SlideShare a Scribd company logo
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-4, Issue-4, Apr- 2018]
https://dx.doi.org/10.22161/ijaems.4.4.5 ISSN: 2454-1311
www.ijaems.com Page | 241
MMB Cloud-Tree: Verifiable Cloud Service
Selection
Mr. B. Karthikeyan1
, C. Sanjay2
, S. Roopesh Kumar3
, L. Vignesh Seerangan4
, E.
Manikandan5
1
Associate Professor, Department of Information Technology, Panimalar Engineering College, Chennai, Affiliated to Anna
University, India.
2,3,4,5
Final Year, Department of Information Technology, Panimalar Engineering College, Chennai, Affiliated to Anna
University, India.
Abstract—In the existing cloud brokerage system, the
client does not have the ability to verify the result of the
cloud service selection. There are possibilities that the
cloud broker can be biased in selecting the best Cloud
Service Provider (CSP) for a client. A compromised or
dishonest cloud broker can unfairly select a CSP for its
own advantage by cooperating with the selected CSP. To
address this problem, we propose a mechanism to verify
the CSP selection result of the cloud broker. In this
verification mechanism, properties of every CSP will also
be verified. It uses a trusted third party to gather
clustering result from the cloud broker. This trusted third
party is also used as a base station to collect CSP
properties in a multi-agent’s system. Software Agents are
installed and running on every CSP. The CSP is
monitored by agents as the representative of the customer
inside the cloud. These multi-agents give reports to a
third party that must be trusted by CSPs, customers and
the Cloud Broker. The third party provides transparency
by publishing reports to the authorized parties (CSPs and
Customers).
Keywords— Cloud Service Selection, Brokerage System,
Merkel Hash Tree, Verification.
I. INTRODUCTION
Cloud services offer a scalable variety of storage space
and computing capabilities, which are widely employed
by an increasing number of business owners. This has
resulted in a large number of cloud service providers
(CSPs), offering a wide range of resources. The
availability of various, possibly complex options,
however, makes it difficult for potential cloud clients to
weigh and decide which options suit their requirements
the best.
The Challenges are:
 It is hard for cloud clients to gather information
about all the CSPs available for their selections;
 It is also computationally expensive to choose a
suitable CSP from a potentially large CSP pool.
In light of these difficulties, both industry and
academia suggested introducing an additional
computing layer on top of the base service
provisioning to enable tasks such as discovery,
mediation and monitoring.
In a cloud brokerage system, one of the most fundamental
tasks is to provide high-quality selection services for
clients. That is, a broker provides clients with a list of
recommended CSPs that meet the clients’ needs. With the
aid of cloud brokers, clients no longer need to collect,
search or compare CSPs’ services and capabilities.
Without the ability to verify the correctness of the service
recommendation, cloud clients could be easily cheated by
malicious brokers. For instance, malicious brokers could
recommend their favourable CSPs as much as possible
and ignore other suitable CSPs, without being caught by
the clients. More seriously, due to the lack of supervision
and verification of brokers’ actions, malicious brokers
could even recommend malicious CSPs which collect and
sell clients’ private resources, monitor clients’ hosts
during cloud service provisioning, causing major financial
and confidentiality losses to the clients. Therefore, it is
important to equip the clients with verification
capabilities of the obtained recommendations. The clients
may not need to verify each recommendation result, but
they certainly need to have the ability to do so when they
feel necessary.
Our novel index structure is the core component of our
Cloud Service Selection Verification (CSSV) scheme,
which employs the idea of “separation of duties” to
ensure strong security guarantees. Precisely, we introduce
a trusted collector in the cloud brokerage system that
separates the task of CSP information collection from the
service selection. The collector does not directly interact
with the cloud clients and is only in charge of gathering
information from the CSPs, and hence it can be more
devoted into adopting sophisticated defences to filter out
problematic data and building an authenticated database
of CSPs’ profiles. The collector is allowed to make profit
by selling the authenticated database to one or more cloud
brokers. With the available authenticated databases, the
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-4, Issue-4, Apr- 2018]
https://dx.doi.org/10.22161/ijaems.4.4.5 ISSN: 2454-1311
www.ijaems.com Page | 242
cloud brokers focus on handling probably a large number
of real-time service requests from clients. Since there are
related works in an MMB Cloud tree.
They are:
 Cloud Service Selection
 DB Query Authentication
The Cloud Service Selection describes the
recommendation system in cloud computing suitable for
design-time decisions as it statically provided a ranking of
available cloud providers. Aiming at evaluating the
performance and capabilities of services offered by CSPs
for facilitating customers’ selections. cloud service
selection is focused only on how to select the services that
satisfy customers’ requirements. None of them considers
security issues involved in the service selection, and none
of them provides verifiable schemes to prove the
correctness and completeness of their service selection
results as addressed in our work and to trusted collector
sharing location-based information, whereas we use the
collector to achieve service verification in the cloud.
Our proposed authenticated index structures are related to
those developed for query authentication in outsourced
databases. At query execution, the service provider picks
the signatures of the data objects falling in the query
range to form the proof messages. Since each data object
is linked with its predecessor and successor in an
unforgeable way, the client is able to verify the
completeness and correctness of query results by
verifying the validity of signatures.
A. Existing System
In an existing cloud brokerage schemes is that brokers are
completely trusted and thus will always provide unbiased
best available options to clients. Under this assumption,
none of the existing works provides guarantees over the
correctness or completeness of the service selection
recommendations to the cloud clients. Without the ability
to verify the correctness of the service recommendation,
cloud clients could be easily cheated by malicious
brokers. For instance, malicious brokers could
recommend their favourable CSPs as much as possible
and ignore other suitable CSPs, without being caught by
the clients. More seriously, due to the lack of supervision
and verification of brokers’ actions, malicious brokers
could even recommend malicious CSPs which collect and
sell clients’ private resources, monitor clients’ hosts
during cloud service provisioning, causing major
financial and confidentiality losses to the clients.
B. Proposed System
In our proposed system a novel index structure is the core
component of our Cloud Service Selection Verification
(CSSV) scheme, which employs the idea of separation of
duties to ensure strong security guarantees. Precisely, we
introduce a trusted collector in the cloud brokerage
system that separates the task of CSP information
collection from the service selection. The collector does
not directly interact with the cloud clients and is only in
charge of gathering information from the CSPs, and hence
it can be more devoted into adopting sophisticated
defences to filter out problematic data and building an
authenticated database of CSPs’ profiles. The collector is
allowed to make profit by selling the authenticated
database to one or more cloud brokers. With the available
authenticated databases, the cloud brokers focus on
handling probably a large number of real-time service
requests from clients.
C. Advanced Scheme using MMB Cloud-Tree:
The basic approach using MMB cloud-tree indexes only
the Price property, and therefore has limited ability to
deal with queries that do not include Price as one of the
selection criteria, or with queries that have many other
selection criteria besides Price. In either case, the basic
approach may return many CSPs which satisfy only the
Price criterion but not the whole query in the proof
message for verification.
II. MODULES
A. CSP Profile Creation
The service provider is in need to expose the service that
provided by them, in terms of the whole package of the
service. The package that consist of the details such as a
product that provide by the service provider and the
respective cost for each product in service. And a total
cost of the service. The service provider can be able to
produce any number (N numbers) of service and each are
declared as separate package.
B. Database Construction
The collector surf with the cloud service provider services
and select the needed package of services. And the
collector submits the resource request to the respective
CSP of service.
Fig.1: The collection of services from different CSP and
storing it in the collector DB
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-4, Issue-4, Apr- 2018]
https://dx.doi.org/10.22161/ijaems.4.4.5 ISSN: 2454-1311
www.ijaems.com Page | 243
If the CSP acknowledge the collector request of resource,
now the collector is ready to access the resource details
and to provide the respective resource to requesting
broker. Collector serves as an intermediate between the
broker and the CSP.
The Cloud Service Provider provides the service to the
broker. They collecting the service and given to the
broker whoever requesting the trusted collector.
C. Service Selection by the broker
It is worth noting that, the novelty of our approaches not
only lies in a new set of verification algorithms specific to
the cloud service selection, but also gives efficient
solutions (compared with the state-of-the-art) to the
problem of authenticating multidimensional queries. The
reason to choose Price as the indexing field is two-fold.
First, given that most cloud providers employ a pay-per-
use business model, Price is one of the most commonly
occurred criteria in cloud service selection queries. First,
cloud service selection typically allows cloud users to
specify multiple service requirement is always desirable
to have efficient cloud service selection and verification
so that the cloud end users would not feel delay of
services. Our novel index structure is the core component
of our Cloud Service Selection Verification (CSSV)
scheme, which employs the idea of “separation of duties”
to ensure strong security guarantees. we propose the
Cloud Service Selection Verification (CSSV) scheme
which is a comprehensive solution that is capable of
guaranteeing all the three security requirements (i.e.,
authenticity, satisfiability and completeness).
D. Results Verification
More seriously, due to the lack of supervision and
verification of brokers’ actions, malicious brokers could
even recommend malicious CSPs which collect and sell
clients’ private resources, monitor clients’ hosts during
cloud service provisioning, causing major financial and
confidentiality losses to the clients. we propose
innovative authenticated index structures and verification
protocols to allow clients to verify the completeness and
authenticity of brokers’ answers. This problem is related
to that of authentication of query results for outsourced
databases, selection and verification so that the cloud end
users would not feel delay of services, but existing few
works, although support authentication of multi-
dimensional query results, are time consuming, resulting
that they could not meet the demands of today’s real-time
cloud service recommendations.
III. SYSTEM ARCHITECTURE DIAGRAM
FOR MMB CLOUD
A. System Architecture
The cloud service providers providing the services to the
brokers stored in the cloud. The collector logs onto the
system are stored in the database and purchase
authenticated database. The collector providing services
to the cloud brokers. The user searching for the brokers
for the needed service. Finally, The results verification by
the clients. The System architecture are mainly occurs
Cloud service providers, collectors, cloud brokers and
users. This diagram shows the system architecture of
mmb- cloud as shown below.
Fig.2: System Architecture Diagram for MMB-Cloud
B. Work Flow Diagram
The first step is to create a profile for Cloud Service
Providers(CSP’s) and services are stored in the cloud.
The second step is the collector build authenticated
database and after collecting services from the CSP data
stored in the database. The third step is service selected
by the brokers. And finally, the clients searching for the
service that they need for the various brokers. And if the
user finds the needed service they request the service to
the broker and get use with the resource. And verify or
cross check the resource that bought from the broker that
whether the broker serves the correct resource in
affordable cost.
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-4, Issue-4, Apr- 2018]
https://dx.doi.org/10.22161/ijaems.4.4.5 ISSN: 2454-1311
www.ijaems.com Page | 244
Fig.3: Work Flow Diagram for MMB-Cloud
IV. REQUIREMENTS
A. Hardware Requirments
 The hardware required are laptop which
hard disk consists of 200GB and above, and
an RAM consists of 2GB and above and a
processor.
 These are the hardware requirements in
mmb- cloud.
B. Software Requirments
 The software required are windows XP and
Java development kit for the latest version
of 1.7.
 Tomcat 6.0 (Apache Tomcat Server) is a
web container developed at the apache
software foundation. It implements the
servlets and java server pages.
 My SQL 5.0(Structured Query Language)
is used to storing all the information in the
database.
V. MERKLE HASH TREE ALGORITHM
As our proposed data structure is developed based on the
Merkle hash tree, we provide more details of this
structure as follows. The Merkle hash tree has a binary
tree as the base structure. The leaf nodes in the Merkle
hash tree contain the hash values of the original data
items. Each internal node contains the hash value of the
concatenation of the hash values of its two children
nodes.
A. Why Merkle trees?
 Consistency Verification
 Data Verification
 Data Synchronization
Merkle trees are used in distributed systems for efficient
data verification. A Merkle tree is a hash-based
structure that is a generalization of the hash list.It is a tree
structure in which each leaf node is a hash of a block of
data, and each non-leaf node is a hash of its children.
B. Algorithm Steps
 Merkle hash tree was typically implemented as
binary trees.
 Binary Tree is a node-based binary tree data
structure.
 The left sub tree of a node contains only nodes
with keys lesser than the node’s key.
 The right sub tree of a node contains only nodes
with keys greater than the node’s key.
 The left and right sub tree each must also be a
binary search tree. There must be no duplicate
nodes.
VI. CONCLUSION
In this paper, we presented an innovative Cloud Service
Selection Verification (CSSV) system to achieve
cheating-free cloud service selection under a cloud
brokerage architecture. The core of our system is an
efficient authenticated index structure to ensure the
authenticity, the satisfiability and the completeness of the
service selection results. Our theoretical and experimental
results demonstrate the effectiveness and efficiency of our
schemes compared with the state-of-the-art. As part of our
future work, we plan to consider a verifiable scheme for
best service selection query whereby the broker returns
only the best CSP instead of all candidate CSPs with
respect to a client’s request.
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-4, Issue-4, Apr- 2018]
https://dx.doi.org/10.22161/ijaems.4.4.5 ISSN: 2454-1311
www.ijaems.com Page | 245
REFERENCES
[1] S. Sundareswaran, A. Squamosin, D. Lin, "A
brokerage-based approach for cloud service
selection", 2012 IEEE 5th International Conference
on Cloud Computing (CLOUD), pp. 558-565, Aug
2012.
[2] J. Sian par, E. Saleh, C. Meisel, "Construction of
Agent-Based Trust in Cloud
Infrastructure", Proceedings of the IEEE/ACM 7th
International Conference on Utility and Cloud
Computing (UCC 2014), 2014.
[3] J. Li, A. quercitrin, D. Lin, S. Sundareswaran, C. Jia,
"MMB cloud-tree: Authenticated Index for
Verifiable Cloud Service Selection", IACR
Cryptology reprint Archive 2015, vol. 379, 2015
[4] A. Li, X. Yang, S. Kundela, M. Zhang,
"Cloudscape: comparing public cloud
providers", IMC '10: Proceedings of the 10th ACM
SIGCOMM conference on Internet measurement,
pp. 1-14, 2010.
[5] S. M. Han, M. M. Hassan, C. W. Yoon, E. N. Huh,
"Efficient service recommendation system for cloud
computing market", ICIS '09 Proceedings of the 2nd
International Conference on Interaction Sciences:
Information Technology Culture and Human, 2009.
[6] A. Lenk, M. Menzel, J. Lipsky, S. Tai, P. Offer
Mann, "What are you paying for? performance
benchmarking for Infrastructure-as-Service
offerings", 2011 IEEE International Conference on
Cloud Computing (CLOUD), pp. 484-491, 2011
[7] Z. urethan, O. K. Hussain, S. Parvin, F. K. Hussain,
"A framework for user feedback-based cloud service
monitoring", 2012 Sixth International Conference
on Complex Intelligent and Software Intensive
Systems (CISIS), pp.
[8] M. Kiruthika, R. Mohanabharathi (2016).A Secured
File Store in Cloud Environment Using Hierarchy
Attribute-Based Encryption. International Journal
of Advanced Engineering Research and Science
(ISSN : 2349-6495(P) | 2456-1908(O)),3(11), 110-
114. http://dx.doi.org/10.22161/ijaers/3.11.19

More Related Content

What's hot

Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing
IJCSIS Research Publications
 
Azure applications performance checklist
Azure applications performance checklistAzure applications performance checklist
Azure applications performance checklist
Salim M Bhonhariya
 
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...
Souvik Pal
 
IRJET- Trust Value Calculation for Cloud Resources
IRJET- Trust Value Calculation for Cloud ResourcesIRJET- Trust Value Calculation for Cloud Resources
IRJET- Trust Value Calculation for Cloud Resources
IRJET Journal
 
Cloud computing for java and dotnet
Cloud computing for java and dotnetCloud computing for java and dotnet
Cloud computing for java and dotnet
redpel dot com
 
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Editor IJCATR
 
Linked List Implementation of Discount Pricing in Cloud
Linked List Implementation of Discount Pricing in CloudLinked List Implementation of Discount Pricing in Cloud
Linked List Implementation of Discount Pricing in Cloud
paperpublications3
 
CPET- Project Report
CPET- Project ReportCPET- Project Report
CPET- Project Report
Akshat Kumar Vaish
 
Reliability evaluation model for composite web services
Reliability evaluation model for composite web servicesReliability evaluation model for composite web services
Reliability evaluation model for composite web services
dannyijwest
 
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
IOSR Journals
 
Cscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerceCscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerce
r_arorabms
 
Towards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc cloudsTowards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc clouds
Ahmed Hammam
 
CACMAN COMPARISION WITH MOCA USING PKI ON MANET.
CACMAN COMPARISION WITH MOCA USING PKI  ON MANET.CACMAN COMPARISION WITH MOCA USING PKI  ON MANET.
CACMAN COMPARISION WITH MOCA USING PKI ON MANET.
neeravkubavat
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environment
eSAT Publishing House
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET Journal
 
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
Hossam Al-Ansary
 
V04405122126
V04405122126V04405122126
V04405122126
IJERA Editor
 
A Multi Criteria Recommendation Engine Model for Cloud Renderfarm Services
A Multi Criteria Recommendation Engine Model for Cloud Renderfarm Services  A Multi Criteria Recommendation Engine Model for Cloud Renderfarm Services
A Multi Criteria Recommendation Engine Model for Cloud Renderfarm Services
IJECEIAES
 

What's hot (18)

Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing
 
Azure applications performance checklist
Azure applications performance checklistAzure applications performance checklist
Azure applications performance checklist
 
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...
 
IRJET- Trust Value Calculation for Cloud Resources
IRJET- Trust Value Calculation for Cloud ResourcesIRJET- Trust Value Calculation for Cloud Resources
IRJET- Trust Value Calculation for Cloud Resources
 
Cloud computing for java and dotnet
Cloud computing for java and dotnetCloud computing for java and dotnet
Cloud computing for java and dotnet
 
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
 
Linked List Implementation of Discount Pricing in Cloud
Linked List Implementation of Discount Pricing in CloudLinked List Implementation of Discount Pricing in Cloud
Linked List Implementation of Discount Pricing in Cloud
 
CPET- Project Report
CPET- Project ReportCPET- Project Report
CPET- Project Report
 
Reliability evaluation model for composite web services
Reliability evaluation model for composite web servicesReliability evaluation model for composite web services
Reliability evaluation model for composite web services
 
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
 
Cscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerceCscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerce
 
Towards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc cloudsTowards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc clouds
 
CACMAN COMPARISION WITH MOCA USING PKI ON MANET.
CACMAN COMPARISION WITH MOCA USING PKI  ON MANET.CACMAN COMPARISION WITH MOCA USING PKI  ON MANET.
CACMAN COMPARISION WITH MOCA USING PKI ON MANET.
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environment
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
 
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
 
V04405122126
V04405122126V04405122126
V04405122126
 
A Multi Criteria Recommendation Engine Model for Cloud Renderfarm Services
A Multi Criteria Recommendation Engine Model for Cloud Renderfarm Services  A Multi Criteria Recommendation Engine Model for Cloud Renderfarm Services
A Multi Criteria Recommendation Engine Model for Cloud Renderfarm Services
 

Similar to MMB Cloud-Tree: Verifiable Cloud Service Selection

SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service ProvidersSelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
1crore projects
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resource
jayaramb
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
Animesh Chaturvedi
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
IEEEGLOBALSOFTTECHNOLOGIES
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issues
IEEEFINALYEARPROJECTS
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET Journal
 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTES
Tushar Dhoot
 
Ensuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the CloudEnsuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the Cloud
Cognizant
 
Key Considerations for Cloud Procurement - AWS Innovate Ottawa:
 Key Considerations for Cloud Procurement - AWS Innovate Ottawa: Key Considerations for Cloud Procurement - AWS Innovate Ottawa:
Key Considerations for Cloud Procurement - AWS Innovate Ottawa:
Amazon Web Services
 
13 ijcse-01233
13 ijcse-0123313 ijcse-01233
13 ijcse-01233
Shivlal Mewada
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitate
jpstudcorner
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
hemanthbbc
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
IEEEMEMTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...
IEEEFINALSEMSTUDENTPROJECTS
 
20150113
2015011320150113
20150113
Kaustubh Memane
 
A cloud service selection model based
A cloud service selection model basedA cloud service selection model based
A cloud service selection model based
csandit
 
A Cloud Service Selection Model Based on User-Specified Quality of Service Level
A Cloud Service Selection Model Based on User-Specified Quality of Service LevelA Cloud Service Selection Model Based on User-Specified Quality of Service Level
A Cloud Service Selection Model Based on User-Specified Quality of Service Level
csandit
 

Similar to MMB Cloud-Tree: Verifiable Cloud Service Selection (20)

SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service ProvidersSelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resource
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issues
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTES
 
Ensuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the CloudEnsuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the Cloud
 
Key Considerations for Cloud Procurement - AWS Innovate Ottawa:
 Key Considerations for Cloud Procurement - AWS Innovate Ottawa: Key Considerations for Cloud Procurement - AWS Innovate Ottawa:
Key Considerations for Cloud Procurement - AWS Innovate Ottawa:
 
13 ijcse-01233
13 ijcse-0123313 ijcse-01233
13 ijcse-01233
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitate
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT A mechanism design approach to resou...
 
20150113
2015011320150113
20150113
 
A cloud service selection model based
A cloud service selection model basedA cloud service selection model based
A cloud service selection model based
 
A Cloud Service Selection Model Based on User-Specified Quality of Service Level
A Cloud Service Selection Model Based on User-Specified Quality of Service LevelA Cloud Service Selection Model Based on User-Specified Quality of Service Level
A Cloud Service Selection Model Based on User-Specified Quality of Service Level
 

Recently uploaded

IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
shivani5543
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 

Recently uploaded (20)

IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 

MMB Cloud-Tree: Verifiable Cloud Service Selection

  • 1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-4, Issue-4, Apr- 2018] https://dx.doi.org/10.22161/ijaems.4.4.5 ISSN: 2454-1311 www.ijaems.com Page | 241 MMB Cloud-Tree: Verifiable Cloud Service Selection Mr. B. Karthikeyan1 , C. Sanjay2 , S. Roopesh Kumar3 , L. Vignesh Seerangan4 , E. Manikandan5 1 Associate Professor, Department of Information Technology, Panimalar Engineering College, Chennai, Affiliated to Anna University, India. 2,3,4,5 Final Year, Department of Information Technology, Panimalar Engineering College, Chennai, Affiliated to Anna University, India. Abstract—In the existing cloud brokerage system, the client does not have the ability to verify the result of the cloud service selection. There are possibilities that the cloud broker can be biased in selecting the best Cloud Service Provider (CSP) for a client. A compromised or dishonest cloud broker can unfairly select a CSP for its own advantage by cooperating with the selected CSP. To address this problem, we propose a mechanism to verify the CSP selection result of the cloud broker. In this verification mechanism, properties of every CSP will also be verified. It uses a trusted third party to gather clustering result from the cloud broker. This trusted third party is also used as a base station to collect CSP properties in a multi-agent’s system. Software Agents are installed and running on every CSP. The CSP is monitored by agents as the representative of the customer inside the cloud. These multi-agents give reports to a third party that must be trusted by CSPs, customers and the Cloud Broker. The third party provides transparency by publishing reports to the authorized parties (CSPs and Customers). Keywords— Cloud Service Selection, Brokerage System, Merkel Hash Tree, Verification. I. INTRODUCTION Cloud services offer a scalable variety of storage space and computing capabilities, which are widely employed by an increasing number of business owners. This has resulted in a large number of cloud service providers (CSPs), offering a wide range of resources. The availability of various, possibly complex options, however, makes it difficult for potential cloud clients to weigh and decide which options suit their requirements the best. The Challenges are:  It is hard for cloud clients to gather information about all the CSPs available for their selections;  It is also computationally expensive to choose a suitable CSP from a potentially large CSP pool. In light of these difficulties, both industry and academia suggested introducing an additional computing layer on top of the base service provisioning to enable tasks such as discovery, mediation and monitoring. In a cloud brokerage system, one of the most fundamental tasks is to provide high-quality selection services for clients. That is, a broker provides clients with a list of recommended CSPs that meet the clients’ needs. With the aid of cloud brokers, clients no longer need to collect, search or compare CSPs’ services and capabilities. Without the ability to verify the correctness of the service recommendation, cloud clients could be easily cheated by malicious brokers. For instance, malicious brokers could recommend their favourable CSPs as much as possible and ignore other suitable CSPs, without being caught by the clients. More seriously, due to the lack of supervision and verification of brokers’ actions, malicious brokers could even recommend malicious CSPs which collect and sell clients’ private resources, monitor clients’ hosts during cloud service provisioning, causing major financial and confidentiality losses to the clients. Therefore, it is important to equip the clients with verification capabilities of the obtained recommendations. The clients may not need to verify each recommendation result, but they certainly need to have the ability to do so when they feel necessary. Our novel index structure is the core component of our Cloud Service Selection Verification (CSSV) scheme, which employs the idea of “separation of duties” to ensure strong security guarantees. Precisely, we introduce a trusted collector in the cloud brokerage system that separates the task of CSP information collection from the service selection. The collector does not directly interact with the cloud clients and is only in charge of gathering information from the CSPs, and hence it can be more devoted into adopting sophisticated defences to filter out problematic data and building an authenticated database of CSPs’ profiles. The collector is allowed to make profit by selling the authenticated database to one or more cloud brokers. With the available authenticated databases, the
  • 2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-4, Issue-4, Apr- 2018] https://dx.doi.org/10.22161/ijaems.4.4.5 ISSN: 2454-1311 www.ijaems.com Page | 242 cloud brokers focus on handling probably a large number of real-time service requests from clients. Since there are related works in an MMB Cloud tree. They are:  Cloud Service Selection  DB Query Authentication The Cloud Service Selection describes the recommendation system in cloud computing suitable for design-time decisions as it statically provided a ranking of available cloud providers. Aiming at evaluating the performance and capabilities of services offered by CSPs for facilitating customers’ selections. cloud service selection is focused only on how to select the services that satisfy customers’ requirements. None of them considers security issues involved in the service selection, and none of them provides verifiable schemes to prove the correctness and completeness of their service selection results as addressed in our work and to trusted collector sharing location-based information, whereas we use the collector to achieve service verification in the cloud. Our proposed authenticated index structures are related to those developed for query authentication in outsourced databases. At query execution, the service provider picks the signatures of the data objects falling in the query range to form the proof messages. Since each data object is linked with its predecessor and successor in an unforgeable way, the client is able to verify the completeness and correctness of query results by verifying the validity of signatures. A. Existing System In an existing cloud brokerage schemes is that brokers are completely trusted and thus will always provide unbiased best available options to clients. Under this assumption, none of the existing works provides guarantees over the correctness or completeness of the service selection recommendations to the cloud clients. Without the ability to verify the correctness of the service recommendation, cloud clients could be easily cheated by malicious brokers. For instance, malicious brokers could recommend their favourable CSPs as much as possible and ignore other suitable CSPs, without being caught by the clients. More seriously, due to the lack of supervision and verification of brokers’ actions, malicious brokers could even recommend malicious CSPs which collect and sell clients’ private resources, monitor clients’ hosts during cloud service provisioning, causing major financial and confidentiality losses to the clients. B. Proposed System In our proposed system a novel index structure is the core component of our Cloud Service Selection Verification (CSSV) scheme, which employs the idea of separation of duties to ensure strong security guarantees. Precisely, we introduce a trusted collector in the cloud brokerage system that separates the task of CSP information collection from the service selection. The collector does not directly interact with the cloud clients and is only in charge of gathering information from the CSPs, and hence it can be more devoted into adopting sophisticated defences to filter out problematic data and building an authenticated database of CSPs’ profiles. The collector is allowed to make profit by selling the authenticated database to one or more cloud brokers. With the available authenticated databases, the cloud brokers focus on handling probably a large number of real-time service requests from clients. C. Advanced Scheme using MMB Cloud-Tree: The basic approach using MMB cloud-tree indexes only the Price property, and therefore has limited ability to deal with queries that do not include Price as one of the selection criteria, or with queries that have many other selection criteria besides Price. In either case, the basic approach may return many CSPs which satisfy only the Price criterion but not the whole query in the proof message for verification. II. MODULES A. CSP Profile Creation The service provider is in need to expose the service that provided by them, in terms of the whole package of the service. The package that consist of the details such as a product that provide by the service provider and the respective cost for each product in service. And a total cost of the service. The service provider can be able to produce any number (N numbers) of service and each are declared as separate package. B. Database Construction The collector surf with the cloud service provider services and select the needed package of services. And the collector submits the resource request to the respective CSP of service. Fig.1: The collection of services from different CSP and storing it in the collector DB
  • 3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-4, Issue-4, Apr- 2018] https://dx.doi.org/10.22161/ijaems.4.4.5 ISSN: 2454-1311 www.ijaems.com Page | 243 If the CSP acknowledge the collector request of resource, now the collector is ready to access the resource details and to provide the respective resource to requesting broker. Collector serves as an intermediate between the broker and the CSP. The Cloud Service Provider provides the service to the broker. They collecting the service and given to the broker whoever requesting the trusted collector. C. Service Selection by the broker It is worth noting that, the novelty of our approaches not only lies in a new set of verification algorithms specific to the cloud service selection, but also gives efficient solutions (compared with the state-of-the-art) to the problem of authenticating multidimensional queries. The reason to choose Price as the indexing field is two-fold. First, given that most cloud providers employ a pay-per- use business model, Price is one of the most commonly occurred criteria in cloud service selection queries. First, cloud service selection typically allows cloud users to specify multiple service requirement is always desirable to have efficient cloud service selection and verification so that the cloud end users would not feel delay of services. Our novel index structure is the core component of our Cloud Service Selection Verification (CSSV) scheme, which employs the idea of “separation of duties” to ensure strong security guarantees. we propose the Cloud Service Selection Verification (CSSV) scheme which is a comprehensive solution that is capable of guaranteeing all the three security requirements (i.e., authenticity, satisfiability and completeness). D. Results Verification More seriously, due to the lack of supervision and verification of brokers’ actions, malicious brokers could even recommend malicious CSPs which collect and sell clients’ private resources, monitor clients’ hosts during cloud service provisioning, causing major financial and confidentiality losses to the clients. we propose innovative authenticated index structures and verification protocols to allow clients to verify the completeness and authenticity of brokers’ answers. This problem is related to that of authentication of query results for outsourced databases, selection and verification so that the cloud end users would not feel delay of services, but existing few works, although support authentication of multi- dimensional query results, are time consuming, resulting that they could not meet the demands of today’s real-time cloud service recommendations. III. SYSTEM ARCHITECTURE DIAGRAM FOR MMB CLOUD A. System Architecture The cloud service providers providing the services to the brokers stored in the cloud. The collector logs onto the system are stored in the database and purchase authenticated database. The collector providing services to the cloud brokers. The user searching for the brokers for the needed service. Finally, The results verification by the clients. The System architecture are mainly occurs Cloud service providers, collectors, cloud brokers and users. This diagram shows the system architecture of mmb- cloud as shown below. Fig.2: System Architecture Diagram for MMB-Cloud B. Work Flow Diagram The first step is to create a profile for Cloud Service Providers(CSP’s) and services are stored in the cloud. The second step is the collector build authenticated database and after collecting services from the CSP data stored in the database. The third step is service selected by the brokers. And finally, the clients searching for the service that they need for the various brokers. And if the user finds the needed service they request the service to the broker and get use with the resource. And verify or cross check the resource that bought from the broker that whether the broker serves the correct resource in affordable cost.
  • 4. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-4, Issue-4, Apr- 2018] https://dx.doi.org/10.22161/ijaems.4.4.5 ISSN: 2454-1311 www.ijaems.com Page | 244 Fig.3: Work Flow Diagram for MMB-Cloud IV. REQUIREMENTS A. Hardware Requirments  The hardware required are laptop which hard disk consists of 200GB and above, and an RAM consists of 2GB and above and a processor.  These are the hardware requirements in mmb- cloud. B. Software Requirments  The software required are windows XP and Java development kit for the latest version of 1.7.  Tomcat 6.0 (Apache Tomcat Server) is a web container developed at the apache software foundation. It implements the servlets and java server pages.  My SQL 5.0(Structured Query Language) is used to storing all the information in the database. V. MERKLE HASH TREE ALGORITHM As our proposed data structure is developed based on the Merkle hash tree, we provide more details of this structure as follows. The Merkle hash tree has a binary tree as the base structure. The leaf nodes in the Merkle hash tree contain the hash values of the original data items. Each internal node contains the hash value of the concatenation of the hash values of its two children nodes. A. Why Merkle trees?  Consistency Verification  Data Verification  Data Synchronization Merkle trees are used in distributed systems for efficient data verification. A Merkle tree is a hash-based structure that is a generalization of the hash list.It is a tree structure in which each leaf node is a hash of a block of data, and each non-leaf node is a hash of its children. B. Algorithm Steps  Merkle hash tree was typically implemented as binary trees.  Binary Tree is a node-based binary tree data structure.  The left sub tree of a node contains only nodes with keys lesser than the node’s key.  The right sub tree of a node contains only nodes with keys greater than the node’s key.  The left and right sub tree each must also be a binary search tree. There must be no duplicate nodes. VI. CONCLUSION In this paper, we presented an innovative Cloud Service Selection Verification (CSSV) system to achieve cheating-free cloud service selection under a cloud brokerage architecture. The core of our system is an efficient authenticated index structure to ensure the authenticity, the satisfiability and the completeness of the service selection results. Our theoretical and experimental results demonstrate the effectiveness and efficiency of our schemes compared with the state-of-the-art. As part of our future work, we plan to consider a verifiable scheme for best service selection query whereby the broker returns only the best CSP instead of all candidate CSPs with respect to a client’s request.
  • 5. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-4, Issue-4, Apr- 2018] https://dx.doi.org/10.22161/ijaems.4.4.5 ISSN: 2454-1311 www.ijaems.com Page | 245 REFERENCES [1] S. Sundareswaran, A. Squamosin, D. Lin, "A brokerage-based approach for cloud service selection", 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 558-565, Aug 2012. [2] J. Sian par, E. Saleh, C. Meisel, "Construction of Agent-Based Trust in Cloud Infrastructure", Proceedings of the IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC 2014), 2014. [3] J. Li, A. quercitrin, D. Lin, S. Sundareswaran, C. Jia, "MMB cloud-tree: Authenticated Index for Verifiable Cloud Service Selection", IACR Cryptology reprint Archive 2015, vol. 379, 2015 [4] A. Li, X. Yang, S. Kundela, M. Zhang, "Cloudscape: comparing public cloud providers", IMC '10: Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, pp. 1-14, 2010. [5] S. M. Han, M. M. Hassan, C. W. Yoon, E. N. Huh, "Efficient service recommendation system for cloud computing market", ICIS '09 Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology Culture and Human, 2009. [6] A. Lenk, M. Menzel, J. Lipsky, S. Tai, P. Offer Mann, "What are you paying for? performance benchmarking for Infrastructure-as-Service offerings", 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 484-491, 2011 [7] Z. urethan, O. K. Hussain, S. Parvin, F. K. Hussain, "A framework for user feedback-based cloud service monitoring", 2012 Sixth International Conference on Complex Intelligent and Software Intensive Systems (CISIS), pp. [8] M. Kiruthika, R. Mohanabharathi (2016).A Secured File Store in Cloud Environment Using Hierarchy Attribute-Based Encryption. International Journal of Advanced Engineering Research and Science (ISSN : 2349-6495(P) | 2456-1908(O)),3(11), 110- 114. http://dx.doi.org/10.22161/ijaers/3.11.19