The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Using the Improved PROMETHEE for Selection of Trustworthy Cloud Database Servers

The adoption of cloud computing transfers control of resources to cloud service providers. This transformation gives rise to variety of security and privacy issues which results into lack of trust of Cloud Client (CC) on Cloud Service Provider (CSP). Clients need a sense of trust on service provider in order to migrate their businesses to cloud platform. In this paper, an attempt has been made to design an improved Preference Ranking Organization Method for Enrichment Evaluations (PROMETHEE) method based selection technique for choosing trustworthy Cloud Database Servers (CDSs). The selection technique utilizes multi attribute decision making approach for selecting trustworthy CDSs. The technique makes use of benchmark parameters to evaluate selection index of trustworthy CDSs. The selection index assists CCs in choosing the trustworthy CSPs. To demonstrate the proposed technique’s applicability to real cloud environment, a case study based evaluation has been performed. The case study has been designed and demonstrated using real cloud data collected from Cloud Harmony Reports. This data serves as the dataset for trust evaluation and CDS selection. The results demonstrate the effectiveness of the proposed selection technique in real cloud environment.


[1] Beth T., Borcherding M., and Klein B., “Valuation of Trust in Open Networks,” in Proceedings of European Symposium on Research in Computer Security, Brighton, pp. 1- 18, 1994.

[2] Brans J., Vincke P., and Mareschal B., “How to Select and How to Rank Projects: The PROMETHEE Method,” European Journal of Operational Research, vol. 24, no. 2, pp. 228- 238, 1986.

[3] Chandran K., Valarmathy S., and Kirubakaran S., “Designing A Fuzzy-Logic Based Trust and Reputation Model for Secure Resource Allocation in Cloud Computing,” The International Arab Journal of Information Technology, vol. 13, no. 1, pp. 30-37, 2016.

[4] Chaowen C., Chen L., and Yuqiao W., “A Subjective Trust Model Based on Two- Dimensional Measurement,” in Proceedings of International Conference on Computer Engineering and Technology, Xi'an, pp. 37-41, 2009.

[5] Doelitzscher F., Fischer C., Moskal D., Reich C., Knahl M., and Clarke N., “Validating Cloud Infrastructure Changes by Cloud Audits,” in Proceedings of IEEE 8th World Congress Services, Honolulu, pp. 377-384, 2012.

[6] Fan W., Yang S., and Pei J., “A Novel Two Stage Model for Cloud Service Trustworthiness Evaluation,” Expert Systems, vol. 31, no. 2, pp. 136-153, 2014.

[7] Filali F. and Yagoubi B., “A General Trust Management Framework for Provider Selection in Cloud Environment,” in Proceedings of Advances in Databases and Information Systems, Poitiers, pp. 446-457, 2015.

[8] Firdhous M., Ghazali O., and Hassan S., “Trust and Trust Management in Cloud Computing-A Survey,” InterNetWorks Research Group, Technical Report, 2011.

[9] Foster I., Zhao Y., Raicu L., and Lu S., “Cloud Computing and Grid Computing 360-Degree Compared,” in Proceedings of Grid Computing Environments Workshop, Austin, pp. 1-10, 2008.

[10] Gambetta D., Trust: Making and Breaking of Cooperative Relations, Blackwell, 1990.

[11] Garg S., Versteeg S., and Buyya R., “A Framework For Ranking Of Cloud Computing Services,” Future Generation Computer Systems, vol. 29, no. 4, pp. 1012-1023, 2013.

[12] Ghosh N., Ghosh S., and Das S., “Selcsp: A Framework to Facilitate Selection of Cloud Service Providers,” IEEE Transactions on Cloud Using the Improved PROMETHEE for Selection of Trustworthy Cloud Database Servers 201 Computing, vol. 3, no. 1, pp. 66-79, 2015.

[13] Gowrigolla B., Sathyalakshmi S., and Masillamani R., “Design and Auditing Of Cloud Computing Security,” in Proceedings of 5th International Conference on Information and Automation for Sustainability, Colombo, pp. 292- 297, 2010.

[14] Guo Q., Sun D., Chang G., Sun L., and Wang X., “Modeling and Evaluation of Trust in Cloud Computing Environments,” in Proceedings of 3rd International Conference on Advanced Computer Control, Harbin, pp. 112-116, 2011.

[15] https://cloudharmony.com/reports/state-of-the- cloud-compute-report, Last Visited, 2015.

[16] Jøsang A., “An Algebra for Assessing Trust in Certification Chains,” in Proceedings of the Network and Distributed Systems Security Symposium, San Dieg, pp. 1-10, 1999.

[17] Jøsang A., Ismail R., and Boyd C., “A Survey of Trust and Reputation Systems for Online Service Provision,” Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2007.

[18] Kamvar S., Schlosser M., and Garcia-Molina H., “EigenRep: Reputation Management in Peer-To- Peer Networks,” in Proceedings of 12th International World Wide Web Conference, Hungary, 2003.

[19] Ko R., Jagadpramana P., Mowbray M., Pearson S., Kirchberg M., Liang Q., and Lee B., “TrustCloud: A Framework for Accountability and Trust in Cloud Computing,” in Proceedings of IEEE World Congress Services, Washington, pp. 584-588, 2011.

[20] Liu Q., Wang G., and Wu J., “Consistency as a Service: Auditing Cloud Consistency,” IEEE Transactions on Network and Service Management, vol. 11, no. 1, pp. 25-35, 2014.

[21] Mell P. and Grance T., “The NIST Definition of Cloud Computing,” Communications of the ACM, vol. 53, no. 6, 2011.

[22] Noor T. and Sheng Q., “Credibility-Based Trust Management for Services in Cloud Environments,” in Proceedings of Service- Oriented Computing, Berlin, pp. 328-343, 2011.

[23] Noor T., Sheng Q., Zeadally S., and Yu J., “Trust Management of Services in Cloud Environments: Obstacles and Solutions,” ACM Computing Surveys, vol. 46, no. 1, 2013.

[24] Ramanathan R., “A Note on the Use of the Analytic Hierarchy Process For Environmental Impact Assessment,” Journal of Environmental Management, vol. 63, no. 1, pp. 27-35, 2001.

[25] Rao R. and Patel B., “Decision Making In The Manufacturing Environment Using An Improved PROMETHEE Method,” International Journal of Production Research, vol. 48, no. 16, pp. 4665-4682, 2010.

[26] Rao R., Decision Making In The Manufacturing Environment: Using Graph Theory And Fuzzy Multiple Attribute Decision Making Methods, Springer Science and Business Media, 2007.

[27] Ron S. and Aliko P., “Service Level Agreements,” Internet NG Project, 2001.

[28] Saaty T., Theory and Applications of the Analytic Network Process: Decision Making With Benefits, Opportunities, Costs, and Risks, RWS Publications, 2005.

[29] Shetty S., “Auditing and Analysis of Network Traffic in Cloud Environment,” in Proceedings of IEEE 9th World Congress Services, Santa Clara, pp. 260-267, 2013.

[30] Sotomayor B., Montero R., Liorente I., and Foster I., “Virtual Infrastructure Management in Private and Hybrid Clouds,” IEEE Internet Computing, vol. 13, no. 5, pp. 14-22, 2009.

[31] Subashini S. and Kavitha V., “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1-11, 2011.

[32] Taillandier P. and Stinckwich S., “Using the PROMETHEE Multi-Criteria Decision Making Method To Define New Exploration Strategies For Rescue Robots,” in Proceedings of International Symposium on Safety Security and Rescue Robotics, Kyoto, pp. 321-326, 2011.

[33] Wang C., Wang Y., Liu C., and Wang X., “An Audit-based Trustworthiness Verification Scheme for Monitoring the Integrity of Cloud Servers,” Journal of Computational Information Systems, vol. 10, no. 23, pp. 9923-9937, 2014.

[34] Wu L. and Buyya R., “Service Level Agreement (SLA) In Utility Computing Systems,” Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, vol. 1, pp. 1-25, 2010.

[35] Zhang B., Huang Z., and Xiang Y., “A Novel Multiple-Level Trust Management Framework for Wireless Sensor Networks,” Computer Networks, vol. 72, pp. 45-61, 2014. 202 The International Arab Journal of Information Technology, Vol. 16, No. 2, March 2019 Jagpreet Sidhu received his Masters and Ph.D degree from Panjab University, India. He is currently working as Assistant Professor in Jaypee University of Information Technology, Waknaghat, India. He has published many papers in international journals and conferences. His research interests include cloud computing and trust issues in distributed systems. Sarbjeet Singh is currently working as Professor in UIET, Panjab University, India. He received his Masters and Ph.D degree from Thapar University, India. His research interests include security and trust related issues in cloud computing. He is Life Member of Computer Society of India and Indian Society for Technical Education.