DOI QR코드

DOI QR Code

A Method for Service Evaluation Based on Fuzzy Theory for Cloud Computing

  • Guo, Liangmin (School of Mathematics and Computer Science, Anhui Normal University) ;
  • Luo, Yonglong (School of Mathematics and Computer Science, Anhui Normal University) ;
  • He, Xiaokang (School of Mathematics and Computer Science, Anhui Normal University) ;
  • Hu, Guiyin (School of Mathematics and Computer Science, Anhui Normal University) ;
  • Dong, Yan (School of Mathematics and Computer Science, Anhui Normal University)
  • Received : 2016.10.12
  • Accepted : 2017.02.03
  • Published : 2017.04.30

Abstract

Aiming at the phenomenon of false information issued by service providers in cloud computing environment, a method for service evaluation based on fuzzy theory is put forward in this paper. According to the quality of services provided by cloud service providers and their behavior during interactions, a trust relationship between cloud service providers and cloud service consumers is established, which can be quantified by using fuzzy theory. The quality of services is evaluated by drawing on the trust relationship. In our method, the recommendation credibility of a cloud service consumer is determined through behavior similarity with evaluators and a praise factor. The introduction of the praise factor better suits the phenomenon of a high-quality service getting more repeat customers. The negative impact of dishonest customers is reduced, and the accuracy of trust and cloud service quality evaluation is improved by introducing a confidence factor that can be dynamically adjusted. The experimental results show that our method can effectively and accurately evaluate the trust value and service quality of providers, while weakening the influence of dishonest consumers, and quickly detect dishonest service providers. This is beneficial for consumers trying to find high quality service providers for similar services.

Keywords

References

  1. Cloud computing, 2012.
  2. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, and I. Stoica, "Above the clouds: a berkeley view of cloud computing," 2009.
  3. Chunming Rong, Son T. Nguyen, Martin G. Jaatun, "Beyond lightning: A survey on security challenges in cloud computing," Computer and Electrical Engineering, no. 39, pp. 47-54, 2013.
  4. Y. Huang, "The research on evaluation model of cloud service based on QoS and application," Master, Thesis, Zhejiang GongShang University, CN, 2013.
  5. C. R. Choi, H. Y. Jeong, "Quality evaluation and best service choice for cloud computing based on user preference and weights of attributes using the analytic network process," Electronic Commerce Research, vol. 14, no. 3, pp. 245-270, 2014. https://doi.org/10.1007/s10660-014-9156-1
  6. S. G. Wang, Z. P. Liu, Q. B. Sun, H. Zou, F. C. Yang, "Towards an accurate evaluation of quality of cloud service in service-oriented cloud computing," Journal of Intelligent Manufacturing, vol. 25, no. 2, pp. 283-291, 2014. https://doi.org/10.1007/s10845-012-0661-6
  7. C. H. Hu, X. X. Luo, S. C. Wang, Y. Liu, "Approach of service evaluation based on trust reasoning for cloud computing," Journal on Communications, vol. 32, no.12, pp. 72-81, 2011.
  8. C. H. Hu, B. G. Chang, H. Xu, Q. L. Zhao, "Approach of service combination based on deepness trust reasoning in complex cross-organizational collaboration," Journal of Central South University (Science and Technology), vol. 43, no. 2, pp. 567-575, 2012.
  9. C. H. Hu, X. H. Chen, M. Wu, J. X. Liu, "A service trust negotiation and access control strategy based on SLA in cloud computing," Science China: Information Sciences, vol. 42, no. 3, pp. 314-332, 2012.
  10. M. Blaze, J. Feigenbaum, J. Lacy, "Decentralized trust management," in Proc. of the IEEE 17th Symposium on Security and Privacy, Oakland, CA, pp. 164-173, 1996.
  11. A. A. Rahman, S. Hailes, "A distributed trust model," in Proc. of the new Security Paradigms Workshop, Cambria, UK, pp. 48-60, 1998.
  12. A. Josang and R. Ismail, "The beta reputation system," in Proc. of the 15th Bled Electronic Commerce Conference, Bled, pp. 41-55, 2002.
  13. W. T. Teacy, J. Patel, N. R. Jennings, M. Luck, "Travos: trust and reputation in the context of inaccurate information sources," Autonomous Agents and Multi-Agent Systems, vol. 12, no. 2, pp.183-198, 2006. https://doi.org/10.1007/s10458-006-5952-x
  14. R. Zhou, K. Hwang, "Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing," IEEE Transactions on Parallel and Distributed Systems, vol.18, no. 4, pp. 1-14, 2007. https://doi.org/10.1109/TPDS.2007.253276
  15. Shanshan Song, Kai Hwang, Runfang Zhou, Yu-Kwong Kwok, "Trusted P2P transactions with fuzzy reputation aggregation," IEEE Internet Computing Magzine Special Issue on Security for P2P and AdHoc Networks, vol. 9, no. 6, pp. 24-34, 2005.
  16. Tang Wen, Hu Jianbin, and Chen Zhong, "Research on a fuzzy logical-based subjective trust management model," Journal of Computer Research and Development, vol. 42, no. 10, pp. 1654-1659, 2005. https://doi.org/10.1360/crad20051002
  17. S. D. Ramchurn, C. Sierra, L. Godo, N. R. Jennings, "Devising a trust model for multi-agent interactions using confidence and reputation," International Journal of Applied Artificial Intelligence, vol. 18, no. 10, pp. 833-852, 2003.
  18. M. Supriya, L. J. Venkataramana, K. Sangeeta, G. K. Patra, "Estimating trust value for cloud service providers using fuzzy logic," International Journal of Computer Application, vol. 48, no. 19, pp. 28-34, 2012. https://doi.org/10.5120/7457-0491
  19. A. Selvaraj, S. Sundararajan, "Evidence-based trust evaluation system for cloud services using fuzzy logic," International Journal of Fuzzy Systems, pp. 1-9, 2016.
  20. Changsong Li, Shilong Wang, Ling Kang, Liang Guo, Yang Cao, "Trust evaluation model of cloud manufacturing service platform," International Journal of Advanced Manufacturing Technology, vol. 75, no. 1, pp. 489-501, 2014. https://doi.org/10.1007/s00170-014-6112-0
  21. M. Alhamad, T. Dillon, and E. Chang, "SLA-based trust model for cloud computing," in Proc. of the IEEE 13th International Conference on Network-Based Information Systems, Takayama, Japan, pp. 321-324, 2010.
  22. S. Chakraborty and K. Roy, "An sla-based framework for estimating trustworthiness of a cloud," in Proc. of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, pp. 321-324. 2012.
  23. S. M. Habib, S. Ries, and M. Muhlhauser, "Towards a trust management system for cloud computing," in Proc. of the IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, pp. 933-939, 2011.
  24. T. H. Noor and Q. Z. Sheng, "Trust as a service: a framework for trust management in cloud environments," in Proc. of the IEEE 12th International Conference on Web Information System Engineering, Sydney, Australia, pp. 314-321, 2011.
  25. T. H. Noor, Q. Z. Sheng, A. Ngu, J. Law, "CloudArmor: A platform for credibility-based trust management of cloud services," in Proc. of the 22nd ACM Conference on Information and Knowledge Management, San Francisco, USA, pp. 2509-2512, 2013.
  26. X. L. Xie, L. Liu, P. Zhao, "Trust model based on double incentive and deception detection for cloud computing," Journal of Electronics & Information Technology, vol. 34, no. 4, pp. 812-817, 2012.
  27. Hiroyuki Sato, Atsushi Kanai, Shigeaki Tanimoto, "A cloud trust model in a security aware cloud," in Proc. of the 10th Annual International Symposium on Applications and the Internet, Seoul, Korea, pp. 121-124, 2010.
  28. L. F. Wang, Z. P. Wu, "A novel trustworthiness measurement model for cloud service," in Proc. of the IEEE/ACM 7th International Conference on Utility and Cloud Computing, London, UK, pp. 928-933, 2014.
  29. W. J. Fan, S. L. Yang, H. Perros, J. Pei, "A multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning approach," International Journal of Automation and Computing, vol. 12, no. 2, pp. 208-219, 2015. https://doi.org/10.1007/s11633-014-0840-3
  30. M. Chiregi, N. J. Navimipour, "A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll entities," Computers in Human Behavior, vol. 60, pp. 280-292, 2016. https://doi.org/10.1016/j.chb.2016.02.029
  31. M. D. Tang, X. L. Dai, J. X. Liu, J. J. Chen, "Towards a trust evaluation middleware for cloud service selection," Future Generation Computer Systems, 2016.
  32. V. Viji Rajendran, S. Swamynathan, "Hybrid model for dynamic evaluation of trust in cloud services," Wireless Networks, vol. 22, pp. 1807-1818, 2016. https://doi.org/10.1007/s11276-015-1069-y
  33. C. Elizabeth, H. Farookh, D. Tharam, "Trust and reputation for service-oriented environments: technologies for building business intelligence and consumer confidence," New York: Wiley, 2006.
  34. H. Ma, Z. G. H, "User preferences-aware recommendation for trustworthy cloud services based on fuzzy clustering," Journal of Central South University, vol. 22, no. 9, pp. 3495-3505, 2015. https://doi.org/10.1007/s11771-015-2889-8

Cited by

  1. Optimal selection of design scheme in cloud environment: A novel hybrid approach of multi-criteria decision-making based on F-ANP and F-QFD vol.38, pp.3, 2017, https://doi.org/10.3233/jifs-190630
  2. Subjective Imaging Effect Assessment for Intelligent Imaging Terminal Design: a Method for Engineering Site vol.14, pp.3, 2017, https://doi.org/10.3837/tiis.2020.03.008