Bandwidth and Delay Optimization by Integration of Software Trust Estimator with Multi-user Cloud Resource Competence

Document Type: Original Article

Author

Faulty of Electrical and Robotic Engineering, Shahrood University of Technology, Shahrood, Iran

Abstract

Trust establishment is one of the significant resources to enhance the scalability and reliability of resources on cloud environments. To establish a novel trust model on SaaS (Software as a Service) cloud resources and to optimize the resource utilization of multiple user requests, an integrated software trust estimator with multi-user resource competence (IST-MRC) optimization mechanism is proposed in this paper. IST-MRC optimization mechanism combines its trustworthy properties with optimal resource allocation, on the requisition of the software apps, without any traffic occurrence in the cloud environment. Initially, a behavior trust estimator is developed in the IST-MRC mechanism to measure the trust value of the software service zone. The trust value is estimated, based on Software Availability Rate, Hit Rate, and User Feedback regarding the specific software apps. Next, the resources are optimized to multiple users using competence optimization. The competence optimization in the IST-MRC mechanism computes the processor speed, bandwidth, and latency to handle the varied traffic conditions on multiple user requests. Experiments are conducted to measure and evaluate factors, such as Successful Request Handles, Resource Utilization Efficiency, Latency Time, and Trust Success Ratio on the multiple users.

Keywords


  1. Tang J., Peng Tay W., and Wen Y., “Dynamic request redirection and elastic service scaling in cloud-centric media networks.” IEEE Transactions on Multimedia, Vol. 16 (2014), 1434-1445. DOI: 10.1109/TMM.2014.2308726.
  2. Abbadi I. M. and Ruan A., “Towards trustworthy resource scheduling in clouds.” IEEE Transactions on Information Forensics and Security, Vol. 8, (2013), 973-984. DOI: 10.1109/TIFS.2013.2248726.
  3. Wang Q., Wang C., Ren K., Lou W. and Li J., “Enabling public auditability and data dynamics for storage security in cloud computing.” IEEE Transactions on Parallel and Distributed Systems, Vol. 22, (2010), 847-859. DOI: 10.1109/TPDS.2010.183.
  4. Sundareswaran S., Squicciarini A., and Lin D., “Ensuring distributed accountability for data sharing in the cloud.” IEEE Transactions on Dependable and Secure Computing, Vol. 9, (2012), 556-568, DOI: 10.1109/TDSC.2012.26.
  5. Abbadi I, M. and Martin A., “Trust in the Cloud.” Information security technical report, Vol. 16, (2011), 108-114.
  6. Pandey S., Voorsluys W., Niu S., Khandoker A., and Buyya R., “An autonomic cloud environment for hosting ECG data analysis services.” Future Generation Computer Systems, Vol. 28, (2012), 147-154, DOI: 10.1016/j.future.2011.04.022.
  7. Takabi H., Joshi J. B., and Ahn G. “Security and privacy challenges in cloud computing environments.” IEEE Security & Privacy, Vol. 8, (2010), 24-31, DOI: 10.1109/MSP.2010.186.
  8. Wu X., Zhang R., Zeng B., and Zhou S., “A trust evaluation model for cloud computing.” Procedia Computer Science Vol. 17 (2013), 1170-1177, DOI: 10.1016/j.procs.2013.05.149.
  9. Sun D., Chang G., Sun L., and Wang X. “Surveying and analyzing security, privacy and trust issues in cloud computing environments.” Procedia Engineering, Vol. 15, (2011), 2852-2856, DOI: 10.1016/j.proeng.2011.08.537.
  10. Gao K., Wang Q., and Xi L. “Reduct algorithm based execution times prediction in knowledge discovery cloud computing environment.” The International Arab Journal of Information Technology, Vol. 11, (2014), 268-275, DOI: 10.5296/npa.v7i2.7797.
  11. Whaiduzzaman M., Nazmul Haque M., Chowdhury M. R. K., and Gani A. “A study on strategic provisioning of cloud computing services.” The Scientific World Journal Vol. 14 (2014), DOI: 10.1155/2014/894362.
  12. Wu Q., Zhang X., Zhang M., Lou Y., Zheng R., and Wei W. “Reputation revision method for selecting cloud services based on prior knowledge and a market mechanism.” The Scientific World Journal, Vol. 4, (2014), DOI: 10.1155/2014/617087.
  13. Sun Y., Zhang J., Xiong Y., and Zhu G. “Data security and privacy in cloud computing.” International Journal of Distributed Sensor Networks, Vol. 10, (2014), 19-27, DOI: 10.1155/2014/190903.
  14. Xiong A. and Xu C. “Energy efficient multi resource allocation of virtual machine based on PSO in cloud data center.” Mathematical Problems in Engineering, Vol. 2, (2014), DOI: 10.1155/2014/816518.
  15. Ghazizadeh E., Zamani M., Ab Manan J., and Alizadeh M. “Trusted computing strengthens cloud authentication.” The Scientific World Journal, Vol. 4, (2014), DOI: 10.1155/2014/260187.
  16. Varghese A. B., Hemalatha T, Sasidharan S., and Jophin S. “Trust Assessment Policy Manager in Cloud Computing-Cloud Service Provider's Perspective.” International Journal on Recent Trends in Engineering & Technology, Vol. 10, (2014), 46, DOI: 10.5772/intechopen.76338.
  17. Arianyan E., Taheri H., and Khoshdel V. “Novel fuzzy multi objective DVFS aware consolidation heuristics for energy and SLA efficient resource management in cloud data centers.” Journal of Network and Computer Applications, Vol. 78, (2017), 43-61, DOI: 10.1016/j.jnca.2016.09.016.
  18. Wang X., Chen X., Yuen C., Wu W., Zhang M., and Zhan C. “Delay-cost tradeoff for virtual machine migration in cloud data centers.” Journal of Network and Computer Applications, Vol. 78, (2017), 62-72, DOI: 10.1016/j.jnca.2016.11.003.
  19. Kumar G. and Kumar Rai M. “An energy efficient and optimized load balanced localization method using CDS with one-hop neighbourhood and genetic algorithm in WSNs.” Journal of Network and Computer Applications, Vol. 78, (2017), 73-82, DOI: 10.1016/j.jnca.2016.11.013.
  20. Lin Y., Lai Y., Teng H., Liao C., and Kao Y. “Scalable multicasting with multiple shared trees in software defined networking.” Journal of Network and Computer Applications, Vol. 78, (2017), 125-133, DOI: 10.1016/j.jnca.2016.11.014.
  21. Chauhan S. S., Pilli E. S., Joshi R., Singh G., and Govil M. “Brokering in interconnected cloud computing environments: A survey.” Journal of Parallel and Distributed Computing, Vol. 133, (2019), 193-209, DOI: 10.1016/j.jpdc.2018.08.001.
  22. Xie X., Tianwei Y., Xiao Z. and Xiaochun C. "Research on trust model in container-based cloud service." Computers, Materials and Continua, Vol. 56, No. 2, (2018), 273-283, DOI: 10.3970/cmc.2018.03587.
  23. Asadi F., and Hamidi H. "An architecture for security and protection of big data." International Journal of Engineering, Vol. 30, No. 10, (2017), 1479-1486, DOI: 10.5829/ije.2017.30.10a.08.
  24. Xu X., Liu X., Xu Z., Wang C., Wan S. and Yang X. "Joint Optimization of Resource Utilization and Load Balance with Privacy Preservation for Edge Services in 5G Networks." Mobile Networks and Applications (2019), 1-12, DOI: 10.1007/s11036-019-01448-8.
  25. Speily, B., Omid R., and Rezai H. "Energy aware resource management of cloud data centers." International Journal of Engineering, Vol. 30, No. 11, (2017), 1730-1739, DOI: 10.5829/ije.2017.30.11b.14.