SlideShare uma empresa Scribd logo
1 de 7
Service Operator-aware Trust Scheme for
Resource Matchmaking across Multiple Clouds
ABSTRACT:
 The service operator-aware trust scheme (SOTS) for resource
matchmaking across multiple clouds. Through analyzing the built-in
relationship between the users, the broker, and the service resources.
 A middleware framework of trust management that can effectively reduce
user burden and improve system dependability. Based on multi-
dimensional resource service operators, we model the problem of trust
evaluation as a process of multi-attribute decision-making, and develop an
adaptive trust evaluation approach based on information entropy theory.
 This adaptive approach can overcome the limitations of traditional trust
schemes, whereby the trusted operators are weighted manually or
subjectively. As a result, using SOTS, the broker can efficiently and
accurately prepare the most trusted resources in advance, and thus provide
more dependable resources to users.
 Our experiments yield interesting and meaningful observations that can
facilitate the effective utilization of SOTS in a large-scale multi-cloud
environment.
Existing System
Existing System
A systematic trust management scheme for multi-cloud environments
based on multi-dimensional resource service operators. SOTS evaluate the trust
of a cloud resource in contrast to traditional trust schemes that always focus on
unilateral trust factors of service resources.
An adaptive fused computing approach for dynamic service operators,
based on information entropy theory. SOTS model the problem of trust
evaluation as a process of multi-attribute decision-making, and then develops an
adaptive trust evaluation approach.
A first service, last audit (FSLA) mechanism to overcome the trust
initialization problem of newly registered resources. When a resource initially
registers for business, no user has interacted with it, and consequently,
information on past service operators is non-existent
Reputations-based schemes. Hwang et al. suggested using a trust-overlay
network over multiple data centers to implement a reputation system for
establishing trust between providers and data owners
Their trust model collects and analyzes reliability based on the historical server
information in a cloud data center.
PROPOSED SYSTEM
Proposed System
The proposed middleware architecture consists of a number of core
modules, including the trusted resource matchmaking and distributing module,
the adaptive trust evaluation module, the agent-based service operator acquisition
module, and the resource management module, among others.
Adaptive Trust Evaluation Module.
This module is the core of the trust-aware cloud computing system, and is
the major focus of this paper. Using this module, the broker can dynamically sort
high-performance resources by analyzing the historic resource information in
terms of providing highly trusted resources.
Trusted Resource Matchmaking and Distributing Module.
In general, each cloud manager registers its service resources through the
cloud broker. The service user negotiates with the service broker on the Service-
Level Agreement (SLA) details; they eventually prepare an SLA contract.
According to this contract, the broker selects, and then presents highly trusted
resources to users from the trusted resource pool.
Resource Register Module.
It manages and indexes all the resources available from multiple cloud
providers, and obtains information from each particular cloud resource, acting as
pricing interface for users, and updating the database when new information is
available.
Advantages
 The Broker is aware of the resources seeking and providing with the
matchmaking framework.
 It makes the resource availability with using security key for sharing the
content with highest security.
MODULE DESCRIPTION
Modules:
The system consists of modules and threat modules.
 User Request and policies
 Provider services
 Broker Matchmaking Services
 Messaging
 Service status
Module Explanation
User Request and Policy:
The user request for the service to the broker with the policies so that client
needs the specific services for production usability, reliability and security to the
consumers
Provider Services:
The provider provides the various services through the broker so that the
broker with trust worthy for the service operator and to the consumer.
Broker Matchmaking Services
The Broker on viewing the request and services from the consumer and
provider, matches and sends the messages and mail to the user with id and
password so that files and documents can be shared and stored in the cloud.
Messaging
The messages send to the user with password and security key for the
services can be utilised for the user convenience.
Service Status
The broker after serving the request or responding the request, the service
status has to update whether it is processed or it is pending.
SYSTEM CONFIGURATION
SOFTWARE REQUIREMENTS:
• Operating System : Windows 7
• Technology : Java and J2EE
• Web Technologies : Html, JavaScript, CSS
• IDE : Eclipse Juno
• Web Server : Tomcat
• Database : My SQL
• Java Version : J2SDK1.5
HARDWARE REQUIREMENTS:
• Hardware : Pentium Dual Core
• Speed : 2.80 GHz
• RAM : 1GB
• Hard Disk : 20 GB
• Floppy Drive : 1.44 MB
• Key Board : Standard Windows Keyboard
• Mouse : Two or Three Button Mouse
• Monitor : SVGA
SYSTEM CONFIGURATION
SOFTWARE REQUIREMENTS:
• Operating System : Windows 7
• Technology : Java and J2EE
• Web Technologies : Html, JavaScript, CSS
• IDE : Eclipse Juno
• Web Server : Tomcat
• Database : My SQL
• Java Version : J2SDK1.5
HARDWARE REQUIREMENTS:
• Hardware : Pentium Dual Core
• Speed : 2.80 GHz
• RAM : 1GB
• Hard Disk : 20 GB
• Floppy Drive : 1.44 MB
• Key Board : Standard Windows Keyboard
• Mouse : Two or Three Button Mouse
• Monitor : SVGA

Mais conteúdo relacionado

Mais procurados

Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageMustaq Syed
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTINGKayalvizhi Selvaraj
 
Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudSwapnil Salunke
 
balancing performance, accuracy, and precision for secure cloud transactions
balancing performance, accuracy, and precision for secure cloud transactionsbalancing performance, accuracy, and precision for secure cloud transactions
balancing performance, accuracy, and precision for secure cloud transactionsswathi78
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudsibidlegend
 
Attributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionAttributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionKaashivInfoTech Company
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Girish Chandra
 
Ogsa service taxonomy
Ogsa service taxonomyOgsa service taxonomy
Ogsa service taxonomyPooja Dixit
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...IGEEKS TECHNOLOGIES
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudOruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudNexgen Technology
 
Security Patterns with the WSO2 ESB
Security Patterns with the WSO2 ESBSecurity Patterns with the WSO2 ESB
Security Patterns with the WSO2 ESBWSO2
 
Mmb authenticated index for verifiable
Mmb authenticated index for verifiableMmb authenticated index for verifiable
Mmb authenticated index for verifiableKamal Spring
 
Azure applications performance checklist
Azure applications performance checklistAzure applications performance checklist
Azure applications performance checklistSalim M Bhonhariya
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Adz91 Digital Ads Pvt Ltd
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudSuraj Mehta
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageIEEEFINALYEARPROJECTS
 

Mais procurados (16)

Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the Cloud
 
balancing performance, accuracy, and precision for secure cloud transactions
balancing performance, accuracy, and precision for secure cloud transactionsbalancing performance, accuracy, and precision for secure cloud transactions
balancing performance, accuracy, and precision for secure cloud transactions
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
 
Attributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionAttributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryption
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
Ogsa service taxonomy
Ogsa service taxonomyOgsa service taxonomy
Ogsa service taxonomy
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudOruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Security Patterns with the WSO2 ESB
Security Patterns with the WSO2 ESBSecurity Patterns with the WSO2 ESB
Security Patterns with the WSO2 ESB
 
Mmb authenticated index for verifiable
Mmb authenticated index for verifiableMmb authenticated index for verifiable
Mmb authenticated index for verifiable
 
Azure applications performance checklist
Azure applications performance checklistAzure applications performance checklist
Azure applications performance checklist
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 

Semelhante a Service operator aware trust scheme for resource

Service operator aware trust scheme for resource matchmaking across multiple ...
Service operator aware trust scheme for resource matchmaking across multiple ...Service operator aware trust scheme for resource matchmaking across multiple ...
Service operator aware trust scheme for resource matchmaking across multiple ...ieeepondy
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resourcePvrtechnologies Nellore
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resourcePvrtechnologies Nellore
 
Balancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactionsBalancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactionsPapitha Velumani
 
A trust management system for ad hoc mobile
A trust management system for ad hoc mobileA trust management system for ad hoc mobile
A trust management system for ad hoc mobileAhmed Hammam
 
JPD1401 Balancing Performance, Accuracy, and Precision for Secure Cloud Tran...
JPD1401  Balancing Performance, Accuracy, and Precision for Secure Cloud Tran...JPD1401  Balancing Performance, Accuracy, and Precision for Secure Cloud Tran...
JPD1401 Balancing Performance, Accuracy, and Precision for Secure Cloud Tran...chennaijp
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEEMEMTECHSTUDENTPROJECTS
 
Cgmm presentation on distributed multimedia systems
Cgmm presentation on distributed multimedia systemsCgmm presentation on distributed multimedia systems
Cgmm presentation on distributed multimedia systemsMansi Verma
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesIEEEFINALYEARPROJECTS
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...IEEEGLOBALSOFTTECHNOLOGIES
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...IEEEGLOBALSOFTTECHNOLOGIES
 
Balancing performance accuracy and precision for secure cloud transactions
Balancing performance accuracy and precision for secure cloud transactionsBalancing performance accuracy and precision for secure cloud transactions
Balancing performance accuracy and precision for secure cloud transactionsPapitha Velumani
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01Nitish Bhardwaj
 

Semelhante a Service operator aware trust scheme for resource (20)

Service operator aware trust scheme for resource matchmaking across multiple ...
Service operator aware trust scheme for resource matchmaking across multiple ...Service operator aware trust scheme for resource matchmaking across multiple ...
Service operator aware trust scheme for resource matchmaking across multiple ...
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resource
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resource
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Balancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactionsBalancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactions
 
A trust management system for ad hoc mobile
A trust management system for ad hoc mobileA trust management system for ad hoc mobile
A trust management system for ad hoc mobile
 
JPD1401 Balancing Performance, Accuracy, and Precision for Secure Cloud Tran...
JPD1401  Balancing Performance, Accuracy, and Precision for Secure Cloud Tran...JPD1401  Balancing Performance, Accuracy, and Precision for Secure Cloud Tran...
JPD1401 Balancing Performance, Accuracy, and Precision for Secure Cloud Tran...
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
 
Cgmm presentation on distributed multimedia systems
Cgmm presentation on distributed multimedia systemsCgmm presentation on distributed multimedia systems
Cgmm presentation on distributed multimedia systems
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issues
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
 
Balancing performance accuracy and precision for secure cloud transactions
Balancing performance accuracy and precision for secure cloud transactionsBalancing performance accuracy and precision for secure cloud transactions
Balancing performance accuracy and precision for secure cloud transactions
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 

Último

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 

Último (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Service operator aware trust scheme for resource

  • 1. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds ABSTRACT:  The service operator-aware trust scheme (SOTS) for resource matchmaking across multiple clouds. Through analyzing the built-in relationship between the users, the broker, and the service resources.  A middleware framework of trust management that can effectively reduce user burden and improve system dependability. Based on multi- dimensional resource service operators, we model the problem of trust evaluation as a process of multi-attribute decision-making, and develop an adaptive trust evaluation approach based on information entropy theory.  This adaptive approach can overcome the limitations of traditional trust schemes, whereby the trusted operators are weighted manually or subjectively. As a result, using SOTS, the broker can efficiently and accurately prepare the most trusted resources in advance, and thus provide more dependable resources to users.  Our experiments yield interesting and meaningful observations that can facilitate the effective utilization of SOTS in a large-scale multi-cloud environment.
  • 2. Existing System Existing System A systematic trust management scheme for multi-cloud environments based on multi-dimensional resource service operators. SOTS evaluate the trust of a cloud resource in contrast to traditional trust schemes that always focus on unilateral trust factors of service resources. An adaptive fused computing approach for dynamic service operators, based on information entropy theory. SOTS model the problem of trust evaluation as a process of multi-attribute decision-making, and then develops an adaptive trust evaluation approach. A first service, last audit (FSLA) mechanism to overcome the trust initialization problem of newly registered resources. When a resource initially registers for business, no user has interacted with it, and consequently, information on past service operators is non-existent Reputations-based schemes. Hwang et al. suggested using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between providers and data owners Their trust model collects and analyzes reliability based on the historical server information in a cloud data center. PROPOSED SYSTEM Proposed System The proposed middleware architecture consists of a number of core modules, including the trusted resource matchmaking and distributing module, the adaptive trust evaluation module, the agent-based service operator acquisition module, and the resource management module, among others.
  • 3. Adaptive Trust Evaluation Module. This module is the core of the trust-aware cloud computing system, and is the major focus of this paper. Using this module, the broker can dynamically sort high-performance resources by analyzing the historic resource information in terms of providing highly trusted resources. Trusted Resource Matchmaking and Distributing Module. In general, each cloud manager registers its service resources through the cloud broker. The service user negotiates with the service broker on the Service- Level Agreement (SLA) details; they eventually prepare an SLA contract. According to this contract, the broker selects, and then presents highly trusted resources to users from the trusted resource pool. Resource Register Module. It manages and indexes all the resources available from multiple cloud providers, and obtains information from each particular cloud resource, acting as pricing interface for users, and updating the database when new information is available. Advantages  The Broker is aware of the resources seeking and providing with the matchmaking framework.  It makes the resource availability with using security key for sharing the content with highest security.
  • 4. MODULE DESCRIPTION Modules: The system consists of modules and threat modules.  User Request and policies  Provider services  Broker Matchmaking Services  Messaging  Service status
  • 5. Module Explanation User Request and Policy: The user request for the service to the broker with the policies so that client needs the specific services for production usability, reliability and security to the consumers Provider Services: The provider provides the various services through the broker so that the broker with trust worthy for the service operator and to the consumer. Broker Matchmaking Services The Broker on viewing the request and services from the consumer and provider, matches and sends the messages and mail to the user with id and password so that files and documents can be shared and stored in the cloud. Messaging The messages send to the user with password and security key for the services can be utilised for the user convenience. Service Status The broker after serving the request or responding the request, the service status has to update whether it is processed or it is pending.
  • 6. SYSTEM CONFIGURATION SOFTWARE REQUIREMENTS: • Operating System : Windows 7 • Technology : Java and J2EE • Web Technologies : Html, JavaScript, CSS • IDE : Eclipse Juno • Web Server : Tomcat • Database : My SQL • Java Version : J2SDK1.5 HARDWARE REQUIREMENTS: • Hardware : Pentium Dual Core • Speed : 2.80 GHz • RAM : 1GB • Hard Disk : 20 GB • Floppy Drive : 1.44 MB • Key Board : Standard Windows Keyboard • Mouse : Two or Three Button Mouse • Monitor : SVGA
  • 7. SYSTEM CONFIGURATION SOFTWARE REQUIREMENTS: • Operating System : Windows 7 • Technology : Java and J2EE • Web Technologies : Html, JavaScript, CSS • IDE : Eclipse Juno • Web Server : Tomcat • Database : My SQL • Java Version : J2SDK1.5 HARDWARE REQUIREMENTS: • Hardware : Pentium Dual Core • Speed : 2.80 GHz • RAM : 1GB • Hard Disk : 20 GB • Floppy Drive : 1.44 MB • Key Board : Standard Windows Keyboard • Mouse : Two or Three Button Mouse • Monitor : SVGA