1 / 30

Evaluation and Establishment of Trust in Cloud Federation

Evaluation and Establishment of Trust in Cloud Federation. In-house Defense School of Electrical Engineering & Computer Science, NUST Islamabad. Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad. Introduction Motivation Literature Review

zaina
Télécharger la présentation

Evaluation and Establishment of Trust in Cloud Federation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Evaluation and Establishment of Trust in Cloud Federation In-house DefenseSchool of Electrical Engineering & Computer Science, NUST Islamabad Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad

  2. Introduction • Motivation • Literature Review • Research Methodology • Problem Statement • Objectives • Contributions • Implementation • Future Directions • References • Demonstration Agenda

  3. Introduction Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad

  4. Cloud Federation • Maximize resource utilization • Minimize power consumption while satisfying customer service‐level agreements (SLAs). • Load balancing and Cloud bursting • Expand Cloud provider’s geographic footprints Introduction

  5. MotivationCloud Federation Cloudfederation platform HomeCloud Distribute the load of customers across thehome cloud boundary ForeignCloud ForeignCloud

  6. Motivation Cloud federation Challenges

  7. Motivation Trust Establishment in Cloud Federation Home Cloud Problem of Trust establishment arises to achieve federation Foreign Cloud Foreign Cloud

  8. 2010 • Cloud brokering and strategies • Types of Cloud federation • Facilitating self-adaptable Inter-Cloud management • Dynamic resource allocation • 2011 • Service Level Agreement (SLAs) in Cloud federation • Authentication and authorization • Privacy of data being shifted to foreign Cloud • 2012 • Security challenges faced by Cloud federation • Trust issues in horizontal Cloud federation • Secure data sharing schemes Literature ReviewCloud Federation- State of the Art

  9. 2009 • Domain based trust models • Reputation based trust models • 2010 • Trusted virtual environment module for trust evaluation • Service Level Agreements based trust models • 2011 • Feedback based trust evaluation for Cloud providers • Risk management and trust policies for Cloud scenarios • Use of Quality of Service parameters for trust formulation • 2012 • Ensuring trust through security certification • Novel weighted trust algorithms for Cloud environment Literature ReviewTrust Models in Cloud Computing-State of the Art

  10. Industrial SurveyCloud Federation

  11. Industrial SurveyCloud Federation

  12. Research MethodologyDeductive Approach

  13. Research MethodologyDeductive Approach

  14. In order to establish and evaluate trust between home and foreign Cloud providers participating in federation, we propose a bi-directional trust evaluation system. The system aims to initiate the reliable and trusted federation of resources during the demand spikes of Cloud consumers requests. Problem Statement Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad

  15. Objectives

  16. Research Paper 1 • Ayesha Kanwal, Rahat Masood, Ume E Ghazia, Muhammad Awais Shibli, Abdul Ghafoor Abbasi, “Assessment Criteria for Trust Models in Cloud Computing”, In: 9th IEEE International Conference on Green Computing and Communications (GreenCom), IEEE, Beijing, China, 20-23 August, 2013. • Research Paper 2 • Ayesha Kanwal, Rahat Masood and Muhammad Awais Shibli, “Evaluation and Establishment of Trust in Cloud Federation”, 2014 International Conference on Ubiquitous Information Management and Communication , ACM, Cambodia, 9-11 January, 2014. ContributionsResearch Perspective

  17. Assessment Criteria for Trust Models in Cloud Computing • Establishment of a benchmark for assessment and evaluation of Cloud based trust models. • Analysis of existing trust models with respect to proposed assessment criteria Research PerspectiveProposed Benchmark

  18. Trust Evaluation System and protocol • Feedback and SLA based trust evaluation for CSPs • Exchange of trust credentials using Security Assertion Markup Language (SAML) between the two CSPs Contributions Implementation Perspective

  19. Eclipse (JavaEE) • Security Assertion Markup Language (SAML ) version 2.0 • Apache Tomcat Server 7.0 • MySQL Essential Server Version 5.1.47 • Java Cryptographic Library ImplementationDevelopment Toolkit

  20. Trust Evaluation System ImplementationArchitecture – Trust Evaluation System Feedback Management Module SLA Management Module SLA based Trust Evaluation Parameters Extraction Module Feedback based Trust Evaluation Feedback Collection Module FeedbackRepository SLA Repository Registration Management Module Trust Management Module

  21. FeedbackRepository Parameters Extraction Module 8b 8a SLA based Trust Evaluation Feedback based Trust Evaluation ImplementationWorkflow Diagram – Trust Evaluation System 7 9a 6 9b SLA Repository 1 Feedback Collection Module 5 10 Trust Management Module 4 Cloud consumers Data 3 Registration Management Module 2

  22. ImplementationComponent Diagram– Trust Evaluation System Business LogicLayer Application Layer StorageLayer XACML files of SLA Parameters Extraction SLA based Trust Evaluation Feedback Storage SLA Collection Cloud Administrator Interface SLA storage Cloud customers Interface Trust Management Customers feedback and information Feedback Collection Feedback based Trust Evaluation

  23. Trust Evaluation System ImplementationTrust Establishment Protocol 2- < Trust Response > 6- < Trust Response> 5- < Trust Request > 1 < Trust Request > Foreign CSP HomeCSP 4- < Federation Request > TrustManagementAgent TrustManagementAgent Foreign CSP 8- < FederationResponse > 3-Verification 7-Verification

  24. After the trust establishment between home and foreign Clouds, the access rights delegation can also be introduced for the customer being redirected to foreign CSP. • The performance of a CSP in a cloud federation can deteriorate over the time, there is a need to propose a secure mechanism which will dynamically change the access level given to a CSP based on the evaluated trust score according to risk associated with it. Future Directions

  25. We have proposed a trust evaluation system that facilitates the CSPs to evaluate and establish the trust, hence making them to participate in trusted and reliable Cloud federation. • The system is based on two essential factors for trust evaluation which are feedback and SLAs of CSPs. • An aggregated trust value is evaluated using the feedback and extracted SLA parameters. The trust credentials are issued by trust evaluation system and exchanged between home and foreign CSPs using SAML based assertions. Conclusion Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad

  26. Lizhe Wang, Gregor von Laszewski, Andrew Younge, Xi He, Marcel Kunze, Jie Tao and Cheng Fu, “Cloud computing: a perspective study”, New Generation Computing, volume 28, page 137-146, April 2010. • Michael armbrust, armando fox, reangriffith, anthony d. joseph, randy katz, andykonwinski, gunho lee, dav id patterson, arielrabkin, ion stoica, and mateizaharia, “A view of Cloud computing”, Communications of the ACM Volume 53, Issue 4, page 50-58, USA, April 2010. • Bhaskar Prasad, Eumin Choi and Ian Lumb, “A Taxomony and Survey of Cloud Computing Systems”, fifth international joint conference on INC, IMS and IDC, Page(s): 44 – 51, Seoul, August 2009. • RajkumarBuyya, Chee Shin Yeo, SrikumarVenugopal, James Broberg, and IvonaBrandic, “Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility”, Future Generation Computer Systems, 25 (6), page(s): 599-616, 2009. • ShubhashisSengupta, Vikrant Kaulgud and VibhuSaujanya Sharma, “Cloud Computing Security - Trends and Research Directions”, 7th IEEE World Congress on Services, page(s): 524-531, USA, July 2011. • S. Subashini and V.Kavitha, “A survey on security issues in service delivery models of cloud computing”, Journal of Network and Computer Applications volume 34, page 1–11, January 2011. • DimitriosZissis and DimitriosLekkas, “Addressing cloud computing security issues”, Future Generation Computer system, volume 29, pages 583- 592, March 2012. • Qi Zhang , Lu Cheng and RaoufBoutaba, “Cloud computing: state-of-the-art and research challenges”, Journal of Internet Services and Applications, volume 1, page 7-18, May 2010. References

  27. Chang Chaowen, Liu Chen and Wang Yuqiao“A Subjective Trust Model based on two-dimensional measurement”, International Conference on Computer Engineering and Technology, page(s): 37-41, Singapore, 2009. • WojcikM, Venter HS and Eloff“Trust Model Evaluation Criteria: A Detailed Analysis of Trust Evaluation”, In Proceedings of the ISSA from Insight to Foresight Conference, Information Security, page(s): 1-9, South Africa, 2006. • JemalAbawajy, “Establishing Trust in Hybrid Cloud Computing Environments” IEEE 10th International conference on Trust, Security and Privacy in Computing and Communications (TrustCom), page(s): 118-125, Australia , November 2011. • P.S. Pawar, M. Rajarajan, S. Krishnan Nair, and A. Zisman, “Trust Model for Optimized Cloud Services”, IFIP Advances in Information and Communication Technology Volume 374, page(s): 97-112, 2012. • HyukhoKim, Hana Lee, Woongsup Kim and Yangwoo Kim, “A Trust Evaluation Model for QoS Guarantee in Cloud Systems”, International Journal of Grid and Distributed Computing Volume 3, No.1, March, 2010. • Kai Hwang, Sameer Kulkarni and Yue Hu, “Cloud Security with Virtualized Defense and Reputation-based Trust Management”, Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, page(s): 717-722, USA, 2009. • Yu-Chao Liu, Yu-Tao Ma, Hai-Su, Zhang De-Yi Li and Gui-Sheng Chen, “A Method for Trust Management in Cloud Computing: Data Coloring by Cloud Watermarking”, International Journal of Automation and Computing, Volume 8, page(s): 280-285, August 2011. References

  28. Special thanks to my Supervisor & Committee Members Thank You

  29. Implementation Demo Evaluation and Establishment of Trust in Cloud Federation

More Related