Home > Research > Publications & Outputs > Trust validation of cloud IaaS

Links

Text available via DOI:

View graph of relations

Trust validation of cloud IaaS: A customer-centric approach

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Trust validation of cloud IaaS: A customer-centric approach. / Manzoor, S.; Taha, A.; Suri, Neeraj.
2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2016. p. 97-104.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Manzoor, S, Taha, A & Suri, N 2016, Trust validation of cloud IaaS: A customer-centric approach. in 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, pp. 97-104. https://doi.org/10.1109/TrustCom.2016.0051

APA

Manzoor, S., Taha, A., & Suri, N. (2016). Trust validation of cloud IaaS: A customer-centric approach. In 2016 IEEE Trustcom/BigDataSE/ISPA (pp. 97-104). IEEE. https://doi.org/10.1109/TrustCom.2016.0051

Vancouver

Manzoor S, Taha A, Suri N. Trust validation of cloud IaaS: A customer-centric approach. In 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE. 2016. p. 97-104 doi: 10.1109/TrustCom.2016.0051

Author

Manzoor, S. ; Taha, A. ; Suri, Neeraj. / Trust validation of cloud IaaS : A customer-centric approach. 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2016. pp. 97-104

Bibtex

@inproceedings{f26c57fab90943619dcc0b9640fdbeb5,
title = "Trust validation of cloud IaaS: A customer-centric approach",
abstract = "A multitude of issues affect the broader adoption of Cloud computing, with the perceived lack of trust on the Cloud Service Providers (CSPs) often listed as a significant concern. To address this, CSPs typically set up Service Level Agreements (SLAs) that contractually list what the CSP is obligated to provide to meet the customer requirements. While SLAs are promising as a concept, the inadequacy of schemes to actually monitor and validate the run-time compliance of SLAs limits the customer's capability to evaluate the offered services to assess the actual trust to put in the CSPs. In this paper, we propose a methodology to validate SLAs and detect service violations over the life of the service. The SLA consists of a list of service attributes that are required by the customer and committed by the CSP. In order to validate an SLA, we evaluate each SLA attribute either qualitatively or quantitatively as relevant. The evaluation provides reproducible assurance to a customer for trusting the CSP based on its fulfillment of the customer's requirements. We classify requirement violations into 'trust states' according to the customer defined preferences and the CSP can be in varied trust states depending on the severity level of the violations. We demonstrate assessing the trust state of a CSP based on the services involved in launching and migrating a virtual machine in Infrastructure-as-a-Service (IaaS) offering. {\textcopyright} 2016 IEEE.",
keywords = "Big data, Data privacy, Sales, Trusted computing, Cloud service providers, Customer requirements, Customer's requirements, Customer-centric, Runtimes, Service attributes, Service level agreement (SLAs), Service violations, Infrastructure as a service (IaaS)",
author = "S. Manzoor and A. Taha and Neeraj Suri",
year = "2016",
month = aug,
day = "23",
doi = "10.1109/TrustCom.2016.0051",
language = "English",
pages = "97--104",
booktitle = "2016 IEEE Trustcom/BigDataSE/ISPA",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Trust validation of cloud IaaS

T2 - A customer-centric approach

AU - Manzoor, S.

AU - Taha, A.

AU - Suri, Neeraj

PY - 2016/8/23

Y1 - 2016/8/23

N2 - A multitude of issues affect the broader adoption of Cloud computing, with the perceived lack of trust on the Cloud Service Providers (CSPs) often listed as a significant concern. To address this, CSPs typically set up Service Level Agreements (SLAs) that contractually list what the CSP is obligated to provide to meet the customer requirements. While SLAs are promising as a concept, the inadequacy of schemes to actually monitor and validate the run-time compliance of SLAs limits the customer's capability to evaluate the offered services to assess the actual trust to put in the CSPs. In this paper, we propose a methodology to validate SLAs and detect service violations over the life of the service. The SLA consists of a list of service attributes that are required by the customer and committed by the CSP. In order to validate an SLA, we evaluate each SLA attribute either qualitatively or quantitatively as relevant. The evaluation provides reproducible assurance to a customer for trusting the CSP based on its fulfillment of the customer's requirements. We classify requirement violations into 'trust states' according to the customer defined preferences and the CSP can be in varied trust states depending on the severity level of the violations. We demonstrate assessing the trust state of a CSP based on the services involved in launching and migrating a virtual machine in Infrastructure-as-a-Service (IaaS) offering. © 2016 IEEE.

AB - A multitude of issues affect the broader adoption of Cloud computing, with the perceived lack of trust on the Cloud Service Providers (CSPs) often listed as a significant concern. To address this, CSPs typically set up Service Level Agreements (SLAs) that contractually list what the CSP is obligated to provide to meet the customer requirements. While SLAs are promising as a concept, the inadequacy of schemes to actually monitor and validate the run-time compliance of SLAs limits the customer's capability to evaluate the offered services to assess the actual trust to put in the CSPs. In this paper, we propose a methodology to validate SLAs and detect service violations over the life of the service. The SLA consists of a list of service attributes that are required by the customer and committed by the CSP. In order to validate an SLA, we evaluate each SLA attribute either qualitatively or quantitatively as relevant. The evaluation provides reproducible assurance to a customer for trusting the CSP based on its fulfillment of the customer's requirements. We classify requirement violations into 'trust states' according to the customer defined preferences and the CSP can be in varied trust states depending on the severity level of the violations. We demonstrate assessing the trust state of a CSP based on the services involved in launching and migrating a virtual machine in Infrastructure-as-a-Service (IaaS) offering. © 2016 IEEE.

KW - Big data

KW - Data privacy

KW - Sales

KW - Trusted computing

KW - Cloud service providers

KW - Customer requirements

KW - Customer's requirements

KW - Customer-centric

KW - Runtimes

KW - Service attributes

KW - Service level agreement (SLAs)

KW - Service violations

KW - Infrastructure as a service (IaaS)

U2 - 10.1109/TrustCom.2016.0051

DO - 10.1109/TrustCom.2016.0051

M3 - Conference contribution/Paper

SP - 97

EP - 104

BT - 2016 IEEE Trustcom/BigDataSE/ISPA

PB - IEEE

ER -