Honey Bee Based Trust Management System for Cloud Computing
2011, 3rd International Conference …
Abstract
Cloud computing has been considered as the new computing paradigm that would offer computer resources over the Internet as service. With the widespread use of cloud, computing would become another utility similar to electricity, water, gas and telephony where the customer would be paying only for the services consumed contrary to the current practice of paying a monthly or annual fixed charge irrespective of use. For cloud computing to become accepted by everybody, several issues need to be resolved. One of the most important issues to be addressed is cloud security. Trust management is one of the important components of cloud security that requires special attention. In this paper, the authors propose the concept that honey bee algorithm which has been developed to solve complex optimization problems can be successfully used to address this issue. The authors have taken a closer look at the optimization problems that had been solved using the honey bee algorithm and the similarity between these problems and the cloud computing environment. Thus concluding that the honey bee algorithm could be successfully used to solve the trust management issue in cloud computing.
References (23)
- Beekman, M., Gloag, R., Even, N., Wattanachaiyingchareon, W., & Oldroyd, B. (2008). Dance precision of Apis florea -clues to the evolution of the honeybee dance language? Behavioral Ecology and Sociobiology, 62 (8), 1259-1265.
- Beekman, M., Sumpter, D. J., Seraphides, N., & Ratnieks, F. L. (2004). Comparing foraging behaviour of small and large honey-bee colonies by decoding waggle dances made by foragers. Functional Ecology, 18 (6), 829 -835.
- Blaze, M., Feigenbaum, J., Ioannidis, J., & Keromytis, A. D. (1999). The role of trust management in distributed systems security. In J. Vitek, & C. D. Jensen, Secure Internet Programming: Security Issues for Mobile and Distributed Objects (pp. 185-210). London: Springer-Verlag.
- Buyya, R., Pandey, S., & Vecchiola, C. (2009). Cloudbus Toolkit for Market-Oriented Cloud Computing. 1st International Conference on Cloud Computing, (pp. 1-4). Beijing, China.
- Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5 th utility. Journal of Future Generation Computer Systems, 25 (6), 599-616.
- Cai, B., Li, Z., Cheng, Y., Fu, D., & Cheng, L. (2009). Trust Decision Making in Structured P2P Network. 2009 International Conference on Communication Software and Networks, (pp. 679- 683). Macau, China.
- Gan, Z., He, J., & Ding, Q. (2009). Trust relationship modelling in e-commerce-based social network. International conference on computational intelligence and security, (pp. 206-210). Beijing, China.
- Haddad, O. B., Afshar, A., & Marino, M. A. (2006). Honey-Bees Mating Optimization (HBMO) Algorithm: A New Heuristic Approach for Water Resources Optimization. Water Resources Management, 20, 661-680.
- Proceedings of the 3rd International Conference on Computing and Informatics, ICOCI 2011,8-9 June, 2011 Bandung, Indonesia Paper No.
- 332 Marinakis, Y., & Marinaki, M. (2009). A hybrid honey bees mating optimization algorithm for the probabilistic traveling salesman problem. 11 th IEEE Congress on Evolutionary Computation (CEC'09). Trondheim, Norway.
- Marinakis, Y., Marinaki, M., & Dounias, G. (2008). Honey Bees Mating Optimization Algorithm for the Vehicle Routing Problem. In K. Natalio, N. Giuseppe, M. Pavone, & D. Pelta (Eds.), Nature Inspired Cooperative Strategies for Optimization (NICSO 2007) (Vol. 129, pp. 139-148). Berlin / Heidelberg, Germany: Springer.
- Mishra, S., Kushwaha, D. S., & Misra, A. K. (2010). A Cooperative Trust Management Framework for Load Balancing in Cluster Based Distributed Systems. International Conference on Recent Trends in Information, Telecommunication and Computing, (pp. 121-125). Kochi, Kerala, India.
- Pham, D. T., Afify, A., & Koc, E. (2007). Manufacturing cell formation using the Bees Algorithm. IPROMS 2007 Innovative Production Machines and Systems Virtual Conference. Cardiff, UK.
- Pham, D. T., Ghanbarzadeh, A., Koç, E., Otri, S., Rahim, S., & Zaidi, M. (2006). The Bees Algorithm -A Novel Tool for Complex OptimisationProblems. In D. T. Pham, E. E. Eldukhri, & A. J. Soroka (Ed.), Proccedings of 2nd I*PROMS Virtual International Conference (pp. 454-459). Cardiff, UK: Elsevier.
- Pham, D. T., Koc, E., Lee, J. Y., & Phrueksanant, J. (2007). Using the Bees Algorithm to schedule jobs for a machine. Proc Eighth International Conference on Laser Metrology, CMM and Machine Tool Performance, LAMDAMAP, (pp. 430-439). Euspen, UK.
- Pham, D. T., Otri, S., Afify, A. A., Mahmuddin, M., & Al-Jabbouli, H. (2007). Data clustering using the Bees Algorithm. 40 th CIRP International Manufacturing Systems Seminar. Liverpool.
- Pham, D. T., Soroka, A. J., Ghanbarzadeh, A., Koc, E., Otri, S., & Packianather, M. (2006). Optimising neural networks for identification of wood defects using the Bees Algorithm. 2006 IEEE International Conference on Industrial Informatics. Singapore.
- Prodan, R., & Ostermann, S. (2009). A Survey and Taxonomy of Infrastructure as a Service and Web Hosting Cloud Providers. 10 th IEEE/ACM International Conference on Grid Computing, (pp. 17-25). Banff, AB, Canada.
- Tae, K. K., & Hee, S. S. (2008). A Trust Model using Fuzzy Logic in Wireless Sensor Network. Journal of World Academy of Science, Engineering and Technology, 42 (13), 63-66.
- Vijayakumar, V., & Banu, R. W. (2008). Security for Resource Selection in Grid Computing Based On Trust and Reputation Responsiveness. International Journal of Computer Science and Network Security, 8 (11), 107-115.
- Wilson, E. O. (2000). Sociobiology: The New Synthesis (25 th Anniversary ed.). Boston, MA, USA: Harvard University Press.
- Wu, Y., Gang, C., Liu, J., Fang, R., Huang, X., Yang, G., & Zheng, W. (2011). Automatically constructing trusted cluster computing environment. The Journal of Supercomputing, 55 (1), 51- 68.
- Yu, H., Shen, Z., Miao, C., Leung, C., & Niyato, D. (2010). A Survey of Trust and Reputation Management Systems in Wireless Communications. Proceedings of the IEEE, 98 (10), 1755- 1772.