Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

Risk-based service selection in federated clouds

Ahmed, Usama, Petri, Ioan ORCID:, Rana, Omer ORCID:, Raza, Imran and Hussain, Syed Asad 2018. Risk-based service selection in federated clouds. Presented at: IEEE/ACM 11th International Conference on Utility and Cloud Computing (UCC), Zurich, Switzerland, 17-20 Dec 2018. 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion). IEEE, pp. 77-82. 10.1109/UCC-Companion.2018.00038

[thumbnail of cloudAM18.pdf]
PDF - Accepted Post-Print Version
Download (854kB) | Preview


The Cloud Service Provider (CSP) marketplace has continued to expand in recent years. Although a few major providers dominate (e.g. AWS, Google Cloud, Microsoft Azure), there are also a number of specialist providers offering hosting services and computing platforms. A single Cloud provider can also offer a marketplace for their own offerings - e.g. the AWS Marketplace, which enables third party libraries to be deployed as services within AWS instances. In order to determine whether a particular CSP should be used, clients need to apply preliminary assessment and evaluation when provisioning services on such a provider. Service selection can be realised based on different decision-making criteria, to enable a more informed selection process for clients. Trust can be utilised as a mechanism to inform such selection decisions. Trust can have different representations and utilise parameters derived from past interactions. Trust therefore represents an expression of risk associated with a service exchange between clients and providers. We present a trust-based risk evaluation for CSP selection in federated clouds, with a particular focus on security & data privacy. We use a scenario from an Architecture, Engineering & Construction (AEC) project to demonstrate how such a selection can be made, and is of benefit in developing the federated system. A methodology for the selection process is outlined, making use of metrics and certification processes from the Cloud Security Alliance. The proposed approach can also be generalised to other application domains with similar requirements.

Item Type: Conference or Workshop Item (Paper)
Date Type: Publication
Status: Published
Schools: Engineering
Computer Science & Informatics
Publisher: IEEE
ISBN: 9781728103594
Date of First Compliant Deposit: 12 January 2019
Date of Acceptance: 1 November 2018
Last Modified: 24 Oct 2022 08:39

Citation Data

Cited 6 times in Scopus. View in Scopus. Powered By Scopus® Data

Actions (repository staff only)

Edit Item Edit Item


Downloads per month over past year

View more statistics