T-Broker: A Trust-Aware Service Brokering Scheme
For Multiple Cloud Collaborative Services
Abstract:
Cloud storage means "the storage
of data online in the cloud," wherein a company's data is stored in and
accessible from multiple distributed and connected resources that comprise a
cloud. Cloud storage can provide the benefits of greater accessibility and
reliability; rapid deployment; strong protection for data backup, archival and
disaster recovery purposes; and lower overall storage costs as a result of not
having to purchase, manage and maintain expensive hardware. However, cloud
storage does have the potential for security and compliance concerns.
Multicloud is the use of multiple cloud
computing services in a single heterogeneous architecture. Multi-cloud strategy is
the concomitant use of two or more cloud services to minimize the risk of
widespread data loss or downtime due to a localized component failure in a
cloud computing environment. Such a failure can occur in hardware, software, or
infrastructure. A multi-cloud strategy can also improve overall enterprise
performance by avoiding "vendor lock-in" and using different
infrastructures to meet the needs of diverse partners and customers.
Oriented by requirement
of trust management in multiple cloud environment, this paper presents
T-broker, a trustaware service brokering scheme for efficient matching cloud
services (or resources) to satisfy various user requests.
First, a trusted
third party-based service brokering architecture is proposed for multiple cloud
environment, in which the T-broker acts as a middleware for cloud trust
management and service matching. Then, T-broker uses a hybrid and adaptive
trust model to compute the overall trust degree of service resources, in which
trust is defined as a fusion evaluation result from adaptively combining the
direct monitored evidence with the social feedback of the service resources.
More importantly, T-broker uses the maximizing deviation method to compute the
direct experience based on multiple key trusted attributes of service
resources, which can overcome the limitations of traditional trust schemes, in
which the trusted attributes are weighted manually or subjectively. Finally,
T-broker uses a lightweight feedback mechanism, which can effectively reduce
networking risk and improve system efficiency. The experimental results show
that, compared with the existing approaches, our T-broker yields very good
results in many typical cases, and the proposed system is robust to deal with
various numbers of dynamic service behavior from multiple cloud sites.
Existing System:
v The existing brokering
architecture for cloud computing do not consider user feedback only relying on
some direct monitoring information.
v
There is no doubt that the efficiency of a trust system is
an important requirement for multiple cloud environment. That is, the trust
brokering system should be fast convergence and light-weight to serve for a
large number of users and providers. However, existing studies paid little
attention to this question, which greatly affects scalability and availability
of the trust system
Proposed System:
v The proposed system is
robust to deal with various numbers of dynamic service behavior from multiple
cloud sites.
v Some hybrid trust models
are proposed for cloud computing environment It is no doubt that how to
adaptively fuse direct trust (first-hand trust) and indirect trust (users’
feedback) should be an important problem, however, most current studies in
hybrid trust models either ignore the problem or using subjective or manual
methods to assign weight to this two trust factors (first-hand trust and users’
feedback).
v The proposed trust
management framework for a multi-cloud environment is based on the proposed
trust evaluation model and the trust propagation network.
v First, a trusted third
party-based service brokering architecture is proposed for multiple cloud
environment, in which the T-broker acts as a middleware for cloud trust
management and service matching.
v T-broker uses a hybrid and adaptive trust
model to compute the overall trust degree of service resources, in which trust
is defined as a fusion evaluation result from adaptively combining the direct
monitored evidence with the social feedback of the service resources.
Future Enhancement:
In the future, we will
continue our research from two aspects. First is how to accurately calculate
the trust value of resources with only few monitored evidences reports and how
to motivate more users to submit their feedback to the trust measurement
engine. Implementing and evaluating the proposed mechanism in a large-scale
multiple cloud system, such as distributed data sharing and remote computing,
is another important direction for future research.
Problem Statement:
The development of trust awareness
technology for cloud computing has become a key and urgent research direction .Today,
the problem of trusted cloud computing has become a paramount concern for most
users. It’s not that the users don’t trust cloud computing’s capabilities;
rather, they mainly question the cloud computing’s trustworthiness.
Implementation of
Modules:
System Architecture
Cloud User Module
Cloud users can send
request to the T-broker for accessing the cloud resources, The feedback system
collects locally-generated users’ ratings and aggregates these ratings to yield
the global evaluation scores. After a user completes a transaction, the user
will provide his or her rating as a reference for other users in future
transactions.
Cloud Resources
Module(Admin)
Cloud resource module
will provide the cloud resources. web based cloud computing managing tool
for managing cloud infrastructure from multiple providers. RightScale enables
organizations to easily deploy and manage business-critical applications across
public, private, and hybrid clouds. SpotCloud provides a structured cloud
capacity marketplace where service providers sell the extra capacity they have
and the buyers can take advantage of cheap rates selecting the best service
provider at each moment. a cloud is modeled in seven layers: Facility, network,
hardware, OS, middle ware, application, and the user. These layers can be
controlled by either the cloud provider or the cloud customer. In , the author
presents a set of recommended restrictions and audits to facilitate cloud
security. The recommendations might be overkill for deployments involving no
sensitive data, they might be insufficient to allow certain information to be
hosted in any public or community cloud.
T-Broker Module:
In this module T-broker uses some sub modules ,
(i)Trust-aware
brokering architecture
in which the broker
itself acts as the TTP for trust management and resource scheduling. Through
distributed soft-sensors, this brokering architecture can real-time monitor
both dynamic service behavior of resource providers and feedbacks from users.
(ii)Hybrid and
Adaptive Trust Computation Model (HATCM)
a hybrid and adaptive
trust model to compute the overall trust degree of service resources, in which
trust is defined as a fusion evaluation result from adaptively combining
dynamic service behavior with the social feedback of the service resources. The
HATCM allows cloud users to specify
their requirements and opinions when accessing the trust score of cloud
providers. That is, users can specify their own preferences, according to their
business policy and requirements, to get a customized trust value of the cloud
providers
(iii)Maximizing
deviation method(MDM):
A maximizing deviation
method to compute the direct trust of service resource, which can overcome the
limitations of traditional trust models, in which the trusted attributes are
weighted manually or subjectively. At the same time, this method has a faster
convergence than other existing approaches.
(iv)Sensor-Based
Service Monitoring (SSM):
This module is used to
monitor the real-time service data of allocated resources in+ order to
guarantee the SLA (Service Level Agreement) with the users. In the interactive
process, this module dynamically monitors the service parameters and is
responsible for getting run-time service data. The monitored data is stored in
the evidence base, which is maintained by the broker. To calculating QoS-based
trustworthiness of a resource we mainly focus on five kinds of trusted
attributes of cloud services, which consists of node spec profile, average
resource usage information, average response time, average task success ratio,
and the number of malicious access. The node spec profile includes four trusted
evidences: CPU frequency, memory size, hard disk capacity and network
bandwidth. The average resource usage information consists of the current CPU
utilization rate, current memory utilization rate, current hard disk
utilization rate and current bandwidth utilization rate. The number of
malicious access includes the number of illegal connections and the times of
scanning sensitive ports.
(v)Virtual
Infrastructure Manager (VIM)
Each cloud provider
offers several VM configurations, often referred to as instance types. An
instance type is defined in terms of hardware metrics such as CPU frequency,
memory size, hard disk capacity, etc. In this work, the VIM component is based
on the OpenNebula virtual infrastructure manager this module is used to collect and index all
these resources information from multiple cloud providers. It obtains the
information from each particular cloud provider and acts as a resource
management interface for monitoring system. Cloud providers register their
resource information through the VIM module to be able to act as sellers in a
multi-cloud marketplace. This component is also responsible for the deployment
of each VM in the selected cloud as specified by the VM template, as well as
for the management of the VM life-cycle. The VIM caters for user interaction
with the virtual infrastructure by making the respective IP addresses of the
infrastructure components available to the user once it has deployed all VMs.
(vi)Service level
agreement Manager(SLA)
In the multiple cloud
computing environment, SLA can offer an appropriate guarantee for the service
of quality of resource providers, and it serves as the foundation for the
expected level of service between the users and the providers An SLA is a
contract agreed between a user and a provider which defines a series of service
quality characters. Adding trust mechanism into the SLA management cloud
brokering system can prepare the best trustworthiness resources for each
service request in advance, and allocate the best resources to users. In
general, the service resource register its services on the cloud brokering
system. The service user negotiates with the service provider about the SLA
details; they finally make a SLA contract. According to the SLA contract, the
resource matching module selects and composites highly trusted resources to
users from the trusted resource pool.
Multiple cloud
computing:
MULTIPLE cloud theories
and technologies are the hot directions in the cloud computing industry, which
a lot of companies and government are putting much concern to make sure that
they have benefited from this new innovation However, compared with traditional
networks, multiple cloud computing environment has manyunique features such as
resources belonging to each cloud provider, and such resources being completely
distributed, heterogeneous, and totally virtualized; these features indicate
that unmodified traditional trust mechanisms can no longer be used in multiple
cloud computing environments. A lack of trust between cloud users and providers
has hindered the universal acceptance of clouds as outsourced computing
services. Thus, the development of trust awareness technology for cloud
computing has become a key and urgent research direction Today, the problem of
trusted cloud computing has become a paramount concern for most users. It’s not
that the users don’t trust cloud computing’s capabilities; rather, they mainly
question the cloud computing’s trustworthiness .
FeedBack Aggregation:
The “Trust as a Service”
(TaaS) framework to improve ways on trust management in cloud environments . In
particular, the authors introduce an adaptive credibility model that
distinguishes between credible trust feedbacks and malicious feedbacks by
considering cloud service consumers’ capability and majority consensus of their
feedbacks. However, this framework does not allow to assess trustworthiness
based on monitoring information as well as users’ feedback. In large-scale
distributed systems, such as grid computing, P2P computing, wireless sensor
networks, and so on, feedback provides an efficient and effective way to build
a socialevaluation- based trust relationship among network entities. By the
same token, feedback also can provider important reference in evaluating cloud
resource trustworthiness. Consider large-scale cloud collaborative computing
environment which host hundreds of machines and handles thousands of request
per second, the delay induced by trust system can be one big problem. So, there
is no doubt that the computational efficiency of a feedback aggregating
mechanism is the most fundamental requirement. As depicted in Fig. 3, we build
cloud social evaluation system using feedback technology among virtualized data
centers and distributed cloud users, and we use a lightweight feedback
mechanism, which can effectively reduce networking risk and improve system
efficiency.
Conclusion:
In this paper, we present
T-broker, a trust-aware service brokering system for efficient matching
multiple cloud services to satisfy various user requests. Experimental results
show that T-broker yields very good results in many typical cases, and the
proposed mechanism is robust to deal with various number of service resources.
In the future, we will continue our research from two aspects. First is how to
accurately calculate the trust value of resources with only few monitored
evidences reports and how to motivate more users to submit their feedback to
the trust measurement engine. Implementing and evaluating the proposed mechanism
in a large-scale multiple cloud system, such as distributed data sharing and
remote computing, is another important direction for future research.
Comments
Post a Comment