNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid ComputingBNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid Computing
 
Quality of Service based Task Scheduling Algorithms in Cloud Computing
Quality of Service based Task Scheduling Algorithms in  Cloud Computing  Quality of Service based Task Scheduling Algorithms in  Cloud Computing
Quality of Service based Task Scheduling Algorithms in Cloud Computing
 
Adaptive check-pointing and replication strategy to tolerate faults in comput...
Adaptive check-pointing and replication strategy to tolerate faults in comput...Adaptive check-pointing and replication strategy to tolerate faults in comput...
Adaptive check-pointing and replication strategy to tolerate faults in comput...
 
E01113138
E01113138E01113138
E01113138
 
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
 
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
 
IRJET- Distributed Resource Allocation for Data Center Networks: A Hierar...
IRJET-  	  Distributed Resource Allocation for Data Center Networks: A Hierar...IRJET-  	  Distributed Resource Allocation for Data Center Networks: A Hierar...
IRJET- Distributed Resource Allocation for Data Center Networks: A Hierar...
 
Ieeepro techno solutions 2013 ieee dotnet project -building confidential an...
Ieeepro techno solutions   2013 ieee dotnet project -building confidential an...Ieeepro techno solutions   2013 ieee dotnet project -building confidential an...
Ieeepro techno solutions 2013 ieee dotnet project -building confidential an...
 
Ieeepro techno solutions 2013 ieee java project -building confidential and ...
Ieeepro techno solutions   2013 ieee java project -building confidential and ...Ieeepro techno solutions   2013 ieee java project -building confidential and ...
Ieeepro techno solutions 2013 ieee java project -building confidential and ...
 
IJSETR-VOL-3-ISSUE-12-3358-3363
IJSETR-VOL-3-ISSUE-12-3358-3363IJSETR-VOL-3-ISSUE-12-3358-3363
IJSETR-VOL-3-ISSUE-12-3358-3363
 
Optimize Virtual Machine Placement in Banker Algorithm for Energy Efficient C...
Optimize Virtual Machine Placement in Banker Algorithm for Energy Efficient C...Optimize Virtual Machine Placement in Banker Algorithm for Energy Efficient C...
Optimize Virtual Machine Placement in Banker Algorithm for Energy Efficient C...
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
 
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
 
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud ComputingSecure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
 
A review on various optimization techniques of resource provisioning in cloud...
A review on various optimization techniques of resource provisioning in cloud...A review on various optimization techniques of resource provisioning in cloud...
A review on various optimization techniques of resource provisioning in cloud...
 
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
 
Cost-Based Task Scheduling in Cloud Computing
Cost-Based Task Scheduling in Cloud ComputingCost-Based Task Scheduling in Cloud Computing
Cost-Based Task Scheduling in Cloud Computing
 

Recently uploaded

HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxnuruddin69
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfsmsksolar
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 

Recently uploaded (20)

HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 

cloud computing- service operator aware trust scheme

  • 1. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds Presented by Jisa Joy Guided by Er. Asha Yeldose
  • 2. ABSTRACT  Service Operator-aware Trust Scheme (SOTS)[multi-dimentional resource service operator]  For resource matchmaking across multiple clouds  Explain relationship between the users, broker, the service resources(middleware framework of trust)  Reduce user burden and improve system dependability  Model the problem of trust evaluation by multi-attribute decision-making  Develop an adaptive trust evaluation approach on information entropy theory  To overcome the limitations of traditional trust schemes  the broker can efficiently and accurately prepare the most trusted resources  provide more dependable resources to users
  • 3. What is cloud computing??
  • 4.
  • 8. user Service provider Cloud Broker provides Requests Fig :- Trust model with Cloud Broker 1.Focused on a trust-aware brokering framework for multi- cloud environments
  • 9. user Service provider provides Requests Trust vectors Availability Reliability Security Fig :- Trust model using Trust vectors 2. Focused on expanded trust model based on dynamic service factors of a cloud resource
  • 10.  Trustworthiness of a cloud resource :- - Gi << trustworthiness of a resource i - Rci, Rui, Ti, Si << reliability operators of a resource - wRc, wRu, wT , wS <<weights for these operators 3.Some schemes lack adaptability with a trust fusion calculation on multi-dimensional service operators • Avoiding the effect of individual favoritism on weight allocation • Give inaccurate results in trust evaluation
  • 11. TRUST SCHEMES  Reputations-based schemes  Self-assessment schemes.  TTP-based schemes
  • 12. Reputation Based system Service providers user Fig :- Reputation Based Scheme databasedatabase database database Service providers
  • 13. database databasedatabase Historical server information user Fig:- Self-assessment schemes Service providers
  • 14. Service provider1 Availability Reliability Security Service provider3 Availability Reliability Security Service provider2 Availability Reliability Security TTP Fig:- TTP-based schemes User
  • 15. PROPOSED SYSTEM  Inspired from an idea - Service Operator-aware Trust Scheme (SOTS) Definitions for Trust :- 1) Trust of a resource :- Qualification of a resource Historical service operator Trust
  • 16. 2) TTP-based Trust Relationship Matchmaker User Service Operator TrustTrust
  • 17. 3) Trust Evaluation Factors Service Providers Service Providers Service Providers Cloud Broker Evaluation Availability Reliability Security
  • 20. Cloud Broker Trust Evaluation Availability Security Reliability
  • 21. Fig :- Real-time and dynamic service operators  Direct Operators  Indirect Operators
  • 22. Availability measurement Fig :- Example of the hardware capacity. Direct Operators
  • 23. Security measurement Fig :- Security level evaluation
  • 24. Reliability measurement For a resource performing g computing tasks within time window Δt - B(i) is the i-th measured value of the network bandwidth - C(i) is the i-th measured value of the CPU utilization rate - M(i) is the i-th measured value of the memory utilization rate - H(i) is the i-th measured value of the hard disk utilization rate - R(i) is the i-th measured value of the response time I4 to I9- Indirect Operators
  • 25. S(Δt) is the number of successful interactions U(Δt) is the number of unsuccessful interactions.
  • 26. ADAPTIVE AND EFFICIENT TRUST EVALUATION  Evaluation Matrix Normalization  Real-trust Trust Degree (RTD)  Entropy-based and Adaptive Weight Calculation  Global Trust Degree (GTD)
  • 27. Evaluation Matrix Normalization  In j-th time-stamp window Δtj  n cloud resources are assumed to require evaluation n= {x1, x2, · · · , xz, · · · , xn}
  • 28. Case 1:- xzk is a positive increasing value - CPU frequency - memory size - hard disk capacity - Average network bandwidth where max(xzk) and min(xzk) are the maximum and minimum values of row operator xzk 1
  • 29. Case 2 :- xzk is a positive decreasing value  Small value of ztk expect; this value only covers the average response time where max(xzk) and min(xzk) are the maximum and minimum values of row operator xzk, 2 Normalized Trust Operator :- 3
  • 30. Real-trust Trust Degree (RTD)  Evaluate recent cloud resource service operators  Evaluated by resource’s quality of service - time window-based trusted indicator for service operators - more sensitive to new operators - generates time window interaction takes place b/w user and resource  Definition :- Ω = {N1,N2, · · · ,Nn} denotes n registered resources in the broker TNz(Δtj) denote the RTD of resource Nn TNz(Δtj) = rz × W rz=(rz1, rz2, · · · , rzk, · · · , rzm), W = { 1, 2, · · · ,ϖ ϖ ϖk, · · ·ϖm} ϖk [0, 1],∈
  • 31. Entropy-based and Adaptive Weight Calculation  Adaptive data fusion tool  A low time and space overhead in dealing with large-scale data  Definition, Theorem 1 :- - X with possible values e1, e2, · · · en is H(X) = E(S(X)). - E is the expected value function - S(X) is the information content or self-information of X (S(X) = logb(1/p(xt)) - p(et) denotes the probability mass 4
  • 32. Theorem 2 :-  I = {I1, I2, · · · , Ik, · · · , Im} = {r1k, r2k, · · · , rzk, · · · , rnk}  Ik denotes row attribute k k={1,2,3,…….m} K=1/ln m Then entropy value of H(Ik) calculated by the each value of weight { 1, 2, · · · ,ϖ ϖ ϖk, · · ·ϖm} 5 6 7
  • 33. Global Trust Degree (GTD)  Time window v = (Δt1,Δt2, · · · ,Δtn)  Time series D = {TNi(Δt1), TNi(Δt2), · · · , TNi(Δtn)} A = {a(Δt1), a(Δt2), · · · , a(Δtj), · · · , a(Δtn)} a(Δtj) [0, 1] is the weights assigned∈ to each RTD TNi(Δtj) λ [0, 1]∈ 8 9
  • 34. Theorem 1:- In A = {a(Δt1), a(Δt2), · · · , a(Δtj), · · · , a(Δtn)} 2 time stamps are used :- Δtj Δtk Time Based attenuation property :- a(Δtj) < a(Δtk) Time complexity :- O(g)+O(mn)+O(m)+O(n2)+O(n) = O(g)+O(mn)+O(n2).
  • 35. Conclusion Here explains a new scheme knows as SOTS  For resource matchmaking across multiple clouds  Explain relationship between the users, broker, the service resources(middleware framework of trust)  Reduce user burden and improve system dependability  Model the problem of trust evaluation by multi-attribute decision-making  Develop an adaptive trust evaluation approach on information entropy theory  To overcome the limitations of traditional trust schemes  the broker can efficiently and accurately prepare the most trusted resources  provide more dependable resources to users
  • 36. Advantages  Trust management scheme for multi-cloud, multi-dimensional resource services  Adaptive fused computing approach for dynamic service operators, entropy theory  FSLA mechanism overcomes trust initialization problem for newly registered resources.
  • 37. Disadvantages and Future Scope 1) Combining trust scheme with reputation management to concerns users’ feedback 2) Universal measurement and quantitative method to assess the security levels of a resource 3) Evaluation of the proposed scheme in a larger-scale multiple cloud environment
  • 39. References 1. K. M. Khan, Q. Malluhi, “Establishing Trust in Cloud Comput-ing”, IEEE IT Professional, vol. 12, no. 5, 2010, pp. 20-27. 2. K. Hwang, D. Li, “Trusted Cloud Computing with Secure Resources and Data Coloring”, IEEE Internet Computing, vol. 14, no. 5, 2010, pp. 14- 22. 3. H. Kim, H. Lee, W. Kim, Y. Kim, “A Trust Evaluation Model for QoS Guarantee in Cloud Systems”, International Journal of Grid and Distributed Computing, vol.3, no.1, pp. 1-10, 2010. 4. P. D. Manuel, S. Thamarai Selvi, M. I. A. E. Barr, “Trust management system for grid and cloud resources”, Proc. of the First International Conference on Advanced Computing (ICAC 2009), 2009, 13-15 Dec, pp. 176-181.