Fault Tolerant and Risk Access Control Enabled Federated Cloud

Authors

  • M. Satheesh  Department of Computer Science, Don Bosco College Arts and Science, Karaikal, Puducherry, Tamil Nadu, India
  • M. Aramudhan  Department of Information Technology, Perunthalaivar Kamarajar Institute of Engineering and Technology(PKIET), Karaikal, Puducherry, Tamil Nadu, India

Keywords:

Federated Cloud, Service Level Agreement (SLA), Risk Access Control, Fault Tolerant, Risk Management

Abstract

Cloud Federation is a new novel collaboration paradigm where organizations share data across their private cloud infrastructures. However the adoption of cloud federation is hindered by federated organization’s concerns on potential risks of data leakage and misuse. It is hard for the users to select and assign the most suitable and reliable provider to the user task in FCA. In the proposed approach, FCA shortlisted the related CSPs for the user tasks automatically and choose the optimal provider using the concept of ranking mechanism. Service Level Agreement (SLA) is an agreement that illustrates the level of performance assured by the provider to the user. The Cloud Service Measurement Index Consortium (CSMIC), identified Service Measurement Index (SMI) metrics that helps to evaluate and compare the services of different CSPs. Effective selection models offer optimal cloud service to users are high demand for the increasing number of cloud services on the cloud platform. Risk based access control framework for Federated cloud is proposed that manages user access to Federated cloud resources by quantifying and aggregating risk metrics defined in risk policies created by resource owners. This Trust based cloud selection model is proposed to discover the providers for the service and evaluate the service using the concept of Fuzzy Random Theory. Thus this Risk based access control mechanism is more flexibile to handle exceptional situations in which the access of cloud resources is maintained in the face of violation of SLA but applying the mechanism of fault tolerance to meet the requirements of the cloud user.

References

  1. Buyya, R., Yeo, C., Venugopal, S., Broberg, Cloud Computing and Emerging IT Platforms: Vision, Hype and Reality for Delivering Computing as the 5th UtilityFuture generation Computer Systems,(2009),pp.599-616
  2. Garg, S., Versteeg, S.Buyya, R., SMI Cloud: A Framework for Comparing and Ranking Cloud Services2011 Fourth IEEE International Conference on Utility and Cloud Computing, (2011),pp.210-218
  3. Buyya, R., Garg, S., Catheiros, R., SLA-Oriented Resource Provisioning for Cloud Computing: Challenges, Architecture and Solutions2011 International Conference on Cloud and Service Computing-CSC,(2011),pp.1-10
  4. Rajarajeswari, C., Aramudhan, M., Ranking Model for SLA Resource Provisioning ManagementInternational Journal of Cloud Application and Computing,(2014)volume 4.pp.68-80
  5. Aruna, L., Aramudhan, M., Framework for Ranking Service Providers of Federated cloud Architecture using Fuzzy SetsInternational Journal of Technology, (2016),Volume 4, pp.643-653
  6. Kuan Lu, Ramin, Y., Fault-tolerant Service Level Agreement Lifecycle Management in Cloud using Actor systemFuture Generation Computer System.(2015)pp1-12
  7. Aramudhan, M., Abdul Saleem, P.A., Framework for Ranking Service Providers of Federated cloud using Fuzzy Logic setInternational Journal of Technology, (2016)Volume 4, pp.643-653
  8. Daniel, R., Carla, M., Risk-based Dynamic Access Control for a Highly Scalable Cloud FederationSECURWARE 2013: The Seventh Conference on Emerging Security Information, System and Technologies(2013), Pp.8-13
  9. Thangaraj B., Gifta A.A.S., Complete 2-Fuzzy dual normed Liner spaces, Journal of Advanced Studies in Topology, (2013)Vol.4(2), pp.34-42 
  10. Daniel, R., Roberto, M., 2016A Framwork and Risk Assessment Approach for Risk based access Control in the cloudJournal of Network and Computer Applications.Vol 8pp.1-23
  11. Gu, L., Wang, C., Zhang, Y., Trust Model in Cloud Computing environment based on Fuzzy theory, International Journal of Computer, Communication, control,(2014) Vol 9(5), pp.570 -573.
  12. Vadivel, G., Arumudhan, M., 2017Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ArchitectureInternational Journal of Engineering Research and ApplicationVol(7)1, pp.81-85.
  13. Ye Wang, Zengliang, L., 2013 Mobile Cloud Computing Network Attack and Defense Learning System Based on Fuzzy soft SetsProcedia Computer Science: Information Technology and Quantitative ManagementVol.17, pp.214-221.

The free online CSS minimizer will compress the style files for your websites in seconds.

Downloads

Published

2018-07-30

Issue

Section

Research Articles

How to Cite

[1]
M. Satheesh, M. Aramudhan, " Fault Tolerant and Risk Access Control Enabled Federated Cloud, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 6, pp.439-448, July-August-2018.