《计算机应用研究》|Application Research of Computers

软件服务化背景下的云服务可信评估研究

Review on cloud service trustworthiness evaluation in context of software as a service

免费全文下载 (已被下载 次)  
获取PDF全文
作者 蔡琼,丁帅
机构 1.合肥工业大学 a.信息化建设与发展中心;b.管理学院,合肥 230009;2.过程优化与智能决策教育部重点实验室,合肥 230009
统计 摘要被查看 次,已被下载
文章编号 1001-3695(2015)04-0967-05
DOI 10.3969/j.issn.1001-3695.2015.04.002
摘要 针对云服务应用的新特点,从云服务可信机理、云服务可信评估、组合云服务可信建模与评估、云服务供应商信誉评价与选择等方面,系统总结了软件服务化背景下云服务可信评估研究的相关进展,并展望了云服务可信评估未来的研究方向。
关键词 软件服务化;云服务;可信评估;信任建模
基金项目 国家自然科学基金资助项目(71131002,71201042)
国家“973”计划资助项目(2013CB329603)
合肥市哲学社科合肥市哲学社会科学规划重点资助项目(HFSK14D06)
本文URL http://www.arocmag.com/article/01-2015-04-002.html
英文标题 Review on cloud service trustworthiness evaluation in context of software as a service
作者英文名 CAI Qiong, DING Shuai
机构英文名 1. a. Information Construction & Development Center, b. School of Management, Hefei University of Technology, Hefei 230009, China; 2. Key Laboratory of Process Optimization & Intelligent DecisionMaking of Ministry of Education, Hefei 230009, China
英文摘要 Based on the analysis of characteristics of cloud services, this paper proposed a systematic review on cloud service trustworthiness evaluation in the context of software as a service. It discussed respectively some key issues, which included trustworthy mechanism, trustworthiness evaluation, trust modeling and evaluation of composite cloud service, and reputation assessment and selection of cloud service provider. Finally, it presented the directions for future researches.
英文关键词 software as a service; cloud service; trustworthiness evaluation; trust modeling
参考文献 查看稿件参考文献
  [1] SUSARLA A, BARUAA, WHINSTON A B. A transaction cost perspective of the “software as a service” business model[J] . Journal of Management Information Systems, 2009, 26(2):205-240.
[2] CUSUMANO M A. Cloud computing and SaaS as new computing platforms[J] . Communications of the ACM, 2010, 53(4):27-29.
[3] FAN Ming, KUMAR S, WHINSTON A B. Short-term and long-term competition between providers of shrink-wrap software and software as a service[J] . European Journal of Operational Research, 2009, 196(2):661-671.
[4] BENLIAN A, HESS T. Opportunities and risks of software-as-a-ser-vice:findings from a survey of IT executives[J] . Decision Support Systems, 2011, 52(1):232-246.
[5] FAN Wen-juan, YANG Shan-lin, PEI Jun, et al. Building trust into cloud[J] . International Journal of Cloud Computing and Ser-vices Science, 2012, 1(3):115-122.
[6] HANG C W, SINGH M P. Selecting trustworthy service in serviceoriented environments[C] //Proc of the 12th AAMAS Workshop on Trust in Agent Societies. 2009.
[7] HABIB S M, RIES S, MUHLHAUSER M. Cloud computing landscape and research challenges regarding trust and reputation[C] //Proc of Symposium and Workshops on Ubiquitous, Autonomic and Trusted Computing. 2010:410-415.
[8] IOSUP A, YIGITBASI N, EPEMA D. On the performance of production cloud services[C] //Proc of the 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. 2011:104-113.
[9] HUSSAIN F K, CHANG E, DILLON T S. Defining trustworthiness in service oriented environment[C] //Proc of IEEE International Conference on Information and Communication Technologies. 2006:3616-3621.
[10] BEDI P, KAUR H, GUPTA B. Trustworthy service provider selection in cloud computing environment[C] //Proc of International Confer-ence on Communication Systems and Network Technologies. 2012:714-719.
[11] PAWAR P S, RAJARAJAN M, NAIR S K, et al. Trust model for optimized cloud services[C] //Proc of the 6th International Conference on International Federation for Information Processing. Berlin:Springer, 2012:97-112.
[12] LIMAM N, BOUTABA R. Assessing software service quality and trustworthiness at selection time[J] . IEEE Trans on Software Engineering, 2010, 36(4):559-574.
[13] 陈海波. 云计算平台可信性增强技术的研究[D] . 上海:复旦大学, 2008.
[14] 张逢喆, 陈进, 陈海波, 等. 云计算中的数据隐私性保护与自我销毁[J] . 计算机研究与发展, 2011, 48(7):1155-1167.
[15] BROWN A, CHASE J S. Trusted platform-as-a-service:a foundation for trustworthy cloud-hosted applications[C] //Proc of the 3rd ACM Workshop on Cloud Computing Security. New York:ACM Press, 2011:15-20.
[16] SANTOS N, GUMMADI K P, RODRIGUES R. Towards trusted cloud computing[C] //Proc of Conference on Hot Topics in Cloud Computing. 2009.
[17] IOSUP A, OSTERMANN S, YIGITBASI M N, et al. Performance analysis of cloud computing services for many-tasks scientific computing[J] . IEEE Trans on Parallel and Distributed Systems, 2011, 22(6):931-945.
[18] ALHAMAD M, DILLON T, WU Chen, et al. Response time for cloud computing providers[C] //Proc of the 12th International Conference on Information Integration and Web-based Applications & Services. New York:ACM Press, 2010:603-606.
[19] SARIPALLI P, OLDENBURG C, WALTERS B, et al. Implementation and usability evaluation of a cloud platform for scientific computing as a service (SCaaS)[C] //Proc of the 4th IEEE International Conference on Utility and Cloud Computing. 2011:345-354.
[20] ALHAMAD M, DILLON T, CHANG E. A trust-evaluation metric for cloud applications[J] . International Journal of Machine Learning and Computing, 2011, 1(4):416-421.
[21] MASRI E, MAHMOUD Q H. Toward quality-driven Web service discovery[J] . IT Professional, 2008, 10(3):24-28.
[22] SUNDARESWARAN S, SQUICCIARINI A C, LIN Dan. Ensuring distributed accountability for data sharing in the cloud[J] . IEEE Trans on Dependable and Secure Computing, 2012, 9(4):556-568.
[23] WANG Qian, WANG Cong, REN Kui, et al. Enabling public auditability and data dynamics for storage security in cloud computing[J] . IEEE Trans on Parallel and Distributed Systems, 2011, 22(5):847-859.
[24] CALERO J M A, EDWARDS N, KIRSCHNICK J, et al. Toward a multi-tenancy authorization system for cloud services[J] . IEEE Security & Privacy, 2010, 8(6):48-55.
[25] YANG Bo, TAN Feng, DAI Yuan-shun, et al. Performance evaluation of cloud service considering fault recovery[C] //Proc of the 1st International Conference on Cloudcom. Berlin:Springer, 2009:571-576.
[26] BAYUK J. Cloud security metrics[C] //Proc of the 6th International Conference on System of Systems Engineering. 2011:341-345.
[27] GAO K H, KHOSHGOFTAAR T M, WANG H J, et al. Choosing software metrics for detect prediction:an investigation on feature selection techniques[J] . Software:Practice and Experience, 2011, 41(5):579-606.
[28] TSAI W T, HUANG Yu, SHAO Qi-hong. Testing the scalability of SaaS applications[C] //Proc of IEEE International Conference on Service-Oriented Computing and Applications. 2011:1-4.
[29] OH S H, LA H J, KIM S D. A reusability evaluation suite for cloud service[C] //Proc of the 8th IEEE International Conference on e-Business Engineering. 2011:111-118.
[30] WANG Shang-guang, LIU Zhi-piao, SUN Qi-bo, et al. Towards an accurate evaluation of quality of cloud service in service-oriented cloud computing[J] . Journal of Intelligent Manufacturing, 2014, 25(2):283-291.
[31] CHAKRABORTY S, ROY K. An SLA-based framework for estimating trustworthiness of a cloud[C] //Proc of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 2012:937-942.
[32] MARCO A D, POMPILIO C. Yet another meta-model to specify non-functional properties[C] //Proc of International Workshop on Quality Assurance for Service-based Applications. 2011:9-16.
[33] LEE J Y, LEE J W, CHEUN D W. A quality model for evaluating software-as-a-service in cloud computing[C] //Proc of the 7th ACIS International Conference on Software Engineering Research, Management and Applications. 2009:261-266.
[34] TAO Qian, CHANG Hui-you, YI Yang. A trustworthy management approach for cloud services QoS data[C] //Proc of the 9th International Conference on Machine Learning and Cybernetics. 2010:1626-1631.
[35] JURETA I J, HERSSENS C, FAULKNER S. A comprehensive quality model for service-oriented systems[J] . Software Quality Control, 2009, 17(1):65-98.
[36] 刘迎春, 郑小林, 陈德人. 基于信任和推荐关系的可信服务发现[J] . 系统工程理论实践, 2012, 32(12):2789-2795.
[37] ZHOU Yu-ming, LEUNG H, XU Bao-weng. Examining the potentially confounding effect of class size on the associations between object-oriented metrics and change-proneness[J] . IEEE Trans on Software Engineering, 2009, 35(5):607-623.
[38] MOHAMMAD M, ALAGAR V. A formal approach for the specification and verification of trustworthy component-based systems[J] . Journal of Systems and Software, 2011, 84(1):77-104.
[39] DING Shuai, YANG Shan-lin, ZHANG You-tao, et al. Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems[J] . Knowledge-based Systems, 2014, 56(1):216-225.
[40] 丁帅, 鲁付俊, 杨善林, 等. 一种需求驱动的软件可信性评估及演化模型[J] . 计算机研究与发展, 2011, 48(4):647-655.
[41] DING Shuai, MA Xi-jun, YANG Shan-lin. A software trustworthiness evaluation model using objective weight based evidential reasoning approach[J] . Knowledge and Information Systems, 2012, 33(1):171-189.
[42] SHEKARPOUR S, KATEBI S D. Modeling and evaluation of trust with an extension in semantic Web[J] . Web Semantics:Science, Services and Agents on the World Wide Web, 2010, 8(1):26-36.
[43] 胡春华, 刘济波, 刘建勋. 云计算环境下基于信任演化及集合的服务选择[J] . 通信学报, 2011, 32(7):71-79.
[44] HANG C W, SINGH M P. Trustworthy service selection and composition[J] . ACM Trans on Autonomous and Adaptive Systems, 2011, 6(1):1-17.
[45] LI Bing, CAO Bu-qing, WEN Kun-mei, et al. Trustworthy assurance of service interoperation in cloud environment[J] . International Journal of Automation and Computing, 2011, 8(3):297-308.
[46] MA Li, ZHANG Yong-mei, MA Lan. A synthesize trust degree evaluation method in distributed system[C] //Proc of the 8th World Congress on Intelligent Control and Automation. 2010:5186-5190.
[47] WANG Wei, ZENG Guo-sun, TANG Dai-zhong. Cloud-DLS:dyna-mic trusted scheduling for cloud computing[J] . Expert Systems with Applications, 2012, 39(3):2321-2329.
[48] ALHAMAD M, DILLON T, CHANG E, et al. SLA-based trust mo-del for cloud computing[C] //Proc of the 13th International Confer-ence on Network-based Information Systems. 2010:321-324.
[49] SCHALL D, SKOPIK F, DUSTDAR S. Expert discovery and interactions in mixed service-oriented systems[J] . IEEE Trans on Ser-vices Computing, 2012, 5(2):233-245.
[50] YAHYAOUI H. A trust-based game theoretical model for Web ser-vices collaboration[J] . Knowledge-based Systems, 2012, 27(3):735-757.
[51] RAMASWAMY A, BALASUBRAMANIAN A, VIJAYKUMAR P, et al. A mobile agent based approach of ensuring trustworthiness in the Cloud[C] //Proc of IEEE International Conference on Recent Trends in Information Technology. 2011:678-682.
[52] ABAWAJY J. Establishing trust in hybrid cloud computing environments[C] //Proc of the 11th International Joint Conference on Trust, Security and Privacy in Computing and Communications. 2011:118-125.
[53] AYDAY E, FEKRI F. Iterative trust and reputation management using belief propagation[J] . IEEE Trans on Dependable and Secure Computing, 2012, 9(3):375-386.
[54] WANG Xiao-feng, LIU Ling, SU Jin-shu. RLM:a general model for trust representation and aggregation[J] . IEEE Trans on Services Computing, 2012, 5(1):131-143.
[55] LIMAM N, BOUTABA R. Assessing software service quality and trustworthiness at selection time[J] . IEEE Trans on Software Engineering, 2010, 36(4):559-574.
收稿日期 2014/6/28
修回日期 2014/9/26
页码 967-971
中图分类号 TP311.5
文献标志码 A