Search or add a thesis

Advanced Search (Beta)
Home > An Adaptive Trust-Aware Brokerage Model for Cross-Cloud Federation

An Adaptive Trust-Aware Brokerage Model for Cross-Cloud Federation

Thesis Info

Access Option

External Link

Author

Usama Ahmed

Program

PhD

Institute

COMSATS University Islamabad

City

Islamabad

Province

Islamabad.

Country

Pakistan

Thesis Completing Year

2020

Thesis Completion Status

Completed

Subject

Computer Science

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/13364/1/Usama%20ahmed%20CS%202020%20comsats%20isb%20prr.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676727697654

Similar


Establishing trust in cloud computing has been a major concern for cloud users since the very beginning of pay-as-you-go service. In the recent years, cross-cloud federation has enabled cloud providers to share or lease resources from each other. Contrary to the hesitation of cloud users for cloud adoption, it is now the cloud providers that are reluctant to take part in federation due to lack of trust on their unknown counterparts. A recent void has been observed to address the challenges of trustworthy resource exchanges within the federation. This research has established that trust awareness among cloud providers requires a comprehensive trust framework that is aligned with the nature of federation. A detailed requirement analysis for trust in cross-cloud federation has been performed in this research. This analysis is based on four founding principles of cloud-to-cloud trust paradigm namely bi-directionality, composite trust, delegation control and resource aware trust evaluation. Afterwards, requirements originated from these principles are aligned with the attributes of trust and cloud federation with the help of a detailed requirement matrix. Keeping in view this requirement matrix, an adaptive trust-aware brokerage model has been developed. This model offers dynamic trust establishment approaches that are a function of relationship among service providers. Three different approaches i.e. Conjunctive Accumulation of Trust (ConAccT), Numerical Accumulation of Trust (NAccT) and Cooperation Threshold Estimation (CTE) are developed as part of the proposed model. ConAccT is based on belief calculus and may be useful in case of highly competitive collaborating scenarios where detailed analysis of trust is required to decide cooperation among Cloud Service Providers (CSPs). NAccT approach is based on numerical calculus and is useful in less competitive scenarios and can be combined with metrics other than trust i.e. performance, availability, resource specifications etc. CTE approach is an extension to NAccT and presents a use case of utilizing the performance metric of a CSP combined with its trust metric to evaluate risk of failure in a collaborative project. The significance of these approaches has been verified by implementing the adaptive trust-aware model as a trusted broker based Clouds4Coordination (C4C) system developed for Architecture/Engineering/Construction (AEC) industry. This C4C system is currently implemented in United Kingdom in collaboration with Cardiff University, UK and Rutgers Discovery Informatics Institute (RDI2), USA. Experimental evaluation of these approaches suggests their suitability in varying scenarios of collaborative computing in construction industry. It has been verified that trust-aware relationships within the federation stays for a longer duration of time during collaborative projects. Moreover, an in depth analysis of proposed approach has shown that trust awareness is beneficial in terms of successful service delivery, earlier project completion and reduction in uncertainty of collaboration. A comparative analysis with state-of-art approaches have demonstrated the efficiency of proposed approaches to identify participants of federation that can cause potential risks and unnecessary delays in the projects.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

مولانا عبدالقادر رائے پوری

عبدالقادر رائے پوری
اس دور میں ہندوستان کے مسلمانوں کو حضرت حاجی امداد اﷲ صاحب مہاجر مکی رحمۃ اﷲ علیہ کے سلسلہ سے جو دینی و روحانی فیوض حاصل ہوئے، اس کی مثال دوسرے سلاسل میں مشکل سے مل سکتی ہے، اسی اعتبار سے یہ پورا سلسلہ۔
ایں سلسلہ از طلاے ناب ست

1ایں خانہ تمام آفتاب است
+کا مصداق ہے، اس سلسلہ میں آسمان علم و معرفت کے ایسے ایسے مہرو ماہ پیدا ہوئے جن کی روشنی سے سارا ہندوستان منور ہے اور آج اس ظلمت کدہ میں علم و عرفان کی جو روشنی بھی نظر آتی ہے وہ سب ان ہی نفوس قدسیہ کا پرتو ہے، اسی نورانی محفل کی ایک شمع فروزاں حضرت مولانا عبدالقادر رائے پوری رحمۃ اﷲ علیہ تھے، وہ اس دور کے شیخ کامل اور قطب وقت تھے، ان کی ذات سے ایک مخلوق ہدایت یاب ہوئی، گمراہوں کو راہ راست ملی، ناقص کامل اور کامل صاحب احوال و مقامات ہوگئے۔ افسوس ہے کہ یہ شمع ہدایت گزشتہ مہینہ گل ہوگئی، گو الحمدﷲ اب اس سلسلہ میں بعض بڑی شخصیتیں موجود ہیں، لیکن ’’ہر گلے رارنگ وبوئے دیگرے است‘‘۔ حضرت رائے پوری رحمۃ اﷲ علیہ اپنے رنگ میں منفرد تھے، ان کے ساتھ ان کی خصوصیات ختم ہوگئیں، وہ بات کوہکن کی گئی کوہکن کے ساتھ۔ اس لیے ان بزرگوں میں سے جو بھی اٹھتا ہے وہ اپنی جگہ ہمیشہ کے لیے خالی چھوڑ جاتا ہے، والبقأ ﷲ وحدہ، اﷲ تعالیٰ عالم آخرت میں حضرت شیخ کے درجات مراتب بلند فرمائے۔ (شاہ معین الدین ندوی، ستمبر ۱۹۶۲ء)
عبدالغنی صاحب انصاری
دارالمصنفین کے لیے دوسرا حادثہ مولوی عبدالغنی صاحب انصاری ریٹائرڈ کمشنر انکم ٹیکس کی وفات کا ہے، مرحوم علامہ شبلی کے عزیز دارالمصنفین کے پرانے ہمدرد ہواخواہ اور اس کی مجلس انتظامیہ کے رکن تھے، ان کی ذات میں...

میڈیکل ٹیسٹ سے گواہی کی شرعی حیثیت: ایک تحقیقی جائزہ

No society is safe from crimes hence with the passage of time, crimes amplify along with alteration in its nature. As the approaches of investigation and finding the crime develop, the ratio of crimes also increases and the casualties occur with new devices and techniques. On the other hand individual and collective endeavors are being made to stop it. The concerned authorities try to finish or decrease these crimes by formulating various new rules. The rules that the Creator and the real Owner of the whole world had bestowed upon us in the form of Islam, it includes the right and basic techniques to control the crimes. As the modern technology has facilitated us with many facilities, it has also facilitated us in finding a culprit or proofs against him that helps in the stoppage of crimes and finding the criminals. As this modern technology has brought a great reduction in the casualties and crimes, on the other hand we have also to face some legal and Islamic issues. One of these issues is the case of medical test for witness that whether the test of clinical laboratory can be accepted as witness

Physico-Morphic Variations Among Brinjal Cultivars Against Leucinodes Orbonalis Guenee Pyralidae: Lepidoptera and its Management With Different Techniques

Brinjal shoot and fruit borer (Leucinodes orbonalis Guenee) is a serious pest of brinjal and is responsible for colossal yield losses. The pest is mainly controlled by chemical insecticides which poses serious threats to human and environment thus demands the use of alternatives. The present studies were conducted with the objective to manage the pest with various methods other than use of chemical pesticides. Use of resistant cultivars is an economical and environmentally safer methods in pest management. In this regard thirteen brinjal cultivars were tested for their resistance against the pest on the basis of fruit infestation. The cultivars Nirala and Anmol were found relatively resistant, Karishma, Kanha (091) and Ep-273 were intermediate resistant and Naeelam and Black long were categorized as susceptible. In another experiment, relationship between various physico-morphic characteristics of brinjal cultivars and pest infestation was studied. The results showed variable infestation levels of L. orbonalis on different cultivars. Cultivar Naeelam showed maximum fruit infestation (58.60 and 48.09%) followed by Black long (47.93 and 33.31%), while minimum was observed in Nirala with (24.75 and 21.57%) fruit infestation during 2007-08 and 2008-09, respectively. Similarly, shoot infestation was found maximum in Naeelam (43.15 and 33.75%) followed by Kanha-091 (37.72 and 28.73%) and Nirala was found as least attacked by the pest showing 19.27 and 15.81% shoot infestation during 2007-08 and 2008-09, respectively. The correlation of different morphological plant characters with fruit infestation indicated very strong but negative correlation between fruit infestation and leaf trichomes, stem thickness and stem hair density. A negatively significant correlation was found between fruit infestation and plant height (r = -0.716), crown hair density (r = -0.672) while the correlations with leaf hair density (r = -0.623), and leaf area (r = -0.613), was also significant but negative. There was positive correlation of fruit infestation with yield (q/acre) and positive and non-significant correlation with number of primary branches/plant with r –value 0.661 and 0.319, respectively. Additionally, various management techniques were tested individually and in different combinations for the management of L. orbonalis. The integration of Trichogrammachilonis, hoeing and clipping of infested plant parts reduced fruit infestation to the maximum level (5.61, 6.14 and 6.66%) and maximum increase in yield (q/acre) (42.58, 35.99 and 39.29) at research farm PMAS Arid Agriculture University Rawalpindi, vegetable research farm NARC, Islamabad and Usman Khattar Vegetable Farm Taxila, Rawalpindi, respectively against L. orbonalis fruit infestation. Conclusively, the resistant cultivar “Nirala” and integration of different non chemical techniques (Trichogramma chilonis + hoeing + clipping) were recommended for the management of L. orbonalis in brinjal fields.