330 likes | 727 Views
Evaluation and Establishment of Trust in Cloud Federation. In-house Defense School of Electrical Engineering & Computer Science, NUST Islamabad. Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad. Introduction Motivation Literature Review
E N D
Evaluation and Establishment of Trust in Cloud Federation In-house DefenseSchool of Electrical Engineering & Computer Science, NUST Islamabad Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad
Introduction • Motivation • Literature Review • Research Methodology • Problem Statement • Objectives • Contributions • Implementation • Future Directions • References • Demonstration Agenda
Introduction Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad
Cloud Federation • Maximize resource utilization • Minimize power consumption while satisfying customer service‐level agreements (SLAs). • Load balancing and Cloud bursting • Expand Cloud provider’s geographic footprints Introduction
MotivationCloud Federation Cloudfederation platform HomeCloud Distribute the load of customers across thehome cloud boundary ForeignCloud ForeignCloud
Motivation Cloud federation Challenges
Motivation Trust Establishment in Cloud Federation Home Cloud Problem of Trust establishment arises to achieve federation Foreign Cloud Foreign Cloud
2010 • Cloud brokering and strategies • Types of Cloud federation • Facilitating self-adaptable Inter-Cloud management • Dynamic resource allocation • 2011 • Service Level Agreement (SLAs) in Cloud federation • Authentication and authorization • Privacy of data being shifted to foreign Cloud • 2012 • Security challenges faced by Cloud federation • Trust issues in horizontal Cloud federation • Secure data sharing schemes Literature ReviewCloud Federation- State of the Art
2009 • Domain based trust models • Reputation based trust models • 2010 • Trusted virtual environment module for trust evaluation • Service Level Agreements based trust models • 2011 • Feedback based trust evaluation for Cloud providers • Risk management and trust policies for Cloud scenarios • Use of Quality of Service parameters for trust formulation • 2012 • Ensuring trust through security certification • Novel weighted trust algorithms for Cloud environment Literature ReviewTrust Models in Cloud Computing-State of the Art
In order to establish and evaluate trust between home and foreign Cloud providers participating in federation, we propose a bi-directional trust evaluation system. The system aims to initiate the reliable and trusted federation of resources during the demand spikes of Cloud consumers requests. Problem Statement Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad
Research Paper 1 • Ayesha Kanwal, Rahat Masood, Ume E Ghazia, Muhammad Awais Shibli, Abdul Ghafoor Abbasi, “Assessment Criteria for Trust Models in Cloud Computing”, In: 9th IEEE International Conference on Green Computing and Communications (GreenCom), IEEE, Beijing, China, 20-23 August, 2013. • Research Paper 2 • Ayesha Kanwal, Rahat Masood and Muhammad Awais Shibli, “Evaluation and Establishment of Trust in Cloud Federation”, 2014 International Conference on Ubiquitous Information Management and Communication , ACM, Cambodia, 9-11 January, 2014. ContributionsResearch Perspective
Assessment Criteria for Trust Models in Cloud Computing • Establishment of a benchmark for assessment and evaluation of Cloud based trust models. • Analysis of existing trust models with respect to proposed assessment criteria Research PerspectiveProposed Benchmark
Trust Evaluation System and protocol • Feedback and SLA based trust evaluation for CSPs • Exchange of trust credentials using Security Assertion Markup Language (SAML) between the two CSPs Contributions Implementation Perspective
Eclipse (JavaEE) • Security Assertion Markup Language (SAML ) version 2.0 • Apache Tomcat Server 7.0 • MySQL Essential Server Version 5.1.47 • Java Cryptographic Library ImplementationDevelopment Toolkit
Trust Evaluation System ImplementationArchitecture – Trust Evaluation System Feedback Management Module SLA Management Module SLA based Trust Evaluation Parameters Extraction Module Feedback based Trust Evaluation Feedback Collection Module FeedbackRepository SLA Repository Registration Management Module Trust Management Module
FeedbackRepository Parameters Extraction Module 8b 8a SLA based Trust Evaluation Feedback based Trust Evaluation ImplementationWorkflow Diagram – Trust Evaluation System 7 9a 6 9b SLA Repository 1 Feedback Collection Module 5 10 Trust Management Module 4 Cloud consumers Data 3 Registration Management Module 2
ImplementationComponent Diagram– Trust Evaluation System Business LogicLayer Application Layer StorageLayer XACML files of SLA Parameters Extraction SLA based Trust Evaluation Feedback Storage SLA Collection Cloud Administrator Interface SLA storage Cloud customers Interface Trust Management Customers feedback and information Feedback Collection Feedback based Trust Evaluation
Trust Evaluation System ImplementationTrust Establishment Protocol 2- < Trust Response > 6- < Trust Response> 5- < Trust Request > 1 < Trust Request > Foreign CSP HomeCSP 4- < Federation Request > TrustManagementAgent TrustManagementAgent Foreign CSP 8- < FederationResponse > 3-Verification 7-Verification
After the trust establishment between home and foreign Clouds, the access rights delegation can also be introduced for the customer being redirected to foreign CSP. • The performance of a CSP in a cloud federation can deteriorate over the time, there is a need to propose a secure mechanism which will dynamically change the access level given to a CSP based on the evaluated trust score according to risk associated with it. Future Directions
We have proposed a trust evaluation system that facilitates the CSPs to evaluate and establish the trust, hence making them to participate in trusted and reliable Cloud federation. • The system is based on two essential factors for trust evaluation which are feedback and SLAs of CSPs. • An aggregated trust value is evaluated using the feedback and extracted SLA parameters. The trust credentials are issued by trust evaluation system and exchanged between home and foreign CSPs using SAML based assertions. Conclusion Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad
Lizhe Wang, Gregor von Laszewski, Andrew Younge, Xi He, Marcel Kunze, Jie Tao and Cheng Fu, “Cloud computing: a perspective study”, New Generation Computing, volume 28, page 137-146, April 2010. • Michael armbrust, armando fox, reangriffith, anthony d. joseph, randy katz, andykonwinski, gunho lee, dav id patterson, arielrabkin, ion stoica, and mateizaharia, “A view of Cloud computing”, Communications of the ACM Volume 53, Issue 4, page 50-58, USA, April 2010. • Bhaskar Prasad, Eumin Choi and Ian Lumb, “A Taxomony and Survey of Cloud Computing Systems”, fifth international joint conference on INC, IMS and IDC, Page(s): 44 – 51, Seoul, August 2009. • RajkumarBuyya, Chee Shin Yeo, SrikumarVenugopal, James Broberg, and IvonaBrandic, “Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility”, Future Generation Computer Systems, 25 (6), page(s): 599-616, 2009. • ShubhashisSengupta, Vikrant Kaulgud and VibhuSaujanya Sharma, “Cloud Computing Security - Trends and Research Directions”, 7th IEEE World Congress on Services, page(s): 524-531, USA, July 2011. • S. Subashini and V.Kavitha, “A survey on security issues in service delivery models of cloud computing”, Journal of Network and Computer Applications volume 34, page 1–11, January 2011. • DimitriosZissis and DimitriosLekkas, “Addressing cloud computing security issues”, Future Generation Computer system, volume 29, pages 583- 592, March 2012. • Qi Zhang , Lu Cheng and RaoufBoutaba, “Cloud computing: state-of-the-art and research challenges”, Journal of Internet Services and Applications, volume 1, page 7-18, May 2010. References
Chang Chaowen, Liu Chen and Wang Yuqiao“A Subjective Trust Model based on two-dimensional measurement”, International Conference on Computer Engineering and Technology, page(s): 37-41, Singapore, 2009. • WojcikM, Venter HS and Eloff“Trust Model Evaluation Criteria: A Detailed Analysis of Trust Evaluation”, In Proceedings of the ISSA from Insight to Foresight Conference, Information Security, page(s): 1-9, South Africa, 2006. • JemalAbawajy, “Establishing Trust in Hybrid Cloud Computing Environments” IEEE 10th International conference on Trust, Security and Privacy in Computing and Communications (TrustCom), page(s): 118-125, Australia , November 2011. • P.S. Pawar, M. Rajarajan, S. Krishnan Nair, and A. Zisman, “Trust Model for Optimized Cloud Services”, IFIP Advances in Information and Communication Technology Volume 374, page(s): 97-112, 2012. • HyukhoKim, Hana Lee, Woongsup Kim and Yangwoo Kim, “A Trust Evaluation Model for QoS Guarantee in Cloud Systems”, International Journal of Grid and Distributed Computing Volume 3, No.1, March, 2010. • Kai Hwang, Sameer Kulkarni and Yue Hu, “Cloud Security with Virtualized Defense and Reputation-based Trust Management”, Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, page(s): 717-722, USA, 2009. • Yu-Chao Liu, Yu-Tao Ma, Hai-Su, Zhang De-Yi Li and Gui-Sheng Chen, “A Method for Trust Management in Cloud Computing: Data Coloring by Cloud Watermarking”, International Journal of Automation and Computing, Volume 8, page(s): 280-285, August 2011. References
Special thanks to my Supervisor & Committee Members Thank You
Implementation Demo Evaluation and Establishment of Trust in Cloud Federation