ijaers social
google plus

International Journal of Advanced
Engineering, Management and Science

ijaems google ijaems academia ijaems pbn nauka gov JournalToc Scilit logo microsoft academic search Tyndale Library WorldCat indiana Library WorldCat aalborg university Library J-Gate academickeys ijaems rootindexing ijaems reddit ijaems research bib ijaems slideshare ijaers digg ijaems tumblr ijaems plurk ijaems I2OR ijaems ASI ijaems bibsonomy

MMB Cloud-Tree: Verifiable Cloud Service Selection
( Vol-4,Issue-4,April 2018 )


Mr. B. Karthikeyan, C. Sanjay, S. Roopesh Kumar, L. Vignesh Seerangan, E. Manikandan


Cloud Service Selection, Brokerage System, Merkel Hash Tree, Verification.


In the existing cloud brokerage system, the client does not have the ability to verify the result of the cloud service selection. There are possibilities that the cloud broker can be biased in selecting the best Cloud Service Provider (CSP) for a client. A compromised or dishonest cloud broker can unfairly select a CSP for its own advantage by cooperating with the selected CSP. To address this problem, we propose a mechanism to verify the CSP selection result of the cloud broker. In this verification mechanism, properties of every CSP will also be verified. It uses a trusted third party to gather clustering result from the cloud broker. This trusted third party is also used as a base station to collect CSP properties in a multi-agent’s system. Software Agents are installed and running on every CSP. The CSP is monitored by agents as the representative of the customer inside the cloud. These multi-agents give reports to a third party that must be trusted by CSPs, customers and the Cloud Broker. The third party provides transparency by publishing reports to the authorized parties (CSPs and Customers).

ijaers doi crossrefDOI:


Cite This Article:
Show All (MLA | APA | Chicago | Harvard | IEEE | Bibtex)
Paper Statistics:
  • Total View : 64
  • Downloads : 1
  • Page No: 241-245

[1] S. Sundareswaran, A. Squamosin, D. Lin, "A brokerage-based approach for cloud service selection", 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 558-565, Aug 2012.
[2] J. Sian par, E. Saleh, C. Meisel, "Construction of Agent-Based Trust in Cloud Infrastructure", Proceedings of the IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC 2014), 2014.
[3] J. Li, A. quercitrin, D. Lin, S. Sundareswaran, C. Jia, "MMB cloud-tree: Authenticated Index for Verifiable Cloud Service Selection", IACR Cryptology reprint Archive 2015, vol. 379, 2015
[4] A. Li, X. Yang, S. Kundela, M. Zhang, "Cloudscape: comparing public cloud providers", IMC '10: Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, pp. 1-14, 2010.
[5] S. M. Han, M. M. Hassan, C. W. Yoon, E. N. Huh, "Efficient service recommendation system for cloud computing market", ICIS '09 Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology Culture and Human, 2009.
[6] A. Lenk, M. Menzel, J. Lipsky, S. Tai, P. Offer Mann, "What are you paying for? performance benchmarking for Infrastructure-as-Service offerings", 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 484-491, 2011
[7] Z. urethan, O. K. Hussain, S. Parvin, F. K. Hussain, "A framework for user feedback-based cloud service monitoring", 2012 Sixth International Conference on Complex Intelligent and Software Intensive Systems (CISIS), pp.
[8] M. Kiruthika, R. Mohanabharathi (2016).A Secured File Store in Cloud Environment Using Hierarchy Attribute-Based Encryption. International Journal of Advanced Engineering Research and Science (ISSN : 2349-6495(P) | 2456-1908(O)),3(11), 110-114. http://dx.doi.org/10.22161/ijaers/3.11.19