ACCOUNTABLE REPUTATION RANKING SCHEMES FOR SERVICE PROVIDERS IN CLOUD COMPUTING

Wassim Itani, Cesar Ghali, Ayman Kayssi, Ali Chehab

2011

Abstract

We present RaaS (Reputation as a Service), a set of accountable reputation ranking schemes for service providers in cloud computing architectures. RaaS provides a secure reputation reporting system producing results and recommendations that can be published as a service and verified by trusted third parties or by the cloud service providers themselves. The reputation service is based on an assortment of ranking criteria ranging from multilevel performance and quality of service measures to security and pricing assessments. This makes RaaS a valuable IT component in supporting verifiable and accountable compliance with service-level agreements and regulatory policies, encouraging competition among cloud providers for better security and quality of service, and providing new and existing cloud customers with valuable advice for selecting the appropriate cloud service provider(s) that suit their performance, budgeting, and security requirements. The RaaS reputation system does not rely on subjective feedback from cloud customers but rather carry out the reputation calculation based on observable actions extracted from the computing cloud itself. A proof of concept implementation shows that the incorporated RaaS protocols impose minimal overhead on the overall system performance.

References

  1. Itani, W., Kayssi, A. and Chehab, A., 2009. Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures. In DASC'09.
  2. Itani, W., Kayssi, A. and Chehab, A., 2009. Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures. In DASC'09.
  3. Tygar, J. and Yee, B., 1994. Dyad: A system for using physically secure coprocessors. In IP Workshop.
  4. Tygar, J. and Yee, B., 1994. Dyad: A system for using physically secure coprocessors. In IP Workshop.
  5. Weingart, S., 1987. Physical security for the mABYSS system. In IEEE Computer Society Conf. on Security and Privacy.
  6. Weingart, S., 1987. Physical security for the mABYSS system. In IEEE Computer Society Conf. on Security and Privacy.
  7. Schneier, B. and Kelsey, J., 1999. Secure audit logs to support computer forensics. ACM Transactions on Information and System Security, 1(3), pp.159-196.
  8. Schneier, B. and Kelsey, J., 1999. Secure audit logs to support computer forensics. ACM Transactions on Information and System Security, 1(3), pp.159-196.
  9. Mármol, F. and Pérez, G., 2009. Security threats scenarios in trust and reputation models for distributed systems. Computers and Security, 28(7), pp.545-556.
  10. Mármol, F. and Pérez, G., 2009. Security threats scenarios in trust and reputation models for distributed systems. Computers and Security, 28(7), pp.545-556.
  11. Malik, Z. and Bouguettaya, A., 2009. RATEWeb: reputation assessment for trust establishment among web services. VLDB Journal, 18(4), pp.885-911.
  12. Malik, Z. and Bouguettaya, A., 2009. RATEWeb: reputation assessment for trust establishment among web services. VLDB Journal, 18(4), pp.885-911.
  13. Chang, E., Dillon, T. and Hussain, F., 2006. Trust and reputation for service-oriented environments. Wiley.
  14. Chang, E., Dillon, T. and Hussain, F., 2006. Trust and reputation for service-oriented environments. Wiley.
  15. Hwang, K., Kulkareni, S. and Hu, Y., 2009, Cloud Security with Virtualized Defense and ReputationBased Trust Management. In DASC'09.
  16. Hwang, K., Kulkareni, S. and Hu, Y., 2009, Cloud Security with Virtualized Defense and ReputationBased Trust Management. In DASC'09.
  17. Lim, S., Keung, C. and Griffiths, N., 2010. Trust and Reputation. In Springer Agent-Based Service-Oriented Computing.
  18. Lim, S., Keung, C. and Griffiths, N., 2010. Trust and Reputation. In Springer Agent-Based Service-Oriented Computing.
  19. Haeberlen, A., 2009. A Case for the Accountable Cloud. In LADIS.
  20. Haeberlen, A., 2009. A Case for the Accountable Cloud. In LADIS.
  21. Li, A., Yang, X., Kandula, S. and Zhang, M., 2010. CloudCmp: Shopping for a Cloud Made Easy. In HotCloud'10.
  22. Li, A., Yang, X., Kandula, S. and Zhang, M., 2010. CloudCmp: Shopping for a Cloud Made Easy. In HotCloud'10.
  23. Best, R., 1980. Preventing Software Piracy with CryptoMicroprocessors. In COMPCON 80.
  24. Best, R., 1980. Preventing Software Piracy with CryptoMicroprocessors. In COMPCON 80.
  25. Dyer, J., Lindemann, M., Perez, R., Sailer, R., Smith, S., Doorn, L. and Weingart, S., 2001. Building the IBM 4758 secure coprocessor. IEEE Computer.
  26. Dyer, J., Lindemann, M., Perez, R., Sailer, R., Smith, S., Doorn, L. and Weingart, S., 2001. Building the IBM 4758 secure coprocessor. IEEE Computer.
  27. Arnold, T., Van Doorn, L., 2004. The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer. IBM Journal of Research and Development, 48(3), pp.475.
  28. Arnold, T., Van Doorn, L., 2004. The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer. IBM Journal of Research and Development, 48(3), pp.475.
  29. Gutmann, P., 2000. An Open-source Cryptographic Coprocessor. In the 9th USENIX Security Symposium.
  30. Gutmann, P., 2000. An Open-source Cryptographic Coprocessor. In the 9th USENIX Security Symposium.
Download


Paper Citation


in Harvard Style

Itani W., Ghali C., Kayssi A. and Chehab A. (2011). ACCOUNTABLE REPUTATION RANKING SCHEMES FOR SERVICE PROVIDERS IN CLOUD COMPUTING . In Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8425-52-2, pages 49-55. DOI: 10.5220/0003384100490055


in Harvard Style

Itani W., Ghali C., Kayssi A. and Chehab A. (2011). ACCOUNTABLE REPUTATION RANKING SCHEMES FOR SERVICE PROVIDERS IN CLOUD COMPUTING . In Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8425-52-2, pages 49-55. DOI: 10.5220/0003384100490055


in Bibtex Style

@conference{closer11,
author={Wassim Itani and Cesar Ghali and Ayman Kayssi and Ali Chehab},
title={ACCOUNTABLE REPUTATION RANKING SCHEMES FOR SERVICE PROVIDERS IN CLOUD COMPUTING},
booktitle={Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2011},
pages={49-55},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003384100490055},
isbn={978-989-8425-52-2},
}


in Bibtex Style

@conference{closer11,
author={Wassim Itani and Cesar Ghali and Ayman Kayssi and Ali Chehab},
title={ACCOUNTABLE REPUTATION RANKING SCHEMES FOR SERVICE PROVIDERS IN CLOUD COMPUTING},
booktitle={Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2011},
pages={49-55},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003384100490055},
isbn={978-989-8425-52-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - ACCOUNTABLE REPUTATION RANKING SCHEMES FOR SERVICE PROVIDERS IN CLOUD COMPUTING
SN - 978-989-8425-52-2
AU - Itani W.
AU - Ghali C.
AU - Kayssi A.
AU - Chehab A.
PY - 2011
SP - 49
EP - 55
DO - 10.5220/0003384100490055


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - ACCOUNTABLE REPUTATION RANKING SCHEMES FOR SERVICE PROVIDERS IN CLOUD COMPUTING
SN - 978-989-8425-52-2
AU - Itani W.
AU - Ghali C.
AU - Kayssi A.
AU - Chehab A.
PY - 2011
SP - 49
EP - 55
DO - 10.5220/0003384100490055