메뉴 건너뛰기




Volumn 15, Issue 1, 2017, Pages 81-105

Improved TOPSIS Method Based Trust Evaluation Framework for Determining Trustworthiness of Cloud Service Providers

Author keywords

Cloud computing; Compliance; Improved TOPSIS; SLA; Trust; Trustworthiness

Indexed keywords

CLOUD COMPUTING; COMPLEX NETWORKS; COMPLIANT MECHANISMS; DIGITAL STORAGE; DISTRIBUTED DATABASE SYSTEMS; NETWORK SECURITY;

EID: 84957690302     PISSN: 15707873     EISSN: 15729184     Source Type: Journal    
DOI: 10.1007/s10723-016-9363-1     Document Type: Article
Times cited : (56)

References (51)
  • 1
    • 84908476751 scopus 로고    scopus 로고
    • A novel trust management framework for multi-cloud environments based on trust service providers
    • Fan, W., Perros, H.: A novel trust management framework for multi-cloud environments based on trust service providers. Knowl.-Based Syst. 70, 392–406 (2014)
    • (2014) Knowl.-Based Syst. , vol.70 , pp. 392-406
    • Fan, W.1    Perros, H.2
  • 3
    • 84887477922 scopus 로고    scopus 로고
    • Trust management of services in cloud environments: obstacles and solutions
    • Noor, T.H., Sheng, Q.Z., Zeadally, S., Yu, J.: Trust management of services in cloud environments: obstacles and solutions. ACM Comput. Surv. 46(1), 12 (2013)
    • (2013) ACM Comput. Surv. , vol.46 , Issue.1 , pp. 12
    • Noor, T.H.1    Sheng, Q.Z.2    Zeadally, S.3    Yu, J.4
  • 6
    • 78649408074 scopus 로고    scopus 로고
    • The New York Times [online]. (). Accessed 14 July 2014
    • Gottfrid, D.: Self-service prorated supercomputing fun. The New York Times [online]. http://open.blogs.nytimes.com/2007/11/01/self-service-prorated-super-computing-fun/ (2007). Accessed 14 July 2014
    • (2007) Self-service prorated supercomputing fun
    • Gottfrid, D.1
  • 7
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 9
    • 74049122943 scopus 로고    scopus 로고
    • Privacy-preserving digital identity management for cloud computing
    • Bertino, E., Paci, F., Ferrini, R., Shang, N.: Privacy-preserving digital identity management for cloud computing. IEEE Data Eng. Bull. 32(1), 21–27 (2009)
    • (2009) IEEE Data Eng. Bull. , vol.32 , Issue.1 , pp. 21-27
    • Bertino, E.1    Paci, F.2    Ferrini, R.3    Shang, N.4
  • 10
    • 77956356055 scopus 로고    scopus 로고
    • Trusted cloud computing with secure resources and data coloring
    • Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE Internet Comput. 14(5), 14–22 (2010)
    • (2010) IEEE Internet Comput. , vol.14 , Issue.5 , pp. 14-22
    • Hwang, K.1    Li, D.2
  • 11
    • 69349098776 scopus 로고    scopus 로고
    • Cloud computing and the common man
    • Viega, J.: Cloud computing and the common man. Computer 42(8), 106–108 (2009)
    • (2009) Computer , vol.42 , Issue.8 , pp. 106-108
    • Viega, J.1
  • 13
    • 80054066376 scopus 로고    scopus 로고
    • Trust as a service: a framework for trust management in cloud environments
    • Springer, Berlin Heidelberg
    • Noor, T.H., Sheng, Q.Z.: Trust as a service: a framework for trust management in cloud environments. In: Web Information System Engineering (WISE), pp. 314–321. Springer, Berlin Heidelberg (2011)
    • (2011) Web Information System Engineering (WISE) , pp. 314-321
    • Noor, T.H.1    Sheng, Q.Z.2
  • 15
    • 84926427038 scopus 로고    scopus 로고
    • Trust mechanisms for cloud computing
    • Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. Journal of Cloud Computing 2 (1), 1–14 (2011)
    • (2011) Journal of Cloud Computing , vol.2 , Issue.1 , pp. 1-14
    • Huang, J.1    Nicol, D.M.2
  • 16
    • 67649425263 scopus 로고    scopus 로고
    • Cloud computing–A question of trust
    • Everett, C.: Cloud computing–A question of trust. Computer Fraud & Security 6, 5–7 (2009)
    • (2009) Computer Fraud & Security , vol.6 , pp. 5-7
    • Everett, C.1
  • 17
    • 84865644090 scopus 로고    scopus 로고
    • Success factors for deploying cloud computing
    • Garrison, G., Kim, S., Wakefield, R.L.: Success factors for deploying cloud computing. Commun. ACM 55(9), 62–68 (2012)
    • (2012) Commun. ACM , vol.55 , Issue.9 , pp. 62-68
    • Garrison, G.1    Kim, S.2    Wakefield, R.L.3
  • 18
    • 78650042649 scopus 로고    scopus 로고
    • In cloud computing we trust—But should we?
    • Arce, I., Ghosh, A.: In cloud computing we trust—But should we? IEEE Secur. Priv. 8(6), 14–16 (2010)
    • (2010) IEEE Secur. Priv. , vol.8 , Issue.6 , pp. 14-16
    • Arce, I.1    Ghosh, A.2
  • 20
    • 77957700442 scopus 로고    scopus 로고
    • Establishing trust in cloud computing
    • Khan, K.M., Malluhi, Q.: Establishing trust in cloud computing. IT Professional 12(5), 20–27 (2010)
    • (2010) IT Professional , vol.12 , Issue.5 , pp. 20-27
    • Khan, K.M.1    Malluhi, Q.2
  • 23
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • Takabi, H., Joshi, J.B., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)
    • (2010) IEEE Secur. Priv. , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.2    Ahn, G.J.3
  • 26
    • 84862730520 scopus 로고    scopus 로고
    • Trust model for optimized cloud services
    • Springer, Berlin Heidelberg
    • Pawar, P.S., Rajarajan, M., Nair, S.K., Zisman, A.: Trust model for optimized cloud services. In: Trust Management VI, pp. 97–112. Springer, Berlin Heidelberg (2012)
    • (2012) Trust Management VI , pp. 97-112
    • Pawar, P.S.1    Rajarajan, M.2    Nair, S.K.3    Zisman, A.4
  • 29
    • 84865048353 scopus 로고    scopus 로고
    • A framework for ranking of cloud computing services
    • Garg, S.K., Versteeg, S., Buyya, R.: A framework for ranking of cloud computing services. Futur. Gener. Comput. Syst. 29(4), 1012–1023 (2013)
    • (2013) Futur. Gener. Comput. Syst. , vol.29 , Issue.4 , pp. 1012-1023
    • Garg, S.K.1    Versteeg, S.2    Buyya, R.3
  • 31
    • 84925290142 scopus 로고    scopus 로고
    • Cloud services representation using SLA composition
    • García, A.G., Blanquer, I.: Cloud services representation using SLA composition. J. Grid. Comput. 13(1), 35–51 (2015)
    • (2015) J. Grid. Comput. , vol.13 , Issue.1 , pp. 35-51
    • García, A.G.1    Blanquer, I.2
  • 32
    • 84892433822 scopus 로고    scopus 로고
    • Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems
    • Ding, S., Yang, S., Zhang, Y., Liang, C., Xia, C.: Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems. Knowl.-Based Syst. 56, 216–225 (2014)
    • (2014) Knowl.-Based Syst. , vol.56 , pp. 216-225
    • Ding, S.1    Yang, S.2    Zhang, Y.3    Liang, C.4    Xia, C.5
  • 33
    • 84920913053 scopus 로고    scopus 로고
    • An audit-based trustworthiness verification scheme for monitoring the integrity of cloud servers
    • Wang, C., Wang, Y., Liu, C., Wang, X.: An audit-based trustworthiness verification scheme for monitoring the integrity of cloud servers. J. Comput. Inf. Syst. 10(23), 9923–9937 (2014)
    • (2014) J. Comput. Inf. Syst. , vol.10 , Issue.23 , pp. 9923-9937
    • Wang, C.1    Wang, Y.2    Liu, C.3    Wang, X.4
  • 34
    • 84900505883 scopus 로고    scopus 로고
    • A novel two stage model for cloud service trustworthiness evaluation
    • Fan, W., Yang, S., Pei, J.: A novel two stage model for cloud service trustworthiness evaluation. Expert. Syst. 31(2), 136–153 (2014)
    • (2014) Expert. Syst. , vol.31 , Issue.2 , pp. 136-153
    • Fan, W.1    Yang, S.2    Pei, J.3
  • 35
    • 28844464697 scopus 로고    scopus 로고
    • Trusted grid computing with security binding and trust integration
    • Song, S., Hwang, K., Kwok, Y.K.: Trusted grid computing with security binding and trust integration. J. Grid. Comput. 3(1), 53–73 (2005)
    • (2005) J. Grid. Comput. , vol.3 , Issue.1 , pp. 53-73
    • Song, S.1    Hwang, K.2    Kwok, Y.K.3
  • 36
    • 33748191280 scopus 로고    scopus 로고
    • Trust brokering and its use for resource matchmaking in public-resource grids
    • Azzedin, F., Maheswaran, M., Mitra, A.: Trust brokering and its use for resource matchmaking in public-resource grids. J. Grid. Comput. 4(3), 247–263 (2006)
    • (2006) J. Grid. Comput. , vol.4 , Issue.3 , pp. 247-263
    • Azzedin, F.1    Maheswaran, M.2    Mitra, A.3
  • 40
    • 84900001208 scopus 로고    scopus 로고
    • Consistency as a service: auditing cloud consistency
    • Liu, Q., Wang, G., Wu, J.: Consistency as a service: auditing cloud consistency. IEEE Trans. Netw. Serv. Manag. 11(1), 25–35 (2014)
    • (2014) IEEE Trans. Netw. Serv. Manag. , vol.11 , Issue.1 , pp. 25-35
    • Liu, Q.1    Wang, G.2    Wu, J.3
  • 49
    • 0034847453 scopus 로고    scopus 로고
    • A note on the use of the analytic hierarchy process for environmental impact assessment
    • Ramanathan, R.: A note on the use of the analytic hierarchy process for environmental impact assessment. J. Environ. Manage. 63(1), 27–35 (2001)
    • (2001) J. Environ. Manage. , vol.63 , Issue.1 , pp. 27-35
    • Ramanathan, R.1
  • 51
    • 85014241021 scopus 로고    scopus 로고
    • Accessed 5 February 2015
    • Cloud Harmony Cloud Reports: Availablefrom: https://cloudharmony.com/reports/state-of-thecloud-compute-report (2014). Accessed 5 February 2015
    • (2014) Cloud Harmony Cloud Reports


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.