CN107171843B - A kind of selection method and system of ideal cloud service provider - Google Patents
A kind of selection method and system of ideal cloud service provider Download PDFInfo
- Publication number
- CN107171843B CN107171843B CN201710367474.3A CN201710367474A CN107171843B CN 107171843 B CN107171843 B CN 107171843B CN 201710367474 A CN201710367474 A CN 201710367474A CN 107171843 B CN107171843 B CN 107171843B
- Authority
- CN
- China
- Prior art keywords
- service provider
- cloud service
- value
- client
- sla
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/28—Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5003—Managing SLA; Interaction between SLA and QoS
- H04L41/5009—Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5003—Managing SLA; Interaction between SLA and QoS
- H04L41/5019—Ensuring fulfilment of SLA
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of selection method of ideal cloud service provider, this method realizes that this method includes based on SelCSP frame: establishing standard set SLA parameter for each cloud service provider;The transparency of all SLA parameters is summed, is then averaged the overall capacity as cloud service provider on SLA by the SLA parameter relevant information for obtaining each cloud service provider;Whether the trust grading and feedback grading that had the interactive log situation of direct interactive relation and client to provide in the environment according to past client and each cloud service provider calculate the confidence level of each cloud service provider;According to the ability and confidence level of each cloud service provider, the totality interaction value-at-risk of each cloud service provider is calculated;The totality interaction value-at-risk result of each cloud service provider is pushed to client.Its advantage is that: it can select the ideal cloud service provider of the smallest conduct of a value-at-risk according to the risk evaluation result of cloud service provider and be pushed to user.
Description
Technical field
The present invention relates to the selection methods and system of a kind of ideal cloud service provider.
Background technique
Currently, guaranteeing service quality using a suitable cloud service provider, the ideal service of client's selection is supported
Supplier becomes the significant challenge in cloud market.The method of novel selection cloud service provider interacts in risk more in assessment totality
It is advantageous: on the one hand can be in conjunction with confidence level and capability evaluation totality interaction risk;On the other hand can continue to guarantee service water
Flat, reliable Service Level Agreement SLA can not only effectively select reliable service supplier, and ensure cloud environment
In safe multi-domain collaborative.
The premise that the comprehensive advantage of this method embodies is when client may be malicious act, and cloud service provider must have
Ability ensures safety and carries out resource separation appropriate, and client does not have the intention of any malice to submit the injustice about client
Positive grading and degree of belief.However, current supplier is not always reliable.In 2010-2011, a series of cloud delay machine
There is corresponding report, including business cloud service provider Amazon EC2, Google Mail, Yahoo Mail,
Heroku, Sony etc. it is observed that the time of its failure transfer is quite long, and lack complete in terms of cloud service provider
Restore strategic or the business of client will be directly affected without corresponding Restoration Mechanism.Some suppliers even inadvertently interrupt
Service leads to loss of data and client is still unaware, this will directly influence in cloud service the reliability of service quality and effectively
Property.Therefore, selectivity difficulty there is a problem that for cloud service provider in present cloud environment, is badly in need of solving.
Summary of the invention
It is outer by that will service the purpose of the present invention is to provide the selection method and system of a kind of ideal cloud service provider
The risk encountered in packet environment assesses cloud service provider confidence level and ability two parts by being divided into respectively, by
The integrated value of confidence level and ability can be assessed to obtain total interaction value-at-risk, while specified a set of standard SLA parameter can fit
For all cloud service providers, to measure the service quality of cloud service provider, the accurate parameters of these standards can be with
Increase the trust of client and reduces risks, it is the smallest as ideal cloud service offer finally to select a value-at-risk
Quotient.
In order to achieve the above object, the invention is realized by the following technical scheme:
A kind of selection method of ideal cloud service provider, feature, this method includes:
Standard set SLA parameter is established for each cloud service provider;
The SLA parameter relevant information for obtaining each cloud service provider sums the transparency of all SLA parameters, so
It is averaged the overall capacity as cloud service provider on SLA afterwards;
Whether had in same or similar environment according to past client with each cloud service provider and direct interacts pass
Trust grading and feedback grading that the interactive log situation of system and client provide calculate the confidence level of each cloud service provider;
According to the ability and confidence level of each cloud service provider, the totality interaction risk of each cloud service provider is calculated
Value;
The totality interaction value-at-risk result of each cloud service provider is pushed to client.
The selection method of above-mentioned ideal cloud service provider, in which:
The interactive log refers to the grading interacted between cloud service provider or other clients that client provides in the past
The trust feedback composition to cloud service provider that agent provides.
A kind of selection system of ideal cloud service provider, characterized in that the frame system includes:
Memory module, for interactive relation between the client of being stored in over and each cloud service provider interactive log with
And trust grading and feedback grading that client provides;
SLA parameter establishes module, for establishing standard set SLA parameter for each cloud service provider;
Performance Risk Calculation module will be all for obtaining the SLA parameter relevant information of each cloud service provider
The transparency of SLA parameter is summed, and the overall capacity as cloud service provider on SLA is then averaged;
Relational risk computing module is used for according to past client and each cloud service provider in same or similar environment
Whether there are the interactive log situation of direct interactive relation and the trust grading of client's offer and feedback grading to calculate each
The confidence level of cloud service provider;
Overall interaction value-at-risk computing module calculates each for the ability and confidence level according to each cloud service provider
The totality interaction value-at-risk of a cloud service provider;
Pushing module, for the totality interaction value-at-risk result of each cloud service provider to be pushed to client.
The selection system of above-mentioned ideal cloud service provider, in which:
Overall capacity calculation formula in the calculating cloud service provider SLA parameter are as follows:
In formula, φ indicates all parameters, and SLA φ indicates parameter all in SLA, and parami is i-th in SLA φ
Parameter, n are the SLA parameter sum of some cloud service provider, λparami(φ) is the transparency of parameter parami ∈ φ.
The selection system of above-mentioned ideal cloud service provider, in which:
The confidence level calculating process includes the calculating of trust value and the calculating of credit value;
Wherein, the calculation formula of the trust value are as follows:
In formula, cjIt is j-th of desired and k-th of cloud service provider pkInteractive client, C1 indicate that client mentions with cloud service
For, either with or without interaction, τ is predefined time window between quotient,It is the function for assessing general trust vector, any element μcj
(pk,αi) indicate client cjTo cloud service provider pkIn environment αiLower expected degree of belief, αiIt is an element in A, A is hair
One group of environment value of raw interaction is the total quantity for having been observed environment in interaction;
ω=e-γ(|τ|-t)
In formula, γ ∈ [0, ∞], t≤|τ|, ω is weight factor, δl∈ D is first of the time interval specified in H, D
It is trust domain, H is the interactive history of client and cloud service provider, μcj(pk,αi) indicate client cjTo cloud service provider pkIn environment
αiLower expected degree of belief, and probability value is by distribution function F (δl) provide, F is probability-distribution function, later it is expected distribution
Degree of belief;
Wherein, the calculation formula of the credit value are as follows:
In formula, π is the function for assessing whole reputation vectors, diIndicate i-th of element in trust domain D;
Wherein, the calculation formula of confidence level are as follows:
In formula, TτThat indicate is the overall confidence level that obtains of result of both comprehensive trust value and credit value, ζτ(cj,
pk) indicate the trust value that the general trust vector established when interaction calculates, π (cj,pk) indicate be not interactive when prestige
Value.
The selection system of above-mentioned ideal cloud service provider, wherein the totality interaction value-at-risk computing module
Overall interaction value-at-risk calculation formula are as follows:
In formula, α is current interactive environment, Τ (cj,pk) it is cjTo pkThe confidence level possessed, C (pk) it is that cloud service provides
Quotient pkAbility, function Icj(α) is according to client cjViewpoint calculate degree context importance, function Ucj(α) is measurement
Client cjThe expected benefit from environment of function, and function Icj(α) and UcjThe value of (α) is all between [0 ,+1].
Compared with the prior art, the present invention has the following advantages:
1, the assessment efficiency to perception interactive risk is improved.To the cloud service provider of consideration, by the environment that is arranged and
The importance of effectiveness and need multiple parameters in the different environment that generate.Client does not need to input all these parameters, but
It inputs therein several or is selected from scheduled set, therefore, which greatly enhances assess all cloud service providers
The efficiency of confidence level and ability.
2, client is enhanced in a given environment to the reliability and accuracy of the selection of ideal cloud service provider.It is generating
Different background in, the variation by observing confidence level, ability, risk can select one the smallest interactive value-at-risk and recommend
Cloud service provider helps to establish between client and cloud service provider and trust by the standard of foundation, accurate SLA parameter
Perception to reduce risks, identifies rudimentary control and can determine the ability of cloud service provider.Thus improve to cloud
Accuracy, the reliability of service provider's selection.
3, standardized SLA parameter has not only ensured the safety of cloud system, but also for the calculating side of overall clarity
Face more generalization, imperceptibility.Grading is to be divided into bonus points using stringent binary system and penalized a little, passed through the combination of its quantity
To calculate credit value.And only handle safety, privacy and other SLA parameters, these parameters can complete to cloud service
The standard of the service quality of provider is monitored and audits.Therefore, it ensure that the safety of data and service quality.
4, the validity and feasibility of cloud environment risk estimation scheme are promoted.Cloud service provider choosing based on risk
The scheme of selecting is to estimate its confidence level and ability according to the existing and disclosed data in different situations, specific by these
How what situation analyzed client and cloud service provider in conjunction with real-life interaction context interacts risk with confidence level
With ability and dynamic change.Therefore, it is greatly promoted the feasibility of this selection scheme, validity, and can ensure that future
Cloud environment in safe multi-domain collaborative.
Detailed description of the invention
Fig. 1 is the flow chart of the selection method of ideal cloud service provider in the embodiment of the present invention.
Specific embodiment
The present invention is further elaborated by the way that a preferable specific embodiment is described in detail below in conjunction with attached drawing.
As shown in Figure 1, the invention proposes a kind of selection method of ideal cloud service provider, in the present embodiment, the party
Method is realized based on CSP frame, is particularly realized by a SelCSP frame, is commented with improving perception interactive risk
Estimate efficiency, the reliability and accuracy of enhancing cloud service provider selection ensure the safety of cloud system, promote cloud environment apoplexy
The validity and feasibility of dangerous estimation scheme, this method includes:
Standard set SLA parameter is established for each cloud service provider;SLA (the Service-Level
Agreement, service-level agreement) parameter refer to by SLA provide can measure cloud service provider guarantee service
Quality and some modules that can be monitored and audit to it, the module refer to SLA parameter, usually have safely, hold
Promise, data management, elasticity and operational management etc.;
The SLA parameter relevant information for obtaining each cloud service provider sums the transparency of all SLA parameters, so
It is averaged the overall capacity on SLA as provider afterwards;All parameters refer in the SLA framework that provider provides
Parameter all can include the parameters such as safety, promise, data management, elasticity and operational management;Polymeric transparent degree refers to joining these
Obtained by several transparencies is summed;Here any refers to that different providers may be supplied to the different SLA of client
Agreement, service product etc., but calculation method is consistent;
Whether had in same or similar environment according to past client with each cloud service provider and direct interacts pass
Trust grading and feedback grading that the interactive log situation of system and client provide calculate the confidence level of each cloud service provider;
The grading interacted between cloud service provider or other customer's representative people that the interactive log refers to that client provides in the past mention
The trust feedback composition to cloud service provider supplied;
According to the ability and confidence level of each cloud service provider, the totality interaction risk of each cloud service provider is calculated
Value;
The totality interaction value-at-risk result of each cloud service provider is pushed to client.
In the present embodiment, above-mentioned method is realized by a kind of selection system of ideal cloud service provider, this is
System is realized for one based on the service level frame system SelCSP frame of measurement, specifically includes:
Memory module, for interactive relation between the client of being stored in over and each cloud service provider interactive log with
And trust grading and feedback grading that client provides;
SLA parameter establishes module, for establishing standard set SLA parameter for each cloud service provider;
Performance Risk Calculation module, for obtaining the SLA parameter relevant information of each cloud service provider, by SelCSP frame
Frame distributes to the child control of parameter as transparency, and the transparency of all SLA parameters is summed, and is then averaged as mentioning
For the overall capacity on SLA of quotient;
Relational risk computing module is used for according to past client and each cloud service provider in same or similar environment
Whether there are the interactive log situation of direct interactive relation and the trust grading of client's offer and feedback grading to calculate each
The confidence level of cloud service provider;
Overall interaction value-at-risk computing module calculates each for the ability and confidence level according to each cloud service provider
The totality interaction value-at-risk of a cloud service provider;Consider from user perspective, overall interaction value-at-risk is that relational risk is (i.e. credible
The sum of degree) and performance risk (i.e. ability), overall interaction value-at-risk calculation formula are as follows:
In formula,Indicate the estimated value (i.e. confidence level) to relational risk;It indicates to the estimated value of performance risk (i.e.
Ability);
In view of trust of the client to provider can reduce the interaction risk that client perceives in interaction, provided that quotient
Ability high-performance risk can also reduce, then above-mentioned formula can be further perfect are as follows:
In formula, K1, k2 are proportionality coefficient, Τ (cj,pk) it is cjTo pkThe trust possessed, C (pk) it is to provide quotient pkAbility;
Pushing module, for the totality interaction value-at-risk result of each cloud service provider to be pushed to client.
In view of the importance of environment and the benefit of effectiveness, then risk is totally interacted in overall interaction value-at-risk computing module
It is worth the calculation formula of modeling are as follows:
Above formula is by proportionality coefficient κ1It is changed to Icj(α), κ2It is changed to UcjObtained from (α);In formula, Τ (cj,pk) it is cjIt is right
pkThe confidence level possessed, C (pk) it is cloud service provider pkAbility, function Icj(α) is according to client cjViewpoint calculate journey
Spend the importance of context, function Ucj(α) is measuring customer cjThe expected benefit from environment of function, and function Icj(α) and Ucj
The value of (α) is all between [0 ,+1].
Risk assessment first assesses the ability of cloud service provider, the transparency calculation formula of a parameter are as follows:
In formula, m indicates the quantity of control relevant to SLA parameter parami, tiAt the time of expression now, ti∈ τ, τ are pre-
The time window of definition, ηj(φ) is in time tiThe probability value of j-th of control is distributed to, apportioning cost is 1.0 or 0.5 or 0.1,
Correspond respectively to it is high in or low qualitative category, calculate each and calculate the overall capacity meter in cloud service provider SLA parameter
Calculate formula are as follows:
In formula, φ indicates all parameters, and SLA φ indicates parameter all in SLA, and parami is i-th in SLA φ
Parameter, n are the SLA parameter sum of some cloud service provider, λparami(φ) is the transparency of parameter parami ∈ φ.
Assuming that the SLA of provider will be changed over time, then can be constrained with Introduction Time:
tiAt the time of expression now, we make ti∈τ;
The assessment of the confidence level of cloud service provider includes trust evaluation and credit assessment, therefore the confidence level calculates
Process includes the calculating of trust value and the calculating of credit value.When client and cloud service provider are in past certain specific environment
Under when having direct interactive relation, graded by the trust that client provides, consider that the factor of time and environment establishes general letter
Vector model is appointed to calculate expected trust value, the calculation formula of the trust value are as follows:
In formula, cjIt is j-th of desired and k-th of cloud service provider pkInteractive client, C1 indicate that client mentions with cloud service
For, either with or without interaction, τ is predefined time window between quotient,It is the function for assessing general trust vector, any element μcj
(pk,αi) indicate client cjTo cloud service provider pkIn environment αiLower expected degree of belief, αiIt is an element in A, environment
Refer to and trusting some dependence factors proposed in estimation, such as time, then environment etc. just introduces a change in mathematical model
For amount to indicate this environment value, it defines interactive range, and it is to have been observed that A, which is one group of environment value that interaction occurs,
The total quantity of environment in interaction;
ω=e-γ(|τ|-t) (8)
In formula, γ ∈ [0, ∞], t≤| τ |, ω is weight factor, δl∈ D is first of the time interval specified in H, D
It is trust domain, H is the interactive history of client and cloud service provider, μcj(pk,αi) indicate client cjTo cloud service provider pkIn environment
αiLower expected degree of belief, and probability value is by distribution function F (δl) provide, F be probability-distribution function i.e. in trust domain not
Same reliability rating calculates probability value, will distribute desired degree of belief later, probability value is distributed to different reliability ratings also just
It is the degree of belief to provider;
Client did not had to interact with cloud service provider in the past just comes into force, other comprehensive clients or procuratorial anti-
Feedback and recommend to establish the global trust value of reputation vectors model based on state to calculate cloud service provider, the credit value
Calculation formula are as follows:
In formula, π is the function for assessing whole reputation vectors, and ξ is the function for assessing the reputation vectors based on state, trust domain
The state of D includes 5 kinds of qualitative elementals, is distrusted, part is distrusted, determined, and part is trusted and trusted, diIt indicates in trust domain
I-th of element;
According to formula (7), (10), the calculation formula of the confidence level is obtained are as follows:
In formula, TτThat indicate is the overall confidence level that obtains of result of both comprehensive trust value and credit value, ζτ(cj,
pk) indicate the trust value that the general trust vector established when interaction calculates, π (cj,pk) indicate be not interactive when prestige
Value.
The totality interaction value-at-risk calculation formula of the totality interaction value-at-risk computing module are as follows:
In formula,It is based on the risk total value recorded in SLA, the interaction risk of perception is normalized, makes
Its value between section [0,1] is obtained, α is current interactive environment.
The method of the present invention is illustrated with an example below, it is assumed that there are six cloud service providers beyond the clouds, existing client wants
Therefrom select a believable cloud service provider;
It is assumed that thering are six SaaS cloud service providers to be registered using Sel CSP frame at present, when client is environment
Importance (I) is provided with the combination of 0.95,0.55 and 0.25 3 different value with effectiveness (U) and then generates nine different types of friendships
When mutual situation, the size cases of the value-at-risk of each cloud service provider are as shown in table 1:
1 cloud service provider executive condition of table
Cloud service provider | CSP1 | CSP4 | CSP5 | CSP6 |
Environment | (b), (f) | (a) | (h) | (c), (d), (e), (g), (i) |
Minimum risk value | 0.28 | 0.16 | 0.5 | 0.14 |
For table 1 by the risk under varying environment, the variation of trust and ability value will be for generating phase under particular context
Cloud service provider with minimum risk is summarized as one group, and the interaction risk for the supplier for recommending out by the method is minimum
's;This table is intended to determine for six providers which kind of environment is ideal, that is, chooses an interactive value-at-risk most
Small provider as believable provider, and CSP2, CSP3 in either circumstance value-at-risk compared with other providers all
It is not the smallest, therefore does not embody herein.Value by three different levels being arranged to importance (I) and effectiveness (U),
The two, which combines, produces nine different types of interaction contexts, respectively (a) Email and network productive force, (b) charging, (c),
(d), (e), (g) etc., it defines as needed.
The credit value of 2 entity of table compares
Project | 1 | 2 | 3 | 4 | 5 | 6 |
The trust of Sel CSP | 0.55 | 1 | 0.5 | 0.4 | 0.38 | 0.33 |
The trust of Josang | 0.55 | 1 | 0.4 | 0.5 | 0.32 | 0.32 |
Project 1 in table 2,2 be directly available interaction grading, project 3,4,5,6 be consider the feedback from other sources/
Referral has 6 parameters in the general trust vector of user in direct interaction, and user only needs to input two therein, comes from
There are four parameter in the reputation vectors based on state of other sources feedback, user needs to input four parameters.Using time window
Mouth τ=10 and weight factor ω=3.75, the trust value for passing through bonus points and quantity a little being penalized to calculate.It hereby is observed that directly
Interaction grading is disabled, and there is no generate any influence, it is necessary to just have obviously dependent on the reputation obtained from other sources
Difference.However client is much higher than the trust obtained from the external world to the degree of belief that the product used in the past possesses in practice.
The ability of 3 entity of table compares
Cloud service provider | CSP1 | CSP2 | CSP3 | CSP4 | CSP5 | CSP6 |
SelCSP ability | 0.51 | 0.55 | 0.78 | 0.45 | 0.81 | 0.78 |
[32] ability | 0.48 | 0.51 | 0.7 | 0.41 | 0.72 | 0.68 |
It can be seen that according to table 3, the ability value based on each cloud service provider is several for CSP1, CSP2, CSP3, CSP4
It is similar, and they are different in CSP5, the environment of CSP6.And the reason of generating this species diversity, is derived from evaluation profile
Difference, when assessing these parameters, if do not consider NIST suggestion and standard and assessed, then obtained result will less have
Effect.And SLA exactly considers corresponding parameter and control, overall ability ratio [32] be (another kind assessment provider's ability
Frame is a kind of comprehensive framework of control and risk based on the trust in strategic alliances in fact) in ability it is also higher, counting
The aspect of overall clarity value is calculated, it is also more accurate, comprehensive.
It is discussed in detail although the contents of the present invention have passed through above preferred embodiment, but it should be appreciated that above-mentioned
Description is not considered as limitation of the present invention.After those skilled in the art have read above content, for of the invention
A variety of modifications and substitutions all will be apparent.Therefore, protection scope of the present invention should be limited to the appended claims.
Claims (6)
1. a kind of selection method of ideal cloud service provider, which is characterized in that this method includes:
Standard set SLA parameter is established for each cloud service provider;
The transparency of all SLA parameters is summed, is then taken by the SLA parameter relevant information for obtaining each cloud service provider
Overall capacity of the average value as cloud service provider on SLA;
Whether there is direct interactive relation in same or similar environment according to past client and each cloud service provider
Trust grading and feedback grading that interactive log situation and client provide calculate the confidence level of each cloud service provider;
According to the ability and confidence level of each cloud service provider, the totality interaction value-at-risk of each cloud service provider is calculated;
The totality interaction value-at-risk result of each cloud service provider is pushed to client.
2. the selection method of ideal cloud service provider as described in claim 1, it is characterised in that:
The interactive log refers to the grading interacted between cloud service provider or other customer's representatives that client provides in the past
The trust feedback composition to cloud service provider that people provides.
3. a kind of selection system of ideal cloud service provider, which is characterized in that the selection system includes:
Memory module, for the interactive log of interactive relation and visitor between the client of being stored in over and each cloud service provider
The trust grading and feedback grading that family provides;
SLA parameter establishes module, for establishing standard set SLA parameter for each cloud service provider;
Performance Risk Calculation module joins all SLA for obtaining the SLA parameter relevant information of each cloud service provider
Several transparency summations, is then averaged the overall capacity as cloud service provider on SLA;
Relational risk computing module, for according to past client and each cloud service provider in same or similar environment whether
There are the interactive log situation of direct interactive relation and the trust grading of client's offer and feedback grading to calculate each cloud and take
The confidence level of business provider;
Overall interaction value-at-risk computing module calculates each cloud for the ability and confidence level according to each cloud service provider
The totality interaction value-at-risk of service provider;
Pushing module, for the totality interaction value-at-risk result of each cloud service provider to be pushed to client.
4. the selection system of ideal cloud service provider as claimed in claim 3, it is characterised in that:
Overall capacity calculation formula in the calculating cloud service provider SLA parameter are as follows:
In formula, φ indicates all parameters, and SLA φ indicates parameter all in SLA, and parami is i-th of ginseng in SLA φ
Number, n are the SLA parameter sum of some cloud service provider, λparami(φ) is the transparency of parameter parami ∈ φ.
5. the selection system of ideal cloud service provider as claimed in claim 4, it is characterised in that:
The confidence level calculating process includes the calculating of trust value and the calculating of credit value;
Wherein, the calculation formula of the trust value are as follows:
In formula, cjIt is j-th of desired and k-th of cloud service provider pkInteractive client, C1 indicate client and cloud service provider
Between either with or without interaction, τ is predefined time window,It is the function for assessing general trust vector, any element μcj(pk,
αi) indicate client cjTo cloud service provider pkIn environment αiLower expected degree of belief, αiIt is an element in A, A is to hand over
One group of mutual environment value is the total quantity for having been observed environment in interaction;
ω=e-γ(|τ|-t)
In formula, γ ∈ [0, ∞], t≤| τ |, ω is weight factor, δl∈ D is first of the time interval specified in H, and D is letter
Appoint domain, H is the interactive history of client and cloud service provider, μcj(pk,αi) indicate client cjTo cloud service provider pkIn environment αiUnder
Expected degree of belief, and probability value is by distribution function F (δl) provide, F is probability-distribution function, will distribute desired letter later
Ren Du;
Wherein, the calculation formula of the credit value are as follows:
In formula, π is the function for assessing whole reputation vectors, diIndicate i-th of element in trust domain D;
Wherein, the calculation formula of confidence level are as follows:
In formula, TτThat indicate is the overall confidence level that obtains of result of both comprehensive trust value and credit value, ζτ(cj,pk) indicate
The trust value that the general trust vector established when interaction calculates, π (cj,pk) indicate be not interactive when credit value.
6. the selection system of ideal cloud service provider as claimed in claim 5, which is characterized in that the totality interaction wind
The totality interaction value-at-risk calculation formula of danger value computing module are as follows:
In formula, α is current interactive environment, Τ (cj,pk) it is cjTo pkThe confidence level possessed, C (pk) it is cloud service provider pk
Ability, function Icj(α) is according to client cjViewpoint calculate degree context importance, function Ucj(α) is measuring customer
cjThe expected benefit from environment of function, and function Icj(α) and UcjThe value of (α) is all between [0 ,+1].
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710367474.3A CN107171843B (en) | 2017-05-23 | 2017-05-23 | A kind of selection method and system of ideal cloud service provider |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710367474.3A CN107171843B (en) | 2017-05-23 | 2017-05-23 | A kind of selection method and system of ideal cloud service provider |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107171843A CN107171843A (en) | 2017-09-15 |
CN107171843B true CN107171843B (en) | 2019-07-09 |
Family
ID=59820400
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710367474.3A Active CN107171843B (en) | 2017-05-23 | 2017-05-23 | A kind of selection method and system of ideal cloud service provider |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107171843B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108415921B (en) * | 2017-09-25 | 2021-08-24 | 平安科技(深圳)有限公司 | Supplier recommendation method and device and computer-readable storage medium |
CN108650157A (en) * | 2018-05-18 | 2018-10-12 | 深圳源广安智能科技有限公司 | A kind of intelligent domestic system |
CN108551457B (en) * | 2018-05-18 | 2019-10-01 | 广西电网有限责任公司 | Key message infrastructure security based on artificial intelligence protects cloud service system |
US11144342B2 (en) | 2019-03-27 | 2021-10-12 | International Business Machines Corporation | Workload execution in a distributed computing infrastructure on candidate nodes identified through plural test deployments |
CN113364844B (en) * | 2021-05-31 | 2022-07-08 | 安徽师范大学 | Trust evaluation method based on characteristic factors and SLA in cloud environment |
CN116094992B (en) * | 2022-12-23 | 2024-04-16 | 中电信数智科技有限公司 | Message forwarding method, storage medium and device based on worksheet scene |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101364899A (en) * | 2008-10-10 | 2009-02-11 | 北京航空航天大学 | Web QoS evaluating method based on cloud model |
CN102891773A (en) * | 2011-07-18 | 2013-01-23 | 北京邮电大学 | Cloud computing SLA management framework based on resource credibility evaluation |
CN103002005A (en) * | 2011-09-07 | 2013-03-27 | 埃森哲环球服务有限公司 | Cloud service monitoring system |
CN103200277A (en) * | 2013-04-24 | 2013-07-10 | 东南大学 | Cloud computing service credibility evaluation method based on logs |
CN103237023A (en) * | 2013-04-16 | 2013-08-07 | 安徽师范大学 | Dynamic trust model establishing system |
CN105577726A (en) * | 2014-10-17 | 2016-05-11 | 青岛鑫益发工贸有限公司 | Service level protocol based trust negotiation system under cloud computing platform |
CN106296305A (en) * | 2016-08-23 | 2017-01-04 | 上海海事大学 | Electric business website real-time recommendation System and method under big data environment |
CN106296219A (en) * | 2016-08-05 | 2017-01-04 | 厦门北卡信息科技有限公司 | A kind of method trusted based on AIFS weight calculation |
-
2017
- 2017-05-23 CN CN201710367474.3A patent/CN107171843B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101364899A (en) * | 2008-10-10 | 2009-02-11 | 北京航空航天大学 | Web QoS evaluating method based on cloud model |
CN102891773A (en) * | 2011-07-18 | 2013-01-23 | 北京邮电大学 | Cloud computing SLA management framework based on resource credibility evaluation |
CN103002005A (en) * | 2011-09-07 | 2013-03-27 | 埃森哲环球服务有限公司 | Cloud service monitoring system |
CN103237023A (en) * | 2013-04-16 | 2013-08-07 | 安徽师范大学 | Dynamic trust model establishing system |
CN103200277A (en) * | 2013-04-24 | 2013-07-10 | 东南大学 | Cloud computing service credibility evaluation method based on logs |
CN105577726A (en) * | 2014-10-17 | 2016-05-11 | 青岛鑫益发工贸有限公司 | Service level protocol based trust negotiation system under cloud computing platform |
CN106296219A (en) * | 2016-08-05 | 2017-01-04 | 厦门北卡信息科技有限公司 | A kind of method trusted based on AIFS weight calculation |
CN106296305A (en) * | 2016-08-23 | 2017-01-04 | 上海海事大学 | Electric business website real-time recommendation System and method under big data environment |
Non-Patent Citations (1)
Title |
---|
云计算数据安全;聂雄丁,韩德志,毕坤;《吉林大学学报(工学版)》;20120930;第42卷;332-336 |
Also Published As
Publication number | Publication date |
---|---|
CN107171843A (en) | 2017-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107171843B (en) | A kind of selection method and system of ideal cloud service provider | |
Han et al. | A fuzzy TOPSIS method for performance evaluation of reverse logistics in social commerce platforms | |
Lu et al. | Platform-based mechanisms, institutional trust, and continuous use intention: The moderating role of perceived effectiveness of sharing economy institutional mechanisms | |
Ghosh et al. | SelCSP: A framework to facilitate selection of cloud service providers | |
Rani et al. | Optimizing performance of fuzzy decision support system with multiple parameter dependency for cloud provider evaluation | |
Wei et al. | Adoption of e-commerce online shopping in Malaysia | |
CN113748440A (en) | Secure multi-party computing attribution | |
Wang et al. | Social network privacy measurement and simulation | |
Bag et al. | A privacy-aware decentralized and personalized reputation system | |
Challagidad et al. | Reputation based trust model in cloud computing | |
Gorus et al. | The relationship between oil prices, oil imports and income level in Turkey: Evidence from Fourier approximation | |
Alfantoukh et al. | Multi-stakeholder consensus decision-making framework based on trust: a generic framework | |
Chi et al. | Option pricing with threshold mean reversion | |
Naghizadeh et al. | Perceptions and truth: a mechanism design approach to crowd-sourcing reputation | |
Rodrigues et al. | On trust, blockchain, and reputation systems | |
CN104394162A (en) | Service quality credibility considered network service selection method | |
Abdel-Hafez et al. | A rating aggregation method for generating product reputations | |
Rödder et al. | Risk in modern IT service landscapes: Towards a dynamic model | |
Habib et al. | Fusion of Opinions under Uncertainty and Conflict--Application to Trust Assessment for Cloud Marketplaces | |
Agheli et al. | A trust evaluation model for selecting service provider in cloud environment | |
Chakraborty et al. | Bargaining solutions in a social network | |
Jeragh et al. | A twitter-based weighted reputation system | |
Kaur et al. | Trust: models and architecture in cloud computing | |
Kamiya et al. | On the role of tax subsidy scheme in money search models | |
Gwak et al. | IoT trust estimation in an unknown place using the opinions of i-sharing friends |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |