SlideShare a Scribd company logo
Service Operator-aware Trust Scheme for Resource
Matchmaking across Multiple Clouds
Presented by
Jisa Joy
Guided by
Er. Asha Yeldose
ABSTRACT
 Service Operator-aware Trust Scheme (SOTS)[multi-dimentional
resource service operator]
 For resource matchmaking across multiple clouds
 Explain relationship between the users, broker, the service
resources(middleware framework of trust)
 Reduce user burden and improve system dependability
 Model the problem of trust evaluation by multi-attribute decision-making
 Develop an adaptive trust evaluation approach on information entropy
theory
 To overcome the limitations of traditional trust schemes
 the broker can efficiently and accurately prepare the most trusted resources
 provide more dependable resources to users
What is cloud computing??
cloud computing- service operator aware trust scheme
INTRODUCTION
Service
provider
user
Requests
provides
Trust
Fig :- Basic model of Trust
EXISTING SYSTEM
user
Service
provider
Cloud
Broker
provides
Requests
Fig :- Trust model with Cloud Broker
1.Focused on a trust-aware brokering framework for multi-
cloud environments
user
Service
provider
provides
Requests
Trust vectors
Availability Reliability
Security
Fig :- Trust model using Trust vectors
2. Focused on expanded trust model based on dynamic service factors
of a cloud resource
 Trustworthiness of a cloud resource :-
- Gi << trustworthiness of a resource i
- Rci, Rui, Ti, Si << reliability operators of a resource
- wRc, wRu, wT , wS <<weights for these operators
3.Some schemes lack adaptability with a trust fusion calculation
on multi-dimensional service operators
• Avoiding the effect of individual favoritism on weight allocation
• Give inaccurate results in trust evaluation
TRUST SCHEMES
 Reputations-based schemes
 Self-assessment schemes.
 TTP-based schemes
Reputation Based system
Service
providers
user
Fig :- Reputation Based Scheme
databasedatabase database database
Service
providers
database databasedatabase
Historical server
information
user
Fig:- Self-assessment schemes
Service
providers
Service provider1
Availability
Reliability
Security
Service provider3
Availability
Reliability
Security
Service provider2
Availability
Reliability
Security
TTP
Fig:- TTP-based schemes
User
PROPOSED SYSTEM
 Inspired from an idea
- Service Operator-aware Trust Scheme (SOTS)
Definitions for Trust :-
1) Trust of a resource :-
Qualification of
a resource
Historical
service operator
Trust
2) TTP-based Trust Relationship
Matchmaker
User Service
Operator
TrustTrust
3) Trust Evaluation Factors
Service
Providers
Service
Providers
Service
Providers
Cloud Broker
Evaluation
Availability
Reliability
Security
Conceptual Model
Trust-aware Brokering System
Architecture
Cloud Broker Trust Evaluation
Availability Security
Reliability
Fig :- Real-time and dynamic service operators
 Direct Operators
 Indirect Operators
Availability measurement
Fig :- Example of the hardware capacity.
Direct Operators
Security measurement
Fig :- Security level evaluation
Reliability measurement
For a resource performing g computing tasks within time window Δt
- B(i) is the i-th measured value of the network bandwidth
- C(i) is the i-th measured value of the CPU utilization rate
- M(i) is the i-th measured value of the memory utilization rate
- H(i) is the i-th measured value of the hard disk utilization rate
- R(i) is the i-th measured value of the response time
I4 to I9- Indirect Operators
S(Δt) is the number of successful interactions
U(Δt) is the number of unsuccessful interactions.
ADAPTIVE AND EFFICIENT
TRUST EVALUATION
 Evaluation Matrix Normalization
 Real-trust Trust Degree (RTD)
 Entropy-based and Adaptive Weight Calculation
 Global Trust Degree (GTD)
Evaluation Matrix Normalization
 In j-th time-stamp window Δtj
 n cloud resources are assumed to require evaluation
n= {x1, x2, · · · , xz, · · · , xn}
Case 1:- xzk is a positive increasing value
- CPU frequency
- memory size
- hard disk capacity
- Average network bandwidth
where max(xzk) and min(xzk) are the maximum and minimum
values of row operator xzk
1
Case 2 :- xzk is a positive decreasing value
 Small value of ztk expect; this value only covers
the average response time
where max(xzk) and min(xzk) are the maximum and minimum
values of row operator xzk,
2
Normalized Trust Operator :-
3
Real-trust Trust Degree (RTD)
 Evaluate recent cloud resource service operators
 Evaluated by resource’s quality of service
- time window-based trusted indicator for service operators
- more sensitive to new operators
- generates time window interaction takes place b/w user and
resource
 Definition :-
Ω = {N1,N2, · · · ,Nn} denotes n registered resources in the broker
TNz(Δtj) denote the RTD of resource Nn
TNz(Δtj) = rz × W
rz=(rz1, rz2, · · · , rzk, · · · , rzm),
W = { 1, 2, · · · ,ϖ ϖ ϖk, · · ·ϖm} ϖk [0, 1],∈
Entropy-based and Adaptive Weight
Calculation
 Adaptive data fusion tool
 A low time and space overhead in dealing with large-scale data
 Definition, Theorem 1 :-
- X with possible values e1, e2, · · · en is H(X) = E(S(X)).
- E is the expected value function
- S(X) is the information content or self-information of X
(S(X) = logb(1/p(xt))
- p(et) denotes the probability mass
4
Theorem 2 :-
 I = {I1, I2, · · · , Ik, · · · , Im} = {r1k, r2k, · · · , rzk, · · · , rnk}
 Ik denotes row attribute k k={1,2,3,…….m}
K=1/ln m
Then entropy value of H(Ik) calculated by the each value of weight
{ 1, 2, · · · ,ϖ ϖ ϖk, · · ·ϖm}
5
6
7
Global Trust Degree (GTD)
 Time window v = (Δt1,Δt2, · · · ,Δtn)
 Time series D = {TNi(Δt1), TNi(Δt2), · · · , TNi(Δtn)}
A = {a(Δt1), a(Δt2), · · · , a(Δtj), · · · , a(Δtn)}
a(Δtj) [0, 1] is the weights assigned∈ to each RTD TNi(Δtj)
λ [0, 1]∈
8
9
Theorem 1:-
In A = {a(Δt1), a(Δt2), · · · , a(Δtj), · · · , a(Δtn)}
2 time stamps are used :-
Δtj
Δtk
Time Based attenuation property :-
a(Δtj) < a(Δtk)
Time complexity :-
O(g)+O(mn)+O(m)+O(n2)+O(n) = O(g)+O(mn)+O(n2).
Conclusion
Here explains a new scheme knows as SOTS
 For resource matchmaking across multiple clouds
 Explain relationship between the users, broker, the service
resources(middleware framework of trust)
 Reduce user burden and improve system dependability
 Model the problem of trust evaluation by multi-attribute decision-making
 Develop an adaptive trust evaluation approach on information entropy
theory
 To overcome the limitations of traditional trust schemes
 the broker can efficiently and accurately prepare the most trusted resources
 provide more dependable resources to users
Advantages
 Trust management scheme for multi-cloud, multi-dimensional resource
services
 Adaptive fused computing approach for dynamic service operators,
entropy theory
 FSLA mechanism overcomes trust initialization problem for newly
registered resources.
Disadvantages and Future Scope
1) Combining trust scheme with reputation management to concerns users’
feedback
2) Universal measurement and quantitative method to assess the security
levels of a resource
3) Evaluation of the proposed scheme in a larger-scale multiple cloud
environment
Applications
References
1. K. M. Khan, Q. Malluhi, “Establishing Trust in Cloud Comput-ing”,
IEEE IT Professional, vol. 12, no. 5, 2010, pp. 20-27.
2. K. Hwang, D. Li, “Trusted Cloud Computing with Secure Resources and
Data Coloring”, IEEE Internet Computing, vol. 14, no. 5, 2010, pp. 14-
22.
3. H. Kim, H. Lee, W. Kim, Y. Kim, “A Trust Evaluation Model for QoS
Guarantee in Cloud Systems”, International Journal of Grid and
Distributed Computing, vol.3, no.1, pp. 1-10, 2010.
4. P. D. Manuel, S. Thamarai Selvi, M. I. A. E. Barr, “Trust management
system for grid and cloud resources”, Proc. of the First International
Conference on Advanced Computing (ICAC 2009), 2009, 13-15 Dec, pp.
176-181.
END OF PRESENTATION
THANK YOU…...
ANY DOUBTS ??…..

More Related Content

What's hot (16)

PPTX
Grid computing standards
Pooja Dixit
 
PPTX
Ogsa ogsi-a more detailed view
Pooja Dixit
 
DOCX
secure data transfer and deletion from counting bloom filter in cloud computing.
Venkat Projects
 
PPT
Towards secure and dependable storage service in cloud
sibidlegend
 
PPTX
Ogsi practicalview
Pooja Dixit
 
PDF
Ieeepro techno solutions ieee java project - budget-driven scheduling algor...
hemanthbbc
 
PPTX
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
 
PDF
Azure Events and Messages
Neeraj Kumar
 
PPTX
Distributed Systems
Medicaps University
 
PDF
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
JSPM's JSCOE , Pune Maharashtra.
 
PDF
Secure Computing IEEE 2014 Projects
Vijay Karan
 
PDF
Secure computing-ieee-2014-projects
Vijay Karan
 
PDF
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Journals
 
PDF
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Publishing House
 
PPTX
Ogsi standards
Pooja Dixit
 
Grid computing standards
Pooja Dixit
 
Ogsa ogsi-a more detailed view
Pooja Dixit
 
secure data transfer and deletion from counting bloom filter in cloud computing.
Venkat Projects
 
Towards secure and dependable storage service in cloud
sibidlegend
 
Ogsi practicalview
Pooja Dixit
 
Ieeepro techno solutions ieee java project - budget-driven scheduling algor...
hemanthbbc
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
 
Azure Events and Messages
Neeraj Kumar
 
Distributed Systems
Medicaps University
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
JSPM's JSCOE , Pune Maharashtra.
 
Secure Computing IEEE 2014 Projects
Vijay Karan
 
Secure computing-ieee-2014-projects
Vijay Karan
 
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Journals
 
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Publishing House
 
Ogsi standards
Pooja Dixit
 

Viewers also liked (11)

DOCX
Qo s ranking prediction for cloud services
IEEEFINALYEARPROJECTS
 
PDF
Geometric range search on encrypted spatial data
Shakas Technologies
 
DOCX
Fast nearest neighbor search with keywords
IEEEFINALYEARPROJECTS
 
PDF
Providing user security guarantees in public infrastructure clouds
Shakas Technologies
 
PDF
Geometric range search on encrypted spatial data
ieeepondy
 
DOCX
Audit free cloud storage via deniable attribute based encryption
Mano Sriram
 
DOCX
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
Pvrtechnologies Nellore
 
DOCX
Ip traceback seminar full report
deepakmarndi
 
PDF
Progressive duplicate detection
ieeepondy
 
PPTX
Courier services
Deepak Laata
 
PDF
Matrix Factorization Techniques For Recommender Systems
Lei Guo
 
Qo s ranking prediction for cloud services
IEEEFINALYEARPROJECTS
 
Geometric range search on encrypted spatial data
Shakas Technologies
 
Fast nearest neighbor search with keywords
IEEEFINALYEARPROJECTS
 
Providing user security guarantees in public infrastructure clouds
Shakas Technologies
 
Geometric range search on encrypted spatial data
ieeepondy
 
Audit free cloud storage via deniable attribute based encryption
Mano Sriram
 
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
Pvrtechnologies Nellore
 
Ip traceback seminar full report
deepakmarndi
 
Progressive duplicate detection
ieeepondy
 
Courier services
Deepak Laata
 
Matrix Factorization Techniques For Recommender Systems
Lei Guo
 
Ad

Similar to cloud computing- service operator aware trust scheme (20)

PDF
IRJET- Trust Value Calculation for Cloud Resources
IRJET Journal
 
PDF
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
IJMER
 
PDF
BNTM: Bayesian Network based Trust Model for Grid Computing
IRJET Journal
 
PDF
Quality of Service based Task Scheduling Algorithms in Cloud Computing
IJECEIAES
 
PDF
Adaptive check-pointing and replication strategy to tolerate faults in comput...
IOSR Journals
 
PDF
E01113138
IOSR Journals
 
PDF
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
ijccsa
 
PDF
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
ijccsa
 
PDF
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
neirew J
 
PDF
IRJET- Distributed Resource Allocation for Data Center Networks: A Hierar...
IRJET Journal
 
PDF
Ieeepro techno solutions 2013 ieee dotnet project -building confidential an...
ASAITHAMBIRAJAA
 
PDF
Ieeepro techno solutions 2013 ieee java project -building confidential and ...
hemanthbbc
 
PDF
IJSETR-VOL-3-ISSUE-12-3358-3363
SHIVA REDDY
 
PDF
Optimize Virtual Machine Placement in Banker Algorithm for Energy Efficient C...
Association of Scientists, Developers and Faculties
 
PDF
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
 
PDF
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET Journal
 
PDF
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
ijafrc
 
PDF
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
IJMER
 
PDF
A review on various optimization techniques of resource provisioning in cloud...
IJECEIAES
 
PDF
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
ijgca
 
IRJET- Trust Value Calculation for Cloud Resources
IRJET Journal
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
IJMER
 
BNTM: Bayesian Network based Trust Model for Grid Computing
IRJET Journal
 
Quality of Service based Task Scheduling Algorithms in Cloud Computing
IJECEIAES
 
Adaptive check-pointing and replication strategy to tolerate faults in comput...
IOSR Journals
 
E01113138
IOSR Journals
 
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
ijccsa
 
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
ijccsa
 
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
neirew J
 
IRJET- Distributed Resource Allocation for Data Center Networks: A Hierar...
IRJET Journal
 
Ieeepro techno solutions 2013 ieee dotnet project -building confidential an...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2013 ieee java project -building confidential and ...
hemanthbbc
 
IJSETR-VOL-3-ISSUE-12-3358-3363
SHIVA REDDY
 
Optimize Virtual Machine Placement in Banker Algorithm for Energy Efficient C...
Association of Scientists, Developers and Faculties
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
 
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET Journal
 
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
ijafrc
 
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
IJMER
 
A review on various optimization techniques of resource provisioning in cloud...
IJECEIAES
 
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
ijgca
 
Ad

Recently uploaded (20)

PDF
The Complete Guide to the Role of the Fourth Engineer On Ships
Mahmoud Moghtaderi
 
PPTX
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
PPTX
Unit 2 Theodolite and Tachometric surveying p.pptx
satheeshkumarcivil
 
PPTX
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
PDF
IEEE EMBC 2025 「Improving electrolaryngeal speech enhancement via a represent...
NU_I_TODALAB
 
PPTX
Unit II: Meteorology of Air Pollution and Control Engineering:
sundharamm
 
PDF
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
PPTX
00-ClimateChangeImpactCIAProcess_PPTon23.12.2024-ByDr.VijayanGurumurthyIyer1....
praz3
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PPT
IISM Presentation.ppt Construction safety
lovingrkn
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PDF
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
PPTX
cybersecurityandthe importance of the that
JayachanduHNJc
 
PPTX
filteration _ pre.pptx 11111110001.pptx
awasthivaibhav825
 
PDF
All chapters of Strength of materials.ppt
girmabiniyam1234
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PPTX
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
PDF
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
The Complete Guide to the Role of the Fourth Engineer On Ships
Mahmoud Moghtaderi
 
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
Unit 2 Theodolite and Tachometric surveying p.pptx
satheeshkumarcivil
 
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
IEEE EMBC 2025 「Improving electrolaryngeal speech enhancement via a represent...
NU_I_TODALAB
 
Unit II: Meteorology of Air Pollution and Control Engineering:
sundharamm
 
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
00-ClimateChangeImpactCIAProcess_PPTon23.12.2024-ByDr.VijayanGurumurthyIyer1....
praz3
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
IISM Presentation.ppt Construction safety
lovingrkn
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
cybersecurityandthe importance of the that
JayachanduHNJc
 
filteration _ pre.pptx 11111110001.pptx
awasthivaibhav825
 
All chapters of Strength of materials.ppt
girmabiniyam1234
 
Inventory management chapter in automation and robotics.
atisht0104
 
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 

cloud computing- service operator aware trust scheme

  • 1. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds Presented by Jisa Joy Guided by Er. Asha Yeldose
  • 2. ABSTRACT  Service Operator-aware Trust Scheme (SOTS)[multi-dimentional resource service operator]  For resource matchmaking across multiple clouds  Explain relationship between the users, broker, the service resources(middleware framework of trust)  Reduce user burden and improve system dependability  Model the problem of trust evaluation by multi-attribute decision-making  Develop an adaptive trust evaluation approach on information entropy theory  To overcome the limitations of traditional trust schemes  the broker can efficiently and accurately prepare the most trusted resources  provide more dependable resources to users
  • 3. What is cloud computing??
  • 8. user Service provider Cloud Broker provides Requests Fig :- Trust model with Cloud Broker 1.Focused on a trust-aware brokering framework for multi- cloud environments
  • 9. user Service provider provides Requests Trust vectors Availability Reliability Security Fig :- Trust model using Trust vectors 2. Focused on expanded trust model based on dynamic service factors of a cloud resource
  • 10.  Trustworthiness of a cloud resource :- - Gi << trustworthiness of a resource i - Rci, Rui, Ti, Si << reliability operators of a resource - wRc, wRu, wT , wS <<weights for these operators 3.Some schemes lack adaptability with a trust fusion calculation on multi-dimensional service operators • Avoiding the effect of individual favoritism on weight allocation • Give inaccurate results in trust evaluation
  • 11. TRUST SCHEMES  Reputations-based schemes  Self-assessment schemes.  TTP-based schemes
  • 12. Reputation Based system Service providers user Fig :- Reputation Based Scheme databasedatabase database database Service providers
  • 13. database databasedatabase Historical server information user Fig:- Self-assessment schemes Service providers
  • 14. Service provider1 Availability Reliability Security Service provider3 Availability Reliability Security Service provider2 Availability Reliability Security TTP Fig:- TTP-based schemes User
  • 15. PROPOSED SYSTEM  Inspired from an idea - Service Operator-aware Trust Scheme (SOTS) Definitions for Trust :- 1) Trust of a resource :- Qualification of a resource Historical service operator Trust
  • 16. 2) TTP-based Trust Relationship Matchmaker User Service Operator TrustTrust
  • 17. 3) Trust Evaluation Factors Service Providers Service Providers Service Providers Cloud Broker Evaluation Availability Reliability Security
  • 20. Cloud Broker Trust Evaluation Availability Security Reliability
  • 21. Fig :- Real-time and dynamic service operators  Direct Operators  Indirect Operators
  • 22. Availability measurement Fig :- Example of the hardware capacity. Direct Operators
  • 23. Security measurement Fig :- Security level evaluation
  • 24. Reliability measurement For a resource performing g computing tasks within time window Δt - B(i) is the i-th measured value of the network bandwidth - C(i) is the i-th measured value of the CPU utilization rate - M(i) is the i-th measured value of the memory utilization rate - H(i) is the i-th measured value of the hard disk utilization rate - R(i) is the i-th measured value of the response time I4 to I9- Indirect Operators
  • 25. S(Δt) is the number of successful interactions U(Δt) is the number of unsuccessful interactions.
  • 26. ADAPTIVE AND EFFICIENT TRUST EVALUATION  Evaluation Matrix Normalization  Real-trust Trust Degree (RTD)  Entropy-based and Adaptive Weight Calculation  Global Trust Degree (GTD)
  • 27. Evaluation Matrix Normalization  In j-th time-stamp window Δtj  n cloud resources are assumed to require evaluation n= {x1, x2, · · · , xz, · · · , xn}
  • 28. Case 1:- xzk is a positive increasing value - CPU frequency - memory size - hard disk capacity - Average network bandwidth where max(xzk) and min(xzk) are the maximum and minimum values of row operator xzk 1
  • 29. Case 2 :- xzk is a positive decreasing value  Small value of ztk expect; this value only covers the average response time where max(xzk) and min(xzk) are the maximum and minimum values of row operator xzk, 2 Normalized Trust Operator :- 3
  • 30. Real-trust Trust Degree (RTD)  Evaluate recent cloud resource service operators  Evaluated by resource’s quality of service - time window-based trusted indicator for service operators - more sensitive to new operators - generates time window interaction takes place b/w user and resource  Definition :- Ω = {N1,N2, · · · ,Nn} denotes n registered resources in the broker TNz(Δtj) denote the RTD of resource Nn TNz(Δtj) = rz × W rz=(rz1, rz2, · · · , rzk, · · · , rzm), W = { 1, 2, · · · ,ϖ ϖ ϖk, · · ·ϖm} ϖk [0, 1],∈
  • 31. Entropy-based and Adaptive Weight Calculation  Adaptive data fusion tool  A low time and space overhead in dealing with large-scale data  Definition, Theorem 1 :- - X with possible values e1, e2, · · · en is H(X) = E(S(X)). - E is the expected value function - S(X) is the information content or self-information of X (S(X) = logb(1/p(xt)) - p(et) denotes the probability mass 4
  • 32. Theorem 2 :-  I = {I1, I2, · · · , Ik, · · · , Im} = {r1k, r2k, · · · , rzk, · · · , rnk}  Ik denotes row attribute k k={1,2,3,…….m} K=1/ln m Then entropy value of H(Ik) calculated by the each value of weight { 1, 2, · · · ,ϖ ϖ ϖk, · · ·ϖm} 5 6 7
  • 33. Global Trust Degree (GTD)  Time window v = (Δt1,Δt2, · · · ,Δtn)  Time series D = {TNi(Δt1), TNi(Δt2), · · · , TNi(Δtn)} A = {a(Δt1), a(Δt2), · · · , a(Δtj), · · · , a(Δtn)} a(Δtj) [0, 1] is the weights assigned∈ to each RTD TNi(Δtj) λ [0, 1]∈ 8 9
  • 34. Theorem 1:- In A = {a(Δt1), a(Δt2), · · · , a(Δtj), · · · , a(Δtn)} 2 time stamps are used :- Δtj Δtk Time Based attenuation property :- a(Δtj) < a(Δtk) Time complexity :- O(g)+O(mn)+O(m)+O(n2)+O(n) = O(g)+O(mn)+O(n2).
  • 35. Conclusion Here explains a new scheme knows as SOTS  For resource matchmaking across multiple clouds  Explain relationship between the users, broker, the service resources(middleware framework of trust)  Reduce user burden and improve system dependability  Model the problem of trust evaluation by multi-attribute decision-making  Develop an adaptive trust evaluation approach on information entropy theory  To overcome the limitations of traditional trust schemes  the broker can efficiently and accurately prepare the most trusted resources  provide more dependable resources to users
  • 36. Advantages  Trust management scheme for multi-cloud, multi-dimensional resource services  Adaptive fused computing approach for dynamic service operators, entropy theory  FSLA mechanism overcomes trust initialization problem for newly registered resources.
  • 37. Disadvantages and Future Scope 1) Combining trust scheme with reputation management to concerns users’ feedback 2) Universal measurement and quantitative method to assess the security levels of a resource 3) Evaluation of the proposed scheme in a larger-scale multiple cloud environment
  • 39. References 1. K. M. Khan, Q. Malluhi, “Establishing Trust in Cloud Comput-ing”, IEEE IT Professional, vol. 12, no. 5, 2010, pp. 20-27. 2. K. Hwang, D. Li, “Trusted Cloud Computing with Secure Resources and Data Coloring”, IEEE Internet Computing, vol. 14, no. 5, 2010, pp. 14- 22. 3. H. Kim, H. Lee, W. Kim, Y. Kim, “A Trust Evaluation Model for QoS Guarantee in Cloud Systems”, International Journal of Grid and Distributed Computing, vol.3, no.1, pp. 1-10, 2010. 4. P. D. Manuel, S. Thamarai Selvi, M. I. A. E. Barr, “Trust management system for grid and cloud resources”, Proc. of the First International Conference on Advanced Computing (ICAC 2009), 2009, 13-15 Dec, pp. 176-181.