Authors
Keywords
Abstract
As more people and companies rely on cloud services for data management, processing, and storage, trustworthiness of cloud computing has become a critical problem. To guarantee the security, dependability, and privacy of data kept in the cloud, it is crucial to assess a cloud provider's credibility. In this post, we'll examine the crucial elements that go into figuring out whether a cloud service is reliable and lay out a few critical points that consumers should keep in mind when making judgements. Understanding these elements will help people and businesses evaluate the reliability of cloud services and reduce any dangers that may come with implementing cloud computing solutions. Cloud computing has become a crucial aspect of both our personal and professional life in today's digital world. However, we must carefully assess the reliability of a cloud service provider before entrusting them with our sensitive data and apps. The dependability, security, privacy, and openness of a cloud provider are just a few examples of the many factors that make them trustworthy. Before selecting a cloud service, it is crucial to consider these aspects since they have an immediate influence on the reliability and accessibility of our data. This article will examine the crucial factors that establish a cloud provider's dependability, arming readers with the information they need to make wise choices and guarantee the security of their digital assets. for people, corporations, and society at large make research on evaluating the trustworthiness of cloud computing significant. Understanding the reliability of cloud providers is essential as more businesses move their operations to the cloud and more people keep their personal data in cloud-based services. First off, by evaluating the credibility of cloud providers, businesses may decide which provider to use, taking into account aspects like security, dependability, and compliance with data protection laws. This aids businesses in safeguarding sensitive information, ensuring business continuity, and preventing security breaches and data loss. Second, people may choose which cloud services to utilise for keeping their personal data with more knowledge. Individuals may assess the dangers involved and take the necessary precautions to safeguard their privacy and the security of their personal data by being aware of how trustworthy a cloud provider is. Additionally, study on the reliability of cloud computing may help with the creation of industry standards, best practises, and rules. This can build confidence between customers and cloud service providers and promote a more dependable and secure cloud computing environment. Overall, the importance of this research rests in its potential to increase cloud computing's security, privacy, and dependability, which will be advantageous to both individual users and businesses. This study can help increase the acceptance of cloud services and open up new opportunities by solving the trustworthiness issues related to the cloud. Define the goals of the research: Outline the study's aims and aims, with an emphasis on figuring out whether cloud providers are trustworthy. Review of the literature Conduct a thorough analysis of the current literature, academic papers, business standards, and industry best practises in the field of cloud trustworthiness evaluation. Identify and explain the important elements that go into making cloud providers trustworthy, including security, privacy, dependability, transparency, compliance, and data governance. Create assessment standards: To evaluate the performance of cloud providers, establish a set of assessment standards based on the variables for trustworthiness that have been established. data gathering Collect pertinent information from a variety of sources, such as the documentation provided by cloud providers, security reports, certifications, customer evaluations, and industry polls. Data analysis: Employ both qualitative and quantitative methods to examine the data acquired in order to evaluate the dependability of various cloud service providers. Create a weighted scoring system to determine the relative value of the various trustworthiness characteristics depending on their importance. Benchmarking: Evaluate and compare the reliability outcomes of various cloud providers in light of the predetermined assessment standards. Conduct case studies with consumers and representatives of cloud service providers to learn more about their opinions of reliability and past experiences. Feedback and approval: To evaluate the evaluation process and assure its dependability, seek the advice of specialists working in the cloud computing sector.Cloud Client,Cloud Service Provider, Cloud Broker, SLA Agent, Cloud Auditor, SUM
Introduction
When adopting a pay-as-you-go approach to instantly acquire services and infrastructure resources, cloud computing helps users to save upfront fees, lower operational costs, and improve reaction times. The simple fact that cloud computing has this benefit encourages consumers to move their enterprises to the cloud. In the data centre, cloud services are set up and run. Because this technology lowers operational and investment expenses for IT, consumers gain. The idea of trust has been related to compliance since in the current work we are dealing with the concept of trust with regard to cloud environment As is a legal agreement made between, is anticipated to offer the services and precisely what is needed. A negative departure from the agreed-upon terms must damage the environment's reputation. Therefore, trustworthiness has been defined as the degree of compliance of a to promised quantitative parameters as per. If an adheres to and renders services exactly as per set contract, it starts to build trust in the environment and becomes trustworthy; if it does not, it starts to lose trust in the environment and becomes untrustworthy. Although there are benefits to moving to the cloud, like lower startup costs, improved dependability and availability, and scalability, customers are still hesitant to do so. Client mistrust of service providers is one of the main causes of this. Users still have reservations about the service provider, despite the existence of contracts known as (Service Level Agreements) between clients and service providers that outline the resources, performances, and security that cloud services must offer. In order to develop trust between customers and service providers, a trust model that incorporates compliance monitoring mechanisms has been designed and simulated in this article. There are five sections in this essay. Work in the domain of cloud system trust is presented in Section 2. The suggested technique is described in Section 3, and the results are presented in Section 4. Distributed computing, grid computing, virtualization, service orientation, data storage, and networking are the foundations upon which cloud computing is utilised. It is a development and synthesis of technological, elastic, on-demand, and remote computing resources. Service excellenceInformation sharing across public and private clouds is a crucial enabler for company wide adoption of the cloud environment. For the company to use the cloud environment widely, interoperability and portability of information across public and private clouds are essential enablers. Generally speaking, there are three types of cloud computing models: public, private, and hybrid. Public clouds are often used by many people and are hosted and managed by other organisations. It is quite possible that applications from many users will be able to share cloud resources like servers, storage systems, and networks simultaneously. Private clouds, on the other hand, are housed on an organization's facilities and are intended for that organization's exclusive use. This paradigm allows businesses extensive flexibility over how they employ cloud resources. Hybrid. The hybrid architecture can assist in providing on demand, externally provided scale by allowing a private cloud to be supplemented with the capabilities of a public cloud. is suggested as a method of evaluating the reliability of cloud services that combines security and reputation. In order to ensure the security of the cloud-based context, the recommended technique assesses the dependability of cloud services. To evaluate the trustworthiness of cloud services in terms of security, a security-based trust assessment strategy is described. This method uses cloud-specific security metrics to evaluate the security of cloud services. In order to study the trustworthiness of cloud services in relation to reputation, we provide a reputation-based trust assessment technique that measures the reputation of cloud services using customer feedback ratings. It uses an objective weight assignment technique to give the relative important weight components to the security level and reputation level and aggregate them in order to achieve the quantitative trustworthiness of cloud services in order to successfully incorporate assessment findings.
Materials And Method
Cloud Client To maintain security inside a particular cloud environment, the customer configures and manages the security controls for the security group firewall, guest , and other programmes (including updates and security patches). The responsibility for encrypting data both in use and at rest falls on the cloud user.
Cloud Service Provider:A third-party provider of scalable computing resources that can be used by organisations across a network on demand. Examples include cloud-based computing, storage, platforms, and application services.
Cloud Broker:software that integrates several cloud providers into a single administration panel. The cloud broker is used when a company employs several cloud vendors.
SLA Agent:An agreement that specifies the level of service that must always be offered to the client is known as a service level agreement. usually address service quality, service availability, and provider obligations.
Cloud Auditor:a third party that is capable of conducting an impartial evaluation of the cloud implementation's performance, security, and information system operations.
SUM:totalizes the values specified by the expression or field. The TOTAL qualifier indicates that the total remains 505, notwithstanding the chart's size.
Dematal (Decision Making Trail And Evaluation Laboratory Method)
A approach for examining cause-and-effect relationships in complex systems is the Decision Making Trial and Evaluation Laboratory (DEMATEL) method. It is widely used in decision-making, especially in the management, engineering, and social science fields. The approach makes it simpler to comprehend how various components interact and influence the system as a whole. It gives decision-makers a systematic framework for locating and analysing causal links inside a system, enabling them to understand the key factors and their impacts. Here is a quick rundown of the procedure: Finding the problem The issue or circumstance that requires investigation should be clearly described. identifying the key components or factors that influence the decision-making process. The definition of a causal relationship is: Identify the root causes of the. This involves analysing the effects of each element on each and every other element inside the system. Make a direct relationship matrix: Create a matrix that displays the strength and direction of the causal connections between the different parts. Make an indirect connection matrix: Calculate the indirect relationships between the variables based on the direct relationships. Centrality evaluation Identify the centrality of each element with respect to the system as a whole that it affects. To depict the causal relationships between the variables, use a causal loop diagram. This will assist you in understanding the Decision-making and interpretation: Make an analysis to understand the results and make sense of the findings. Using the information offered, decision-makers can prioritise activities, assign resources, or address issues. The approach provides a quantitative and logical methodology to evaluate challenging decision-making situations. By supporting decision-makers in getting a complete understanding of the connections between items and their relative importance, it supports more effective decision-making processes. Although this provides a general overview of the approach, it should be noted that there may be modifications or specific adaptations of the procedure based on the area or application.
Result And Discussion
Table 1Determining The Trust Worthiness Of Cloud | ||||||
Cloud Client | Cloud Service Provider | Cloud Broker | SLA Agent | Cloud Auditor | SUM | |
Cloud Client | 0 | 3 | 2 | 4 | 2 | 11 |
Cloud Service Provider | 3 | 0 | 2 | 3 | 2 | 10 |
Cloud Broker | 2 | 2 | 0 | 4 | 1 | 9 |
SLA Agent | 2 | 2 | 2 | 0 | 2 | 8 |
Cloud Auditor | 2 | 2 | 2 | 1 | 0 | 7 |
Table 1 Shows Alternative parameter and evaluation parameter are using under Dematel Method
Figure 1 Determining The Trust Worthiness Of Cloud
Figure 1 Shows Dematel Method Shows Alternative parameter and evaluation parameter are using under Dematel Method
Table 2 Normalisation of direct relation matrix | ||||||
Normalisation of direct relation matrix | ||||||
Cloud Client | Cloud Service Provider | Cloud Broker | SLA Agent | Cloud Auditor | SUM | |
Cloud Client | 0 | 0.272727273 | 0.181818182 | 0.363636364 | 0.181818182 | 1 |
Cloud Service Provider | 0.272727273 | 0 | 0.181818182 | 0.272727273 | 0.181818182 | 0.909090909 |
Cloud Broker | 0.181818182 | 0.181818182 | 0 | 0.363636364 | 0.090909091 | 0.818181818 |
SLA Agent | 0.181818182 | 0.181818182 | 0.181818182 | 0 | 0.181818182 | 0.727272727 |
Cloud Auditor | 0.181818182 | 0.181818182 | 0.181818182 | 0.090909091 | 0 | 0.636363636 |
Table 1 Shows Normalisation of direct relation matrix Dematel Method Shows Alternative parameter and evaluation parameter are using under Dematel Method
Figure 2 Normalisation of direct relation matrix
Figure 1 Shows Normalisation of direct relation matrix for Alternative parameter and evaluation parameter are using under Dematel Method
Table 3 Calculate the total relation matrix | ||||||
Calculate the total relation matrix | ||||||
Cloud Client | Cloud Service Provider | Cloud Broker | SLA Agent | Cloud Auditor | SUM | |
Cloud Client | 0 | 0.181818182 | 0.363636364 | 0.181818182 | 0.272727273 | 0.090909091 |
Cloud Service Provider | 0.363636364 | 0 | 0.181818182 | 0.090909091 | 0.181818182 | 0.082644628 |
Cloud Broker | 0.181818182 | 0.090909091 | 0 | 0.272727273 | 0.090909091 | 0.074380165 |
SLA Agent | 0.090909091 | 0.272727273 | 0.181818182 | 0 | 0.181818182 | 0.066115702 |
Cloud Auditor | 0.181818182 | 0.363636364 | 0.090909091 | 0.272727273 | 0 | 0.05785124 |
Table 3 Shows Calculate the total relation matrix for Alternative parameter and evaluation parameter are using under Dematel Method
FIGURE 3 the total relation matrix
Figure 4 Shows Calculate the total relation matrix for Alternative parameter and evaluation parameter are using under Dematel Method
Table 4: identity matrix | ||||
I i dentity matrix | ||||
1 | 0 | 0 | 0 | 0 |
0 | 1 | 0 | 0 | 0 |
0 | 0 | 1 | 0 | 0 |
0 | 0 | 0 | 1 | 0 |
0 | 0 | 0 | 0 | 1 |
Table 4 Shows identity matrix for Alternative parameter and evaluation parameter are using under Dematel Method
Figure 4 identity matrix
Figure 4 Shows identity matrix for Alternative parameter and evaluation parameter are using under Dematel Method
TABLE 5 Y | ||||
Y | ||||
0 | 0.181818182 | 0.363636364 | 0.181818182 | 0.272727273 |
0.363636364 | 0 | 0.181818182 | 0.090909091 | 0.181818182 |
0.181818182 | 0.090909091 | 0 | 0.272727273 | 0.090909091 |
0.090909091 | 0.272727273 | 0.181818182 | 0 | 0.181818182 |
0.181818182 | 0.363636364 | 0.090909091 | 0.272727273 | 0 |
Table 5 Shows Y for Alternative parameter and evaluation parameter are using under Dematel Method
Figure 5Shows Y for Alternative parameter and evaluation parameter are using under Dematel Method
Table 6 I | ||||
I-Y | ||||
1 | -0.181818182 | -0.363636364 | -0.181818182 | -0.272727273 |
-0.363636364 | 1 | -0.181818182 | -0.090909091 | -0.181818182 |
-0.181818182 | -0.090909091 | 1 | -0.272727273 | -0.090909091 |
-0.090909091 | -0.272727273 | -0.181818182 | 1 | -0.181818182 |
-0.181818182 | -0.363636364 | -0.090909091 | -0.272727273 | 1 |
Table 6 Shows I-Y for Alternative parameter and evaluation parameter are using under Dematel Method
FIGURE 6 i-y
Figure 6 Shows I-Y for Alternative parameter and evaluation parameter are using under Dematel Method
Table 7 (I | ||||
(I-Y)-1 | ||||
1.890832008 | 1.100688924 | 1.168344815 | 1.038155803 | 1.010775481 |
1.081081081 | 1.837837838 | 0.963963964 | 0.864864865 | 0.873873874 |
0.749867515 | 0.735559089 | 1.612259318 | 0.815580286 | 0.633103692 |
0.788553259 | 0.952305246 | 0.832538421 | 1.666136725 | 0.766825649 |
1.020137785 | 1.195018548 | 0.936583642 | 1.031796502 | 1.768238827 |
Table 7 Shows I-Y-1 for Alternative parameter and evaluation parameter are using under Dematel Method
Figure 7 Shows I-Y-1 for Alternative parameter and evaluation parameter are using under Dematel Method
Table 8 Total Relation matrix (T) | |||||
Total Relation matrix (T) | |||||
Cloud Client | 0.890832008 | 1.100688924 | 1.168344815 | 1.038155803 | 1.010775481 |
Cloud Service Provider | 1.081081081 | 0.837837838 | 0.963963964 | 0.864864865 | 0.873873874 |
Cloud Broker | 0.749867515 | 0.735559089 | 0.612259318 | 0.815580286 | 0.633103692 |
SLA Agent | 0.788553259 | 0.952305246 | 0.832538421 | 0.666136725 | 0.766825649 |
Cloud Auditor | 1.020137785 | 1.195018548 | 0.936583642 | 1.031796502 | 0.768238827 |
Table 8 Shows Total Relation matrix (T) for Alternative parameter and evaluation parameter are using under Dematel Method
Figure 8 Total Relation matrix (T)
Figure 8 Shows Total Relation matrix (T for Alternative parameter and evaluation parameter are using under Dematel Method
Table 9 Ri Ci | |
Ri | Ci |
5.208797032 | 4.530471648 |
4.621621622 | 4.821409645 |
3.546369899 | 4.513690161 |
4.0063593 | 4.416534181 |
4.951775305 | 4.052817523 |
Table 9 Shows Ri Ci for Alternative parameter and evaluation parameter are using under Dematel Method
Figure 9 Shows Ri Ci for Alternative parameter and evaluation parameter are using under Dematel Method
Table 10 Ri+ Ci , Ri-Ci | |
Ri+Ci | Ri-Ci |
9.73926868 | 0.678325384 |
9.443031267 | -0.199788023 |
8.06006006 | -0.967320261 |
8.422893482 | -0.410174881 |
9.004592828 | 0.898957781 |
Table 10 Shows Ri+ Ci , Ri-Ci for Alternative parameter and evaluation parameter are using under Dematel Method
Figure 10 Ri+ Ci , Ri-Ci
Figure 10 Shows Ri+ Ci , Ri-Ci for Alternative parameter and evaluation parameter are using under Dematel Method
Table 10 T Matrix | ||||
T matrix | ||||
0.890832008 | 1.100688924 | 1.168344815 | 1.038155803 | 1.010775481 |
1.081081081 | 0.837837838 | 0.963963964 | 0.864864865 | 0.873873874 |
0.749867515 | 0.735559089 | 0.612259318 | 0.815580286 | 0.633103692 |
0.788553259 | 0.952305246 | 0.832538421 | 0.666136725 | 0.766825649 |
1.020137785 | 1.195018548 | 0.936583642 | 1.031796502 | 0.768238827 |
Table 10 Shows T Matrix for Alternative parameter and evaluation parameter are using under Dematel Method
Figure 11 T Matrix
Figure 11 Shows T Matrix for Alternative parameter and evaluation parameter are using under Dematel Method
Table 11Rank |
Rank |
1 |
2 |
5 |
4 |
3 |
Table 12 Shows Rank
Figure 12 Rank
Figure 12 Shows Rank
Conclusion
The choice of a reliable service might be based on the user's prior interactions with the provider and the estimated reputation of the service gleaned from user reviews. This study presents a hybrid trust model that combines reputation-based trust with compliance-based trust to assess service providers' trustworthiness in a cloud context. For the purpose of identifying the top cloud service providers, trust values obtained from compliance and feedback are combined. In this research, we introduced a hybrid cloud computing architecture for distributed reputation-based trust management. Each cloud in the system has autonomous local decision-making authority to determine if another cloud is trustworthy since trust value storage is dispersed at the levels of the clouds. We created a technique that may effectively respond strategic feedbacks and prevent unfairness based on the trust management concept. Due to space constraints, not all of the information on our simulation study of the proposed trust management system's performance is shown here. In the future, we intend to integrate more techniques like random walks and data smoothing to achieve higher accuracy. We will do more research and analysis on combinations and correlations on various and their individual features as rating-based dynamic discovery algorithm and algorithm integrated together to only score the. We want to test the trust rating
method using real datasets that include real monitoring data from cloud environments. Trust issues with CSPs must be dealt with
first and foremost. In this study, an assessment system that monitors compliance with and generates trustworthiness based on that compliance is proposed. The approach uses a fraction between to objectively assess the degree of trustworthiness of. Additionally, we have discussed a number of criteria for assessing compliance and trust in cloud computing. These criteria were chosen to cover the general calibre of services provided.
Ref e rence s
- Hassan, Hala, Ali Ibrahim El-Desouky, Abdelhameed Ibrahim, El-Sayed M. El-Kenawy, and Reham Arnous. "Enhanced QoS-based model for trust assessment in cloud computing environment." IEEE Access 8 (2020): 43752-43763.
- Ding, Shuai, Shanlin Yang, Youtao Zhang, Changyong Liang, and Chengyi Xia. "Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems."
- Lai, Han, Huchang Liao, Jonas Šaparauskas, Audrius Banaitis, Fernando AF Ferreira, and Abdullah Al-Barakati. "Sustainable cloud service provider development by a Z-number-based DNMA method with Gini-coefficient-based weight determination." Sustainability 12, no. 8 (2020): 3410.
- Rahman, Fatin Hamadah, Thien-Wan Au, SH Shah Newaz, Wida Susanty Suhaili, and Gyu Myoung Lee. "Find my trustworthy fogs: A fuzzy-based trust evaluation framework." Future Generation Computer Systems 109 (2020): 562-572.
- Kumar, Rakesh Ranjan, Binita Kumari, and Chiranjeev Kumar. "CCS-OSSR: a framework based on hybrid MCDM for optimal service selection and ranking of cloud computing services." Cluster Computing 24, no. 2 (2021): 867-883.
- Yadav, Ravi, and Gaurav Baranwal. "ReTREM: A responsibility based trust revision model for determining trustworthiness of fog nodes." C
- Rizvi, Syed, John Mitchell, Abdul Razaque, Mohammad R. Rizvi, and Iyonna Williams. "A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers." Journal of cloud computing 9 (2020): 1-17.
- Obulaporam, Gireesha, Nivethitha Somu, Gauthama Raman ManiIyer Ramani, Akshya Kaveri Boopathy, and Shankar Sriram Vathula Sankaran. "GCRITICPA: A CRITIC and grey relational analysis based service ranking approach for cloud service selection." In Advances in Data Science: Third International Conference on Intelligent Information Technologies, ICIIT 2018, Chennai, India, December 11–14, 2018, Proceedings 3, pp. 3-16. Springer Singapore, 2019.
- Rizvi, Syed, John Mitchell, Abdul Razaque, Mohammad R. Rizvi, and Iyonna Williams. "A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers." Journal of cloud computing 9 (2020): 1-17.
- Mujawar, Tabassum N., and Lokesh B. Bhajantri. "Behavior and feedback based trust computation in cloud environment." Journal of King Saud University-Computer and Information Sciences 34, no. 8 (2022): 4956-4967.
- Shen, Jian, Chen Wang, Jin-Feng Lai, Yang Xiang, and Pan Li. "Cate: Cloud-aided trustworthiness evaluation scheme for incompletely predictable vehicular ad hoc networks." IEEE Transactions on Vehicular Technology 68, no. 11 (2019): 11213-11226.
- Rizvi, Syed, John Mitchell, Abdul Razaque, Mohammad R. Rizvi, and Iyonna Williams. "A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers." Journal of cloud computing 9 (2020): 1-17.
- Sidhu, Jagpreet, and Sarbjeet Singh. "Improved topsis method based trust evaluation framework for determining trustworthiness of cloud service providers." Journal of Grid Computing 15 (2017): 81-105..