Authors: Ioan Petri; Omer F. Rana; Yacine Rezgui; Gheorghe Cosmin Silaghi
Addresses: School of Engineering, Cardiff University, Queen's Buildings, Newport Road, Cardiff CF24 3AA, UK. ' School of Computer Science and Informatics, Cardiff University, Queen's Buildings, Newport Road, Cardiff CF24 3AA, UK. ' School of Engineering, Cardiff University, Queen's Buildings, Newport Road, Cardiff CF24 3AA, UK. ' Business Information Systems, Babe?-Bolyai University, Romania 58-60, Theodor Mihali Street, Cluj-Napoca, 400591, Romania
Abstract: In the context of an increasing demand for data and computational services, the benefits of cloud computing are substantial. However, cloud computing capabilities (as currently provisioned) can prove limited when accessed through a single provider. Extending capabilities of clouds by using user owned and provisioned devices can address a number of challenges arising in the context of current cloud deployments such as data centre power efficiency, availability and outage management and secure access. We present a mechanism of forming trustworthy P2P clouds where various end-users can join and exchange resources. We propose a trust model for managing the formation and use of such clouds where feedback aggregation is used for identifying the trust distribution. Using various experimental setups we evaluate the status of the cloud in the context of different malicious end-users.
Keywords: peer-to-peer; trustworthy P2P clouds; cloud computing; service level agreements; SLAs; penalties; rewards; trust modelling; trust analysis; prisoner dilemma; malicious end users; security.
International Journal of Cloud Computing, 2012 Vol.1 No.2/3, pp.221 - 239
Available online: 03 May 2012Full-text access for editors Access for subscribers Purchase this article Comment on this article