Skip to main content
Erschienen in: Wireless Networks 8/2021

27.11.2019

Risk analysis of cloud service providers by analyzing the frequency of occurrence of problems using E-Eclat algorithm

verfasst von: C. Muralidharan, R. Anitha

Erschienen in: Wireless Networks | Ausgabe 8/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud is a large scale distributed system where the resource provisioning is a challenging and important problem. It may be statically or dynamically provisioned and must meet the QoS parameters such as throughput, availability, security, transit delay and thereby ensuring SLA. Nowadays the number of service providers tends to increase tremendously in the market, hence selecting an optimal service provider is a tedious process which leads to trust a third party known as cloud service brokers. They analyzes the problems with the provider and explores the providers to the consumers to make the service available. But the risks with the providers are not known by the consumers and as well as the trusted cloud service brokers. Hence the proposed work indulges in finding the risk with the providers in the broker’s registry by analyzing the past histories of them. The analysis will be carried out for a period of time for all the providers and the most important problems that occur during the period will be considered for prioritizing the providers. Hence this paper proposes a novel Enhanced Eclat algorithm for finding the frequent problems at the providers level and also the frequency of occurrence of the same with each provider. The proposed E-Eclat algorithm is compared with two other algorithms and found that it consumes reduced time than other algorithms. It is also observed that the complexity is much low than other two algorithms as transpose scanning is used.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mouratidis, H., Islam, S., Kalloniatis, C., & Gritzalis, S. (2013). A framework to support selection of cloud providers based on security and privacy requirements. The Journal of Systems and Software, 83, 2276–2293.CrossRef Mouratidis, H., Islam, S., Kalloniatis, C., & Gritzalis, S. (2013). A framework to support selection of cloud providers based on security and privacy requirements. The Journal of Systems and Software, 83, 2276–2293.CrossRef
2.
Zurück zum Zitat Sun, L., Dong, H., Hussain, F. K., Hussain, O. K., & Chang, E. (2014). Cloud service selection: State-of-the-art and future research directions. Journal of Network and Computer Applications, 45, 134–150.CrossRef Sun, L., Dong, H., Hussain, F. K., Hussain, O. K., & Chang, E. (2014). Cloud service selection: State-of-the-art and future research directions. Journal of Network and Computer Applications, 45, 134–150.CrossRef
3.
Zurück zum Zitat Fan, W., & Perros, H. (2014). A novel trust management framework for multi-cloud environments based on trust service providers. Knowledge-Based Systems, 70, 392–406.CrossRef Fan, W., & Perros, H. (2014). A novel trust management framework for multi-cloud environments based on trust service providers. Knowledge-Based Systems, 70, 392–406.CrossRef
4.
Zurück zum Zitat Javed, B., Bloodsworth, P., Rasool, R., Munir, K., & Rana, O. (2015). Cloud market maker: An automated dynamic pricing marketplace for cloud users. Future Generation Computer Systems, 54, 52–67.CrossRef Javed, B., Bloodsworth, P., Rasool, R., Munir, K., & Rana, O. (2015). Cloud market maker: An automated dynamic pricing marketplace for cloud users. Future Generation Computer Systems, 54, 52–67.CrossRef
5.
Zurück zum Zitat Wang, X., Cao, J., & Xiang, Y. (2014). Dynamic cloud service selection using an adaptive learning mechanism in multi-cloud computing. The Journal of Systems and Software, 100, 195–210.CrossRef Wang, X., Cao, J., & Xiang, Y. (2014). Dynamic cloud service selection using an adaptive learning mechanism in multi-cloud computing. The Journal of Systems and Software, 100, 195–210.CrossRef
6.
Zurück zum Zitat Sun, L., Ma, J., Zhang, Y., Dong, H., & Hussain, F. K. (2015). Cloud-FuSeR: Fuzzy ontology and MCDM based cloud service selection. Future Generation Computer Systems, 57, 42–55.CrossRef Sun, L., Ma, J., Zhang, Y., Dong, H., & Hussain, F. K. (2015). Cloud-FuSeR: Fuzzy ontology and MCDM based cloud service selection. Future Generation Computer Systems, 57, 42–55.CrossRef
7.
Zurück zum Zitat Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012–1023.CrossRef Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012–1023.CrossRef
8.
Zurück zum Zitat Grandison, T., & Sloman, M. (2000). A survey of trust in internet applications. IEEE Communications Surveys and Tutorials, 3, 2–16.CrossRef Grandison, T., & Sloman, M. (2000). A survey of trust in internet applications. IEEE Communications Surveys and Tutorials, 3, 2–16.CrossRef
9.
Zurück zum Zitat Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618–644.CrossRef Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618–644.CrossRef
10.
Zurück zum Zitat Sato, H., Kanai, A., & Tanimoto, S. (2010). A cloud trust model in a security aware cloud. In Proceedings of 10th IEEE/IPSJ international symposium on applications and the internet (SAINT) (pp. 121–124). IEEE. Sato, H., Kanai, A., & Tanimoto, S. (2010). A cloud trust model in a security aware cloud. In Proceedings of 10th IEEE/IPSJ international symposium on applications and the internet (SAINT) (pp. 121–124). IEEE.
11.
Zurück zum Zitat Li, X., Zhou, L., Shi, Y., & Guo, Y. (2010). A trusted computing environment model in cloud architecture. In Proceedings of 2010 international conference on machine learning and cybernetics (ICMLC) (Vol. 6, pp. 2843–2848). IEEE. Li, X., Zhou, L., Shi, Y., & Guo, Y. (2010). A trusted computing environment model in cloud architecture. In Proceedings of 2010 international conference on machine learning and cybernetics (ICMLC) (Vol. 6, pp. 2843–2848). IEEE.
12.
Zurück zum Zitat Schryen, G., Volkamer, M., Ries, S., & Habib, S. M. (2011) A formal approach towards measuring trust in distributed systems. In Proceedings of the 2011 ACM symposium on applied computing (pp. 1739–1745). ACM. Schryen, G., Volkamer, M., Ries, S., & Habib, S. M. (2011) A formal approach towards measuring trust in distributed systems. In Proceedings of the 2011 ACM symposium on applied computing (pp. 1739–1745). ACM.
13.
Zurück zum Zitat Alhamad, M., Dillon, T., & Chang, E. (2011). A trust-evaluation metric for cloud applications. Proceedings of International Journal of Machine Learning and Computing, 1(4), 416–421.CrossRef Alhamad, M., Dillon, T., & Chang, E. (2011). A trust-evaluation metric for cloud applications. Proceedings of International Journal of Machine Learning and Computing, 1(4), 416–421.CrossRef
14.
Zurück zum Zitat Noor, T., & Sheng, Q. (2011). Trust as a service: A framework for trust management in cloud environments. In Web information system engineering–WISE 2011 (pp. 314–321). Noor, T., & Sheng, Q. (2011). Trust as a service: A framework for trust management in cloud environments. In Web information system engineeringWISE 2011 (pp. 314–321).
15.
Zurück zum Zitat Abbadi, I. M., & Alawneh, M. (2012). A framework for establishing trust in the cloud. Computers & Electrical Engineering, 38(5), 1073–1087.CrossRef Abbadi, I. M., & Alawneh, M. (2012). A framework for establishing trust in the cloud. Computers & Electrical Engineering, 38(5), 1073–1087.CrossRef
16.
Zurück zum Zitat Petri, I., Rana, O. F., Silaghi, G. C., & Rezgui, Y. (2014). Risk assessment in service provider communities. Future Generation Computer Systems, 41, 32–43.CrossRef Petri, I., Rana, O. F., Silaghi, G. C., & Rezgui, Y. (2014). Risk assessment in service provider communities. Future Generation Computer Systems, 41, 32–43.CrossRef
17.
Zurück zum Zitat Ghosh, N., Ghosh, S. K., & Das, S. K. (2015). SelCSP: A framework to facilitate selection of cloud service providers. IEEE Transactions on Cloud Computing, 3(1), 66–79.CrossRef Ghosh, N., Ghosh, S. K., & Das, S. K. (2015). SelCSP: A framework to facilitate selection of cloud service providers. IEEE Transactions on Cloud Computing, 3(1),  66–79.CrossRef
18.
Zurück zum Zitat Madria, S., & Sen, A. (2015). Offline risk assessment of cloud service providers. IEEE Cloud Computing, 2, 50–57.CrossRef Madria, S., & Sen, A. (2015). Offline risk assessment of cloud service providers. IEEE Cloud Computing, 2, 50–57.CrossRef
19.
Zurück zum Zitat Anitha, R., & Mukherjee, S. (2014). Bloom filter based metadata placement and management in cloud computing. Internationl Journal of Recent Trends in Engineering & Technology, 11, 93–104.CrossRef Anitha, R., & Mukherjee, S. (2014). Bloom filter based metadata placement and management in cloud computing. Internationl Journal of Recent Trends in Engineering & Technology, 11, 93–104.CrossRef
20.
Zurück zum Zitat Pacheco, C. (2005). Eclat: Automatic generation and classification of test inputs. Massachusetts: Massachusetts Institute of Technology. Pacheco, C. (2005). Eclat: Automatic generation and classification of test inputs. Massachusetts: Massachusetts Institute of Technology.
21.
Zurück zum Zitat Zak, M. J., Gouda, K. (2003) Fast vertical mining using diffsets. In Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining (pp. 326–335). Zak, M. J., Gouda, K. (2003) Fast vertical mining using diffsets. In Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining (pp. 326–335).
22.
Zurück zum Zitat Agrawal, R., & Srikant, R. (1994) Fast algorithms for mining association rules in large databases. In Proceedings 20th international conference very large data bases (VLDB "94) (pp. 478–499). Agrawal, R., & Srikant, R. (1994) Fast algorithms for mining association rules in large databases. In Proceedings 20th international conference very large data bases (VLDB "94) (pp. 478–499).
23.
Zurück zum Zitat Moens, S., Aksehirli, E., & Goethals, B. (2013). Frequent itemset mining for big data. In IEEE international conference on big data (pp. 111–118). Moens, S., Aksehirli, E., & Goethals, B. (2013). Frequent itemset mining for big data. In IEEE international conference on big data (pp. 111–118).
24.
Zurück zum Zitat Huang, Y., & Lin, S. (2003). Mining sequential patterns using graph search techniques. In Proceedings 27th annual international computer software and applications conference (pp. 4–9). Huang, Y., & Lin, S. (2003). Mining sequential patterns using graph search techniques. In Proceedings 27th annual international computer software and applications conference (pp. 4–9).
Metadaten
Titel
Risk analysis of cloud service providers by analyzing the frequency of occurrence of problems using E-Eclat algorithm
verfasst von
C. Muralidharan
R. Anitha
Publikationsdatum
27.11.2019
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 8/2021
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-019-02191-4

Weitere Artikel der Ausgabe 8/2021

Wireless Networks 8/2021 Zur Ausgabe

Neuer Inhalt