Contact at mumbai.academics@gmail.com or 8097636691
Responsive Ads Here

Tuesday, 13 February 2018

A Framework to Facilitate Selection of Cloud Service Providers(2015)


A Framework to Facilitate Selection of Cloud Service Providers(2015)

ABSTRACT:
With rapid technological advancements, cloud marketplace witnessed frequent emergence of new service providers with similar offerings. However, service level agreements (SLAs), which document guaranteed quality of service levels, have not been found to be consistent among providers, even though they offer services with similar functionality. In service outsourcing environments, like cloud, the quality of service levels are of prime importance to customers, as they use third-party cloud services to store and process their clients’ data. If loss of data occurs due to an outage, the customer’s business gets affected. Therefore, the major challenge for a customer is to select an appropriate service provider to ensure guaranteed service quality. To support customers in reliably identifying ideal service provider, this work proposes a framework, SelCSP, which combines trustworthiness and competence to estimate risk of interaction. Trustworthiness is computed from personal experiences gained through direct interactions or from feedbacks related to reputations of vendors. Competence is assessed based on transparency in provider’s SLA guarantees. A case study has been presented to demonstrate the application of our approach. Experimental results validate the practicability of the proposed estimating mechanisms.
EXISTING SYSTEM:
  1. Some works have proposed computation models for trust by incorporating the concept of risk. Like trust, reputation has also been studied extensively. From the perspective of social network researchers, reputation is perceived as an entity which is globally visible to all members of a social network community.
  2. No work addresses the issue of selecting trustworthy service provider in cloud marketplace.
  3.  Estimation of risk of outsourcing a business onto third-party cloud has not been handled in reported works.
  4. Models proposed in reported works lack experimentation and analysis.
  5. In the state-of-the-art cloud, the security guarantees and responsibilities are specified in SLAs. However, vague clauses and unclear technical specifications of SLAs make selection of service provider difficult for customers.
  6.  Transparency of provider’s SLA is one of the provisions to deduce competence. We have used this approach in the present work to estimate cloud provider’s competence.
DISADVANTAGES OF EXISTING SYSTEM:
  1. No mathematical model presented.
  2. No experiment or validation done.
  3. Some results have been given to establish higher accuracy of the model, but lacks analysis.
PROPOSED SYSTEM:
  1.  The current work is significant as it proposes a framework, SelCSP, which attempts to compute risk involved in interacting with a given cloud service provider (CSP).
  2. The framework estimates perceived level of interaction risk by combining trustworthiness and competence of cloud provider. Trustworthiness is computed from ratings obtained through either direct interaction or feedback. Competence is estimated from the transparency of SLA guarantees.
  3.  A framework, termed as SelCSP, has been proposed to facilitate customers in selecting an ideal cloud service provider for business outsourcing which depicts different modules of the framework and how these modules are functionally related.
  4. SelCSP framework provides APIs through which both customers and providers can register themselves. After registering, customer can provide trust ratings based on interactions with provider. Cloud provider needs to submit its SLA to compute competence.
  5. At present, verifying the correctness of submitted ratings or sanitizing the erroneous data in the framework is beyond the scope. We assume that only registered customers can provide referrals/feedbacks and they do not have any malicious intents of submitting unfair ratings.
ADVANTAGES OF PROPOSED SYSTEM:
  1. Develop a framework, called SelCSP, to compute overall perceived interaction risk.
  2. Establish a relationship among perceived interaction risk, trustworthiness and competence of service provider.
  3.  Propose a mechanism by which trustworthiness of a service provider may be estimated.
  4.  Propose a mechanism by which transparency of any provider’s SLA may be computed.
  5. Comparison of trust and competence results generated by SelCSP and those obtained from models reported in literature.
  6.  Analysis of results to provide insight into the behavior of the proposed risk model.

MODULES:
  1. SelCSP Framework
  2. Risk Estimation
  3. Trust Estimation
  4. Reputation Estimation
  5. Estimating Cloud Service Provider’s
MODULE DESCRIPTIONS:
SelCSP Framework:
A framework, termed as SelCSP, has been proposed to facilitate customers in selecting an ideal cloud service provider for business outsourcing. SelCSP framework provides APIs through which both customers and providers can register themselves. After registering, customer can provide trust ratings based on interactions with provider. Cloud provider needs to submit its SLA to compute competence. At present, verifying the correctness of submitted ratings or sanitizing the erroneous data in the framework is beyond the scope. We assume that only registered customers can provide referrals/feedbacks and they do not have any malicious intents of submitting unfair ratings.
Risk Estimation:
Our objective is to support cloud customers to reliably identify an “ideal” cloud provider for business/ service outsourcing. The term “ideal” implies that the service providing agent is trusted as well as competent enough to provide secure and guaranteed service. This results in low perceived interaction risk. The authors have identified total perceived interaction risk as a sum of relational risk and performance risk.
Relational risk: It is defined as the probability and consequence of not having satisfactory cooperation. This risk arises because of potential opportunistic behavior on part of both stakeholders (consumer and provider).
Performance risk: It is defined as the probability and consequences that alliance objectives are not achieved despite satisfactory cooperation among the partner firms.
Trust Estimation:
Reliability of an entity cannot be estimated by traditional hard security mechanisms: authentication and access control, two central aspects of information and system security. The reason is, in a distributed environment like cloud, where customers are not aware of service or resource provider’s reliability, the latter may act deceitfully by providing false or misleading information related to service quality levels. Interestingly, the problem of providing security has reversed, and we have to protect cloud customers rather than resource providers. In this scenario, soft security mechanisms like trust and reputation can provide protection against such threats. Trust is a socio-cognitive phenomenon which has a wide range of definitions proposed by different researchers. It is a subjective view of a customer on a provider which is usually gained from personal experiences obtained through direct interactions, taken place in the past. We assume reliability of a service provider to be context or situation sensitive. This is because, a provider may behave differently under varying contexts, and such behavior is largely independent of one another.
Reputation Estimation:
Reputation model comes into effect when customer cj has not interacted with provider pk on current context in the past. Under this situation, cj has to believe in feedbacks/referrals from other customers who have directly interacted with pk. We denote a customer providing feedback as a “witness” from cj’s viewpoint. Feedbacks from various witnesses are to be combined to obtain a global reputation score for any provider. Such referrals from different sources may not crisply define a provider’s reputation as “trusted” or “distrusted” following any boolean function.
Estimating Cloud Service Provider’s:
In cloud marketplace, vendors negotiate service quality levels with customers by means of SLA. Different vendors offer different SLA structures, service offerings, performance levels, and negotiation opportunities. SLA can be used to select a service provider on the basis of data protection, continuity, and cost. A typical SLA will contain the following: (i) a set of services which the provider will deliver, (ii) a complete, specific definition of each service, (iii) responsibilities of the provider and the consumer, (iv) a set of metrics to measure whether the provider is offering the services as guaranteed, (v) exclusion clauses, (vi) an auditing mechanism to monitor the services, (vii) the remedies available to consumer and provider if the terms are not satisfied, and (ix) how SLAs will change over time.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
Ø System                           :         Pentium IV 2.4 GHz.
Ø Hard Disk                       :         40 GB.
Ø Floppy Drive                   :         1.44 Mb.
Ø Monitor                          :         15 VGA Colour.
Ø Mouse                            :         Logitech.
Ø Ram                               :         512 Mb.
SOFTWARE REQUIREMENTS:
Ø Operating system   :         Windows XP/7.
Ø Coding Language   :         ASP.net, C#.net
Ø Tool                      :         Visual Studio 2010
Ø Database               :         SQL SERVER 2008

No comments:

Post a Comment