Generic placeholder image

Recent Advances in Electrical & Electronic Engineering

Editor-in-Chief

ISSN (Print): 2352-0965
ISSN (Online): 2352-0973

Research Article

Combined Preference Ranking Algorithm for Comparing and Initial Ranking of Cloud Services

Author(s): Abdul Quadir Md* and Varadarajan Vijayakumar

Volume 13, Issue 2, 2020

Page: [260 - 275] Pages: 16

DOI: 10.2174/1872212113666190215145330

Price: $65

Abstract

Background: With the immense significance of cloud computing over the decade, different IT companies offer varieties of cloud services.

Objective: The selection of cloud services from the expanding range of Cloud Service Providers (CSPs) makes it difficult for the Cloud Consumers (CCs) to choose a CSP based on their preferences.

Methods: In this context, this paper proposes an efficient trust management architecture for cloud service selection and put forward Combined Preference Ranking Algorithm (CPRA) for initial ranking of CSPs and their services before doing any transaction in the past based on CCs requirements.

Results: The proposed trust management architecture prompts the CSPs to improve the Quality of Service (QoS) by adhering to Service Level Agreement (SLA).

Conclusion: The experimental results show that compared with other ranking approaches CPRA generates the accurate ranking list of CSPs with minimal execution time.

Keywords: Cloud consumers, cloud services, cloud service providers, quality of service, service level agreement, service measurement index.

Erratum In:
Combined Preference Ranking Algorithm for Comparing and Initial Ranking of Cloud Services

Graphical Abstract

[1]
S.M. Habib, S. Hauke, S. Ries, and M. Mühlhäuser, "Trust as a facilitator in cloud computing: A survey. J. Cloud Comput. Adv", Syst. Appl., vol. 1, no. 1, p. 19, 2012.
[2]
S.M. Habib, S. Ries, and M. Muhlhauser, "Cloud computing landscape and research challenges regarding trust and reputation", In: Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing. Xian, Shaanxi, China,2010, pp. 410-415
[3]
M. Firdhous, S. Hassan, and O. Ghazali, "A comprehensive survey on quality of service implementations in cloud computing", Inter.J. Sci. Eng., Res.,. Vol. 4, no. 5, 2013.
[4]
R. Buyya, C.S. Yeo, and S. Venugopal, "Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities", In: High Performance Computing and Communications,HPCC'08. 10th IEEE International Conference on IEEE. 5-13, 2008.
[5]
L.Q. Tian, C. Lin, and Y. Ni, "Evaluation of user behavior trust in cloud computing", In: International Conference on Computer Application and System Modeling (ICCASM 2010). Taiyuan, China,2010, Vol. 7, pp. V7-567.
[6]
M. Firdhous, O. Ghazali, and S. Hassan, "Applying bees algorithm for trust management in cloud computing", In: International Conference on Bio-Inspired Models of Network, Information, and Computing Systems, Springer: Berlin, Heidelberg, 2011, pp. 224-229.
[7]
"S.M. Thampi, B. Bhargava and P.K. Atrey, (Eds.), (2013)", Managing trust in cyberspace.. CRC Press
[8]
"C. S. M. I. C. (CSMIC), “SMI Framework”, Available at:", http://betawww.cloudcommons.com/servicemeasurementindex
[9]
J. Varia, Best practices in architecting cloud applications in the AWS cloud. Principles and Paradigms, Wiley Press, 2011, pp. 459-490.
[10]
M. Zeleny, Multiple Criteria Decision Making., vol. 25. McGraw-Hill: New York, 1982.
[11]
S.K. Garg, S. Versteeg, and R. Buyya, "A framework for comparing and ranking cloud services", J. Future Generation Comput. Syst., vol. 29, no. 4, pp. 1012-1023, 2013.
[12]
N. Somu, K. Kirthivasan, and V.S.S. Sriram, "A computational model for ranking cloud service providers using hypergraph based techniques", Future Gener. Comput. Syst., vol. 68, pp. 14-30, 2017.
[13]
M.G. Raman, K. Kannan, S.K. Pal, and V.S. Sriram, "Rough set-hypergraph-based feature selection approach for intrusion detection systems", Def. Sci. J., vol. 66, no. 6, p. 612, 2016.
[14]
J. Mitchell, S. Rizvi, and J. Ryoo, "A fuzzy-logic approach for evaluating a cloud service provider", In: 1st International Conference on Software Security and Assurance (ICSSA).Suwon, South Korea 2015
[15]
M.Z. Khan, and U. Qamar, "Towards service evaluation and ranking model for cloud infrastructure selection", In: IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom). Beijing, China,2015, pp. 1282-1287.
[16]
L. Qu, Y. Wang, M.A. Orgun, L. Liu, and A. Bouguettaya, "Cloud service selection based on contextual subjective assessment and objective assessment", In: Proceedings of the 13th International Conference on Autonomous Agents and Multi-agent Systems.Paris, France 2014
[17]
A. Li, X. Yang, S. Kandula, and M. Zhang, "Comparing public-cloud providers", IEEE Internet Comput.,. Vol. 15, no. 2, pp. 50-53, 2011.
[18]
A. Li, X. Yang, M. Zhang, and S. Kandula, "CloudCmp: Shopping for a cloud made easy", HotCloud, vol. 10, pp. 1-7, 2010.
[19]
"CloudHarmony, 2009, Available at:", http://www.cloudharmony.com
[20]
Z. Rehman, O.K. Hussain, S. Parvin, and F.K. Hussain, "A framework for user feedback based cloud service monitoring", In: Sixth International Conference on Complex, Intelligent, and Software Intensive Systems. Palermo, Italy, 2012 pp. 257-262
[21]
C. Luo, J. Zhan, Z. Jia, L. Wang, G. Lu, L. Zhang, and N. Sun, "Cloudrank-d: Benchmarking and ranking cloud computing systems for data processing applications", Front. Comput. Sci., vol. 6, no. 4, pp. 347-362, 2012.
[22]
T. Abubakr, Cloud Sleuth, 2011. Available at:, https://www.cloudsleuth.net
[23]
W. Sobel, S. Subramanyam, A. Sucharitakul, J. Nguyen, H. Wong, A. Klepchukov, and D. Patterson, "Cloudstone: Multi-platform, multi-language benchmark and measurement tools for web 2.0", In: CiteSeerX, . Vol. 8, 2008.
[24]
H. Chan, and T. Chieu, "Ranking and mapping of applications to cloud computing services by SVD", In: Network Operations and Management Symposium Workshops (NOMS Wksps), IEEE/IFIP. Osaka, Japan, 2010, pp. 362-369)
[25]
P. Choudhury, M. Sharma, K. Vikas, T. Pranshu, and V. Satyanarayana, "Service ranking systems for cloud vendors", In:Adv. Mat. Res., vol. 433, pp. 3949-3953, 2012.
[26]
P. Gulia, and S. Sood, "Automatic selection and ranking of cloud providers using service level agreements", Inter. J. Comput. Appl.,. Vol. 72, no. 11, 2013.
[27]
T. Chauhan, S. Chaudhary, V. Kumar, and M. Bhise, "Service level agreement parameter matching in cloud computing", In: World Congress on Information and Communication Technologies. Mumbai, India, 2011, pp. 564-570
[28]
"Cirrocumulus: A semantic framework for application and core services portability across heterogeneous clouds, project at Kno-esis center at Wright State University", 2010
[29]
L. Qu, Y. Wang, and M.A. Orgun, "Cloud service selection based on the aggregation of user feedback and quantitative performance assessment", In: IEEE International Conference on Services Computing.Santa Clara, CA, USA 2013, pp. 152-159.
[30]
O.S. Vaidya, and S. Kumar, "Analytic hierarchy process: An overview of applications", Eur. J. Oper. Res., vol. 169, no. 1, pp. 1-29, 2006.
[31]
S.K. Garg, S. Versteeg, and R. Buyya, "SMICloud: A framework for comparing and ranking cloud services", In: Fourth IEEE Inter. Conf. Utility Cloud Comput., UCC.Victoria, NSW, Australia 2011, pp. 210-218.
[32]
A. Li, X. Yang, S. Kandula, and M. Zhang, "CloudCmp: Comparing public cloud providers", In: Proceedings of the 10th ACM SIGCOMM conference on Internet measurement.Melbourne, Australia 2010, pp. 1-14.
[33]
"J. Schad, J. Dittrich, J.A. Quiané-Ruiz,Runtime measurements in the cloud: observing, analyzing, and reducing variance", Proceedings of the VLDB Endowment, vol. 3, no. 1-2, pp. 460-471, 2010.
[34]
"A. Iosup, N. Yigitbasi, D. Epema,On the performance variability of production cloud services", In: 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.Newport Beach, CA, USA 2011, pp. 104-113.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy