Shared Resource Quality Monitoring and Dynamic Trust Management in a Community Cloud

Abstract

The collaboration tools offered by Cloud Computing have increased the need to share data and services within companies or between autonomous organizations. This has led to the deployment of community cloud infrastructures. However, several challenges will arise from this grouping of heterogeneous organizations. One of the main challenges is the management of trust between the actors of the community. Trust issues arise from the uncertainty about the quality of the resources and entities involved. The quality of a resource can be examined from a security or functional perspective. Therefore, ensuring security and monitoring the quality of resources is to ensure a high level of trust. Therefore, we propose in this paper a technique for dynamic trust management and quality monitoring of resources shared between organizations. Our approach consists, on the one hand, in evaluating the quality of resources based on quality of service measurement attributes and, on the other hand, in updating the trust values according to the information deduced from these measurements. The proposed framework is evaluated in terms of resource sharing success rate and execution time. Experimental results and comparison with TNA-SL and InterTrust models show that the framework can identify and track the behavior of malicious organizations with relatively low execution time.

Share and Cite:

N’goran, R. , Vallee, L. , Johnson, G. , Tetchueng, J. , Kermarrec, Y. and Asseu, O. (2022) Shared Resource Quality Monitoring and Dynamic Trust Management in a Community Cloud. Open Journal of Applied Sciences, 12, 1898-1914. doi: 10.4236/ojapps.2022.1211131.

1. Introduction

According to the American consulting and research firm Gartner, 85% of companies will use Cloud Computing services by 2025 with 95% of their workload stored in the cloud compared to 30% in 2021 [1]. Cloud Computing promotes collaboration and sharing within and between companies.

Several organizations with common needs and interests come together around community cloud infrastructure to minimize investment costs and promote resource sharing [2]. Organizations offer services or make their excess or unused resources available to the community. However, several challenges will emerge from this gathering of different organizations. Among these challenges, trust between entities is one of the major obstacles to sharing and collaboration.

These trust issues in this type of environment can be seen from several aspects including the quality of shared resources. The Cloud Services Measurement Initiatives Consortium (CSMIC) has defined a set of qualitative and quantitative attributes for measuring the quality of Cloud Services (SMI) [3]. The SMI framework is used to characterize a resource based on several criteria including ease of use, affordability, security and privacy.

In environments such as the Community Cloud, the ability of organizations to guarantee and deliver quality resources over the long term conditions the sustainability of the infrastructure and its productivity. It is therefore essential to have mechanisms to track quality throughout the resource usage cycle. In this paper, we propose a framework for resource quality monitoring and dynamic trust management in a community cloud. We address the quality assessment of shared resources based on four (4) SMI attributes: response time, availability, threat and vulnerability management, and billing compliance. The main contributions of this paper are:

-A framework for identifying, defining and monitoring resource quality;

-A dynamic trust management mechanism derived from the results of resource sharing and usage in accordance with the established SLA.

The remainder of this article is organized as follows. Section 2 reviews related work. Section 3 describes the proposed framework. Section 4 presents the experiments and associated results. Finally, Section 5 concludes the paper and proposes perspectives for future work.

2. Related Work

Managing resource quality and trust within distributed architectures remains a major concern for enterprises. Several works presenting techniques for the evaluation and comparison of services and their owners have been carried out.

K. Papadakis et al., proposed in [4], Reputation-based Trust Management (RTM), a collaborative SLA and trust management platform for service providers in a cloud federation. The system allows to evaluate services based on service level agreements (SLAs) and key performance indicators. It is combined with a reputation-based trust management system to help select future providers.

In [5], the authors proposed a Cloud service recommendation system using a clustering-based trust degree computation algorithm. This algorithm relies on quality of service (QoS) parameters, and offers a time saving in the calculation of the degree of trust.

A secure resource allocation system (MSMC) among multiple organizations within a community cloud is proposed in [6]. This system consists of algorithms for resource allocation and workflow execution. The model offers time and cost saving benefits.

S. Garg et al. presented SMICloud in [7], a service quality assessment model based on the CSMIC consortium’s Service Measurement Indices (SMI). SMIcloud is based on attributes such as response time, availability, reliability, accuracy, transparency and security. This mechanism based on the Analytical Hierarchy Process (AHP) allows services to be ranked based on QoS requirements.

In [8], the authors proposed a resource allocation algorithm considering SLA requirements in a community cloud. They introduce the concept of social pricing to optimize profits and better manage failures.

The literature studied shows that most of the work highlights the impact of service level agreements in the choice of resources or service providers. Furthermore, these works were carried out in federated or public cloud deployment environments that do not take into account certain requirements and governance modes of a community cloud. In addition, these proposals do not highlight the monitoring of trust and quality during the entire usage cycle of a resource. Therefore, it is necessary to propose a framework for trust monitoring and quality assessment of resources based on measurement attributes that are consistent with the social and sustainability characteristics of a community cloud environment.

3. Method, Model, and Material

3.1. General Idea of the Work

The Community Cloud aims to enable organizations to share resources in order to reduce capital costs, create business opportunities without disregarding the quality of shared resources. We propose a framework for resource quality monitoring and dynamic trust management between organizations in the community. Resource quality monitoring is done through performance indicators offered by the CSMIC SMI attributes. A community cloud is characterized by organizations with specific needs or common interests. Thus, the active participation of members in the life of the community and the existence of lasting relationships are assets for the infrastructure. Furthermore, the social character of the collaborations between organizations is one of the fundamental reasons for a community cloud. Based on these facts, our framework is based on four (4) SMI attributes: availability, vulnerability level, response time and billing mode. The attributes of availability, vulnerability, and response time measure and ensure active participation of members and security of resources. In addition, the attribute of the billing mode of the resources brings into play the social aspect in this case the gratuity in the exchanges.

Figure 1 below shows the architecture of our framework. This architecture is subdivided into three layers:

· Expression of needs and definition of SLAs: This layer houses the directory of resources and associated suppliers. In addition, it manages the service level agreements between the resource requester and the provider. The agreements are established on the basis of the four (4) SMI attributes mentioned above. In addition, it hosts the trust value manager and the inventory management module responsible for updating the availability status of resources.

· SLA monitoring: This consists of monitoring the state of the resources throughout the period of use in order to verify the conformity of the SLAs with the initial agreements established. This operation makes it possible to collect and consolidate the qualitative and quantitative contractual parameters related to the shared resource. This ensures that the commitments of each entity are respected.

· Update Manager: The role of the update manager is to update the trust information based on the information provided after the SLA monitoring. Each time the contractual parameters are violated during the period of use of the resource, the trust value update mechanism is triggered. In addition, SLA monitoring provides updated data for resource inventory management.

Figure 1. Overall architecture of the resource quality and trust monitoring system.

3.2. Description of Resource Quality Measurement Attributes

The CSMIC recommends a clear and simple definition for each attribute. Thus it proposes definitions centered around the following fields: measure name, related attribute, context, purpose, measure audience, measure definition, and data collection [3]. Tables 1-4 describe in detail the billing mode, response time, availability, and vulnerability management attributes of the proposed model, respectively.

Table 1. Billing method attribute.

Table 2. Response time attribute.

Table 3. Availability attribute.

Table 4. Vulnerability attribute.

3.3. Updating the Confidence Values and the Stock of Resources

3.3.1. Inventory Management

The inventory management module updates the availability status of resources. The resource directory is updated when a new member joins, a new service is added, an organization leaves or a resource is no longer in use. An available resource is in an I and B status where applicable.

As in [8], we define the function γr(t) as the indicator function of the availability state of a resource at time t. Thus:

γ r ( t ) = { 1 if the resource is availlable then in a state I 0 else then in a state B (2)

The total quantity of a resource of vulnerability level j available at time t is expressed as follows:

q a j ( t ) = n = 1 Q r p j r s j ( t ) with r s j ( t ) = 1 if γ r n ( t ) = 1 else r s j ( t ) = 0 (3)

With Qrpj the total quantity of a resource of a vulnerability level j, and rsj(t) the availability state of the resource at time t. At the beginning of each new exchange, an update operation of the resource availability state is performed.

3.3.2. Updating of Trust and Reputation Values

The selection of a resource provider for an exchange is based on the degree of trust the requester places in the provider. This trust value is calculated based on previous interactions between the organizations and the reputation of the provider. This value is expressed as follows:

g t = μ r d t + ( 1 μ ) r e p (4)

With rep the reputation of the supplier (the initial reputation of an organization repini = 0), r d t the trust value resulting from previous interactions between the involved entities. This trust value is computed using the subjective logic (SL) presented in [10] [11]. The SL allows to express the trust between a resource requesting organization Or et and a supplier Op from the following parameters: belief (b), distrust (d), disbelief (u) and base rate α. These parameters are formulated as follows [10] [11]:

{ b = s s s s + s f + 2 d = s f s s + s f + 2 u = 2 s s + s s + 2 { s s = 2 b u s f = 2 d u (5)

ss the number of successful prior shares between Or and Op, and sf the number of negative exchanges. The base rate α is defined by:

α = 0.5 (6)

The confidence value between Or and Op is expressed as:

r d t = b + ( α u ) (7)

For managing exchanges with an intermediate organization Oi between Or and Op, The SL proposes an update operator (⊗) to determine the transitive trust between organizations Oi and Op [10] [11]. This trust is expressed as below:

ω O p O r : O i = ω O i O r ω O p O i { b O p O r : O i = b O i O r b O p O i d O p O r : O i = b O i O r d O p O i u O p O r : O i = d O i O r + u O i O r + b O i O r u O p O i α O p O r : O i = α O p O i (8)

Moreover, in the case of an exchange involving several two intermediaries Oi1 and Oi2 the trust between Or and Op, is deduced thanks to the consensus operator ( ) and formulated as follows [10] [11]:

ω O p O i 1 : O i 2 = ω O p O i 1 ω O p O i 2 { b O p O i 1 : O i 2 = b O p j O t z 1 u O p j O t z 2 + b O p j O t z 2 u O p j O t z 1 / d e n o d O p O i 1 : O i 2 = d O p O i 1 u O p O i 2 + d O p O i 2 u O p O i 1 / d e n o u O p O i 1 : O i 2 = u O p O i 1 u O p O i 2 / d e n o α O p O i 1 : O i 2 = α O p O i 1 (9)

d e n o = u O p O i 1 + u O p O i 2 u O p O i 1 u O p O i 2

After the delivery of the requested resource, an initial evaluation of the exchange is performed. This evaluation allows an initial update of the trust values and reputation. In addition, during the use of the resource and until the end of the period of use, this process of updating the values is triggered by each violation of the quality of service attributes specified in the SLA.

As in proposal [12], a discount factor θ is defined to determine the reputation of the supplier Op according to the equation below:

r e p O p = { r e p O p c t + θ n if positive result r e p O p c t + θ n / 2 if positive result with minor violation r e p O p c t θ n if negative result with θ n ( k ) = ( V lmin ( k ) + V lmax ( k ) ) / 2 V lmax (10)

r e p O p c t the current reputation of the provider, Vlmin(k) the minimum value of vulnerability degree of the resource for a level k, Vlmax(k) the maximum value of vulnerability degree, Vlmax the maximum value of vulnerability degree. The resource vulnerability levels are defined according to the CVSS 2 standard [9]. Thus:

k = 1 if V l [ 7 , 10 ] k = 2 if V l [ 4 , 7 [ k = 3 if I l [ 0 , 4 [ (11)

3.4. Algorithm of the System

Figure 2 below illustrates the operating mechanism of the proposed framework. The process is characterized on the one hand by the validation, initialization and sharing phase. On the other hand, the second phase consists of monitoring the quality of the resources and updating the trust values in case of SLA violation. Algorithm 1 and Algorithm 2 in the Appendix describe these different phases.

4. Experiments and Results

4.1. Experimentation Environment

The performance of our proposal was evaluated through simulations of resource sharing between organizations in a community cloud. Data was generated to model the organizations and resources in the community. A MacBook Pro computer (Retina, 15-inch, mid-2015), 2.2 GHz Intel Core i7 quad-core processor,

Figure 2. Workflow of framework.

16 GB 1600 MHz DDR3 memory was used to perform our experiments. The python language was used for programming with a Pycharm editor. Organizations providing SLA compliant resources are qualified as good providers. Those providing non-compliant or violating resources are called malicious. To examine the scalability of our framework the simulations are conducted on organization groups of 80,120, 180,220 and 250 members. Furthermore to measure the attack resistance of our model, the number of malicious providers is varied from 20%, 40%, 60%, 80%. The performance of our model is compared with two other models namely TNA-SL [11] [13] and InterTrust [14]. The framework has been evaluated based on two metrics namely the success rate of exchanging quality resources by good providers (SSR) and the execution time. In order to verify the execution time, the different algorithms were run on the same computer with identical loads.

SSR = number of resources provides by good organizations total number of resources provided by good organizations (12)

4.2. Results and Discussion

4.2.1. Resistance to Attacks

Figure 4. success rates for different numbers of resource providers of which 20% are malicious providers

In addition, the dynamic management of trust through the updating of trust values based on the respect of SLAs, allows to increase the reputation values of the organizations contrary to the two other models which do not integrate this aspect. The SSR of the InterTrust and TNA-SL models also experience a relatively lower evolution for rates of 20%, 40% and 60% of malicious illustrated by

Figure 3. (a) Success rates for different numbers of resource providers of which 20% are malicious providers; (b) Numbers of malicious providers for different roud (20% are malicious providers).

Figure 4. (a) Success rates for different numbers of resource providers of which 40% are malicious providers; (b) Numbers of malicious providers for different roud (40% are malicious providers).

Figure 3(a), Figure 4(a) and Figure 5(a). However, with a rate of 80% of malicious on Figure 6(a), a decrease of the SSR is observed for these two algorithms until reaching the zero value for the TNA-SL. Moreover, Figure 3(b), Figure 4(b), Figure 5(b) and Figure 6(b) show the variation of the number of malicious organizations according to the rate of injected malicious organizations. It can be seen that our model is able to reduce or even eliminate malicious organizations within the community. The resource quality monitoring through SMI attributes in case of SLA violation proposed by our model allows to identify quality resources and classify good providers. In contrast to the TNA-SL and InterTrust contributions, our technique increases the trust value and reputation of good providers faster with each transaction round and significantly reduces that of bad providers due to the discount factor θ introduced in Equation 10. The probability of selecting malicious organizations for long-term trading is thus limited.

Figure 5. (a) Success rates for different numbers of resource providers of which 60% are malicious providers; (b) Numbers of malicious providers for different roud (60% are malicious providers).

4.2.2. Execution Time

Figure 7 below shows the execution times of our model, the InterTrust algorithm and the TNA-SL model. These experiments were performed for each round of 500 transactions with different groups consisting of 80, 120, 180, 220, 250 members. The results show that the execution time of our model is significantly lower than those of the other two models. The selection of the resource provider in our model is done first based on the previous transaction list of the requester and then based on the reputation list. This mechanism speeds up the selection process. Our model guarantees a high SSR while maintaining a low execution time.

5. Conclusion

The community cloud deployment model promotes collaboration and resource sharing (data and services) between organizations with specific requirements and common needs. However, ensuring trust between members of this community

Figure 6. (a) Success rates for different numbers of resource providers of which 80% are malicious providers; (b) Numbers of malicious providers for different roud (80% are malicious providers).

Figure 7. Execution times for different numbers of resource providers of which 80% are malicious providers.

remains a major challenge. Monitoring the quality of shared resources in this environment is an answer to this problem. Therefore, we propose in this paper a framework for resource quality evaluation and trust monitoring based on quality of service measurement attributes. The model is based on the definition of a service level agreement based on four SMI (Service Measurement Index) attributes: billing mode, availability, threat and vulnerability management and response time. Moreover, the monitoring of SLA attributes allows to propose a dynamic management mechanism and to update the trust and reputation values. Through experiments, our proposal has been compared to the TNA-SL and InterTrust models. The results of the experiments show that our proposal allows the deployment of a community cloud that is resistant to attacks. On the other hand, it allows distinguishing good providers from malicious ones and to eliminate or reduce the participation of malicious ones in the community exchanges. Finally, our model offers better execution times compared to TNA-SL and Intertrust models. In future work, we will propose an agent-based collaboration framework. The aim is to present a model characterized by explicit communication and mutual commitment of the actors for successful exchanges.

Appendix

Conflicts of Interest

The authors declare no conflicts of interest regarding the publication of this paper.

References

[1] Coret, S. (2021) Gartner.
https://cloud-computing.developpez.com/actu/328766/Gartner-Les-revenus-mondiaux-du-cloud-s-eleveront-a-474-milliards-de-dollars-en-2022-contre-408-milliards-de-dollars-en-2021-le-cloud-sera-la-piece-maitresse-des-nouvelles-experiences-numeriques/
[2] Nauges, L. (2011).
https://nauges.typepad.com/my_weblog/2011/04/index.html
[3] Siegel, J. and Perdue, J. (2012) Cloud Services Measures for Global Use: The Service Measurement Index (SMI). 2012 Annual SRII Global Conference, San Jose, 24 September 2012, 411-415.
https://doi.org/10.1109/SRII.2012.51
[4] Papadakis-Vlachopapadopoulos, K., González, R.S., Dimolitsas, I., Dechouniotis, D., Ferrer, A.J. and Papavassiliou, S. (2019) Collaborative SLA and Reputation-Based Trust Management in Cloud Federations. Future Generation Computer Systems, 100, 498-512.
https://doi.org/10.1016/j.future.2019.05.030
[5] Priya, A.S.B. and Bhuvaneswaran, R.S. (2020) Cloud Service Recommendation System Based on Clustering Trust Measures in Multi-Cloud Environment. Journal of Ambient Intelligence and Humanized Computing, 12, 7029-7038.
https://doi.org/10.1007/s12652-020-02368-2
[6] Dubey, K., Shams, M.Y., Sharma, S.C., Alarifi, A., Amoon, M. and Nasr, A.A. (2019) Management System for Servicing Multi-Organizations on Community Cloud Model in Secure Cloud Environment. IEEE Access, 7, 159535-159546.
https://doi.org/10.1109/ACCESS.2019.2950110
[7] Garg, S.K., Versteeg, S. and Buyya, R. (2013) A Framework for Ranking of Cloud Computing Services. Future Generation Computer Systems, 4, 1012-1023.
https://doi.org/10.1016/j.future.2012.06.006
[8] Saovapakhiran, B. and Devetsikiotis, M. (2011) Enhancing Computing Power by Exploiting Underutilized Resources in the Community Cloud. IEEE International Conference on Communications, Kyoto, 28 July 2011.
https://doi.org/10.1109/icc.2011.5962544
[9] Common Vulnerability Scoring System SIG (2020).
https://www.first.org/cvss/
[10] Jøsang, A. (2009) Subjective Logic. Representations, 171, 1-8.
[11] Jøsang, A. and Bhuiyan, T. (2008) Optimal Trust Network Analysis with Subjective Logic. Proceedings of the 2nd International Conference on Emerging Security Information, Systems and Technologies, Cap Esterel, 25-31 August 2008, 179-184.
https://doi.org/10.1109/SECURWARE.2008.64
[12] Guo, L., Yang, H., Luan, K., Luo, Y., Sun, L. and Zheng, X. (2021) Trust Management Model Based on Mutual Trust and a Reward-with-Punishment Mechanism for Cloud Environments. Concurrency and Computation: Practice and Experience, 33, e6283.
https://doi.org/10.1002/cpe.6283
[13] Jøsang, A. and Simon, R. (2006) Trust Network Analysis with Subjective Logic. Angewandte Chemie International Edition, 6, 951-952.
[14] Kurdi, H., Alfaries, A., Al-Anazi, A., Alkharji, S., Addegaither, M., Altoaimy, L. and Ahmed, S.H. (2019) A Lightweight Trust Management Algorithm Based on Subjective Logic for Interconnected Cloud Computing. Journal of Supercomputing, 75, 3534-3554.
https://doi.org/10.1007/s11227-018-2669-y

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.