Secure isolation of cloud consumers legitimacy using fuzzy analytical hierarchy process (AHP)

M. Jaiganesh1, R. Sivakami2, Amit Kumar2
1Department of Computer Science and Engineering, CVR College of Engineering, Hyderabad, India
2Department of Information Technology, PSNA College of Engineering and Technology, Dindigul, India

Tóm tắt

Từ khóa


Tài liệu tham khảo

Jaiganesh, M., Aarthi, M., Vincent Antony Kumar, A. 2015. Fuzzy ART-based user behavior trust in cloud computing. In Artificial intelligence and evolutionary algorithms in engineering systems. Advances in Intelligent Systems and Computing, eds. Suresh, L., Dash, S., Panigrahi, B., vol. 324. 341–348, New Delhi: Springer.

Wang, Shouxin, Li Zhang, Na Ma, and Shuai Wang. 2008. An Evaluation Approach of Subjective Trust Based on Cloud Model. Journal of Software Engineering and Applications 1 (1): 44–52.

Ries S., S.M. Habib, M. Muhlhauser, V. Varadharajan. 2011. Certain logic: A logic for modeling trust and uncertainty. Technical Report TUD-CS-2011-0104, Technische University at Darmstadt.

van Laarhoven, P.J.M., and W. Pedrycz. 1983. A fuzzy extension of Saatys priority theory. Journal of Fuzzy Sets and Systems 11 (1-3): 199–227.

Kahraman, C., D. Ruan, and I. Dogan. 2003. Fuzzy group decision making for facility location selection. Information Sciences 157 (14): 135–153.

Chang, D. 1996. Applications of the extent analysis method on fuzzy AHP. European Journal of Operational Research 95 (3): 649–655.

Zhou, Qian, Yu. Jiong, and Yu. Feiran. 2011. A Trust Based Defensive System Model for Cloud Computing. Lecture Notes in Computer Science 6985: 146–159.

Tan, WenAn, Yong Sun, Guang Zhen Lu, Tong Wang, and Ling Xia Li. 2014. IEEE Systems Journal. A Trust Service Oriented Scheduling Model for Workflow Applications in Cloud Computing 8 (3): 868–878.

Xiaonian, Wu, Runlian Zhang, Bing Zeng, and Shengyuan Zhou. 2013. A trust evaluation model for cloud computing. Procedia Computer Science 17: 1170–1177.

Kim, Hyukho, Hana Lee, Woongsup Kim, and Yangwoo Kim. 2010. A Trust Evaluation Model for QoS Guarantee in Cloud Systems. International Journal of Grid and Distributed Computing 3 (1): 1–10.

Pawar, P.S., M. Rajarajan, S. Nair, T. Dimitriakos, and A. Zisman. 2012. Trust Model for Optimized Cloud Services. Proceeding of the IFIP 374: 97–112.

Fahad, F., T. Alruwaili, and Aaron Gulliver. 2014. Trusted CCIPS: A Trust Security Model for Cloud Services Based on a Collaborative Intrusion Detection and Prevention Framework. International Journal of Latest Trends in Computing 5 (1): 162–171.

Sole-Pareta, J., S. Subramaniam, D. Careglio, and S. Spadaro. 2012. Cross-layer approaches for planning and operating impairment-aware optical networks. Proceedings of the IEEE 100 (5): 1118–1129.

Lombardi, F., and R.D. Pietro. 2011. Secure virtualization for Cloud computing. Journal of Network and Computer Applications 34 (4): 1113–1122.

Noon, T.H., Q.Z. Sheng, S. Zeadally, and Y. Jian. 2013. Trust management of services in cloud environments: Obstacles and solutions. ACM Computing Surveys (CSUR) 46 (1): 1–58.

Butkiene, R., G. Vilutis, I. Lagzdinyte-Budnike, D. Sandonavicius, and K. Paulikas. 2013. The QoGS Method Application for Selection of Computing Resources in Intercloud. Elektronika IR Elektrotechnika 19 (7): 98–103.

Hung, Pham Phuoc, Tuan-Anh Bui, Kwon Soonil, and Eui-Nam Huh. 2016. A New Technique for Optimizing Resource Allocation and Data Distribution in Mobile Cloud Computing. Elektronika IR Elektrotechnika 22 (1): 73–80.

Raja, S., M. Jaiganesh, and S. Ramaiah. 2017. An efficient fuzzy self-classifying clustering based framework for cloud security. International Journal of Computational Intelligence Systems 10: 495–506.

Saaty, T.L. 1980. The Analytic Hierarchy Process. Consumers legitimacy and rating. New York: McGraw-Hill.

Wang, L, Zhan, J, Shi, W, Liang, Y, Yuan, L. 2009. In Cloud, do MTC or HTC Service Providers Benefit from the Economies of Scale? Proceedings of MTAGS, pp. 7–11.

Kuo, R.J., S.C. Chi, and S.S. Kao. 1999. Decision support system for locating convenience store through fuzzy AHP. Computers and Industrial Engineering 37 (1): 323–326.