Open Access   Article Go Back

A Survey on Emergence of Cloud Computing Using Brokering Services

B. Mahesh Kumar1 , V.Savitha 2

Section:Survey Paper, Product Type: Journal Paper
Volume-4 , Issue-2 , Page no. 85-91, Feb-2016

Online published on Feb 29, 2016

Copyright © B. Mahesh Kumar , V.Savitha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B. Mahesh Kumar , V.Savitha, “A Survey on Emergence of Cloud Computing Using Brokering Services,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.85-91, 2016.

MLA Style Citation: B. Mahesh Kumar , V.Savitha "A Survey on Emergence of Cloud Computing Using Brokering Services." International Journal of Computer Sciences and Engineering 4.2 (2016): 85-91.

APA Style Citation: B. Mahesh Kumar , V.Savitha, (2016). A Survey on Emergence of Cloud Computing Using Brokering Services. International Journal of Computer Sciences and Engineering, 4(2), 85-91.

BibTex Style Citation:
@article{Kumar_2016,
author = {B. Mahesh Kumar , V.Savitha},
title = {A Survey on Emergence of Cloud Computing Using Brokering Services},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2016},
volume = {4},
Issue = {2},
month = {2},
year = {2016},
issn = {2347-2693},
pages = {85-91},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=800},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=800
TI - A Survey on Emergence of Cloud Computing Using Brokering Services
T2 - International Journal of Computer Sciences and Engineering
AU - B. Mahesh Kumar , V.Savitha
PY - 2016
DA - 2016/02/29
PB - IJCSE, Indore, INDIA
SP - 85-91
IS - 2
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1545 1465 downloads 1618 downloads
  
  
           

Abstract

Trust management is very crucial aspect in multiple cloud environment .To ensure this Trust-management. Our paper presents C-provider, a trust aware brokering scheme for managing efficient cloud resources (or) services. The C-provider is based on a third party brokering architecture that is proposed to act as a middleware for cloud management and service matching.Our C-provider uses a hybrid and adaptive trust model to compute the overalltrust degree of resources based on the monitored feedbackof the service resources. Also C-provider uses a minimal feedback mechanism that effectively reduces networking issue and improve system efficiency.

Key-Words / Index Term

Multiple Cloud Computing, Trust-Aware Servicebrokering, Resource Matching, Feedback Aggregation

References

[1] M. Singhalet al., “Collaboration in multicloud computing environments:Framework and security issues,” Computer, vol. 46, no. 2, pp. 76–84,Feb. 2013.
[2] H. M. Fard, R. Prodan, and T. Fahringer, “A truthful dynamic workflowscheduling mechanism for commercial multicloud environments,” IEEE
Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1203–1212, Jun. 2013.
[3] F. Paraiso, N. Haderer, P. Merle, R. Rouvoy, and L. Seinturier,“A federated multi-cloud PaaSinfrastructure,” in Proc. 5th IEEE Int.Conf. Cloud Comput. (CLOUD), Jun. 2012, pp. 392–399.
[4] P. Jain, D. Rane, and S. Patidar, “A novel cloud bursting brokerageand aggregation (CBBA) algorithm for multi cloud environment,” inProc. 2nd Int. Conf. Adv. Comput. Commun. Technol. (ACCT), Jan. 2012,pp. 383–387.
[5] K. M. Khan and Q. Malluhi, “Establishing trust in cloud computing,”IT Prof., vol. 12, no. 5, pp. 20–27, Sep./Oct. 2010.
[6] K. Hwang and D. Li, “Trusted cloud computing with secure resourcesand data coloring,” IEEE Internet Comput., vol. 14, no. 5, pp. 14–22,Sep./Oct. 2010.
[7] H. Kim, H. Lee, W. Kim, and Y. Kim, “A trust evaluation model forQoS guarantee in cloud systems,” Int. J. Grid Distrib. Comput., vol. 3,no. 1, pp. 1–10, Mar. 2010.
[8] P. D. Manuel, S. ThamaraiSelvi, and M. I. A.-E. Barr, “Trustmanagement system for grid and cloud resources,” in Proc. 1st Int. Conf.Adv. Comput. (ICAC), Dec. 2009, pp. 176–181.
[9] L.-Q. Tian, C. Lin, and Y. Ni, “Evaluation of user behaviortrust in cloud computing,” in Proc. Int. Conf. Comput. Appl. Syst.Modeling (ICCASM), Oct. 2010, pp. V7-576–V7-572.
[10] X. Li and Y. Yang, “Trusted data acquisition mechanism for cloudresource scheduling based on distributed agents,” Chin. Commun., vol. 8,no. 6, pp. 108–116, 2011.
[11] X. Li, H. Ma, F. Zhou, and X. Gui, “Service operator-aware trust schemefor resource matchmaking across multiple clouds,” IEEE Trans. ParallelDistrib. Syst., to be published, doi: 10.1109/TPDS.2014.2321750.
[12] (2014). OPTIMIS.[Online]. Available: http://www.optimis-project.eu/
[13] W. Fan and H. Perros, “A novel trust management frameworkfor multi-cloud environments based on trust service providers,”Knowl.-Based Syst., vol. 70, pp. 392–406, Nov. 2014.
[14] N. Ghosh, S. K. Ghosh, and S. K. Das, “SelCSP: A framework tofacilitate selection of cloud service providers,” IEEE Trans. Cloud
Comput., vol. 3, no. 1, pp. 66–79, Jan./Mar. 2015.
[15] A. Nagarajan and V. Varadharajan, “Dynamic trust enhanced securitymodel for trusted platform based services,” Future Generat.Comput.Syst., vol. 27, no. 5, pp. 564–573, 2011.
[16] S. M. Habib, V. Varadharajan, and M. Muhlhauser, “A trust-awareframework for evaluating security controls of service providers in cloudmarketplaces,” in Proc. 12th IEEE Int. Conf. Trust, Secur., PrivacyComput. Commun., Jul. 2013, pp. 459–468.
[17] T. H. Noor and Q. Z. Sheng, “Trust as a service: A framework fortrust management in cloud environments,” in Web Information System
Engineering (Lecture Notes in Computer Science), vol. 6997. Berlin,Germany: Springer-Verlag, 2011, pp. 314–321.
[18] B. Rochwergeret al., “The RESERVOIR model and architecture foropen federated cloud computing,” IBM J. Res. Develop., vol. 53, no. 4,
pp. 535–545, 2009.
[19] S. A. De Chaves, R. B. Uriarte, and C. B. Westphall, “Towardan architecture for monitoring private clouds,” IEEE Commun. Mag.,vol. 49, no. 12, pp. 130–137, Dec. 2011.LI et al.: C-PROVIDER: A TRUST-AWARE SERVICE BROKERING SCHEME 1415
[20] (2014). RightScale.[Online]. Available: http://www.rightscale.com/
[21] (2014). SpotCloud.[Online]. Available: http://www.spotcloud.com/
[22] (2014). Aeolus. [Online]. Available: http://www.aeolusproject.org/index.html
[23] J. Spring, “Monitoring cloud computing by layer, part 1,” IEEE SecurityPrivacy, vol. 9, no. 2, pp. 66–68, Mar./Apr. 2011.
[24] J. L. Lucas-Simarro, R. Moreno-Vozmediano, R. S. Montero, andI. M. Llorente, “Scheduling strategies for optimal service deploymentacross multiple clouds,” Future Generat. Comput. Syst., vol. 29, no. 6,pp. 1431–1441, Aug. 2013.
[25] K. Hwang, S. Kulkarni, and Y. Hu, “Cloud security with virtualizeddefense and reputation-based trust management,” in Proc. 8th IEEEInt. Conf. Dependable, Autonomic, Secure Comput. (DASC), Dec. 2009,pp. 717–722.