dc.contributor.author |
Hammoud, Ahmad |
|
dc.contributor.author |
Otrok, Hadi |
|
dc.contributor.author |
Mourad, Azzam |
|
dc.contributor.author |
Abdel Wahab, Omar |
|
dc.contributor.author |
Bentahar, Jamal |
|
dc.date.accessioned |
2021-04-15T19:05:45Z |
|
dc.date.available |
2021-04-15T19:05:45Z |
|
dc.date.copyright |
2019 |
en_US |
dc.date.issued |
2021-04-15 |
|
dc.identifier.issn |
1089-7798 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10725/12697 |
|
dc.description.abstract |
Cloud federation has emerged as a new business architecture which aims to help cloud providers cope with the increased waves of demands on their resources and services. Although plenty of solutions have been proposed trying to ensure the optimal formation of cloud federations, these approaches ignore the problem of encountering malicious providers that join federations to destroy them from inside and exclude some strong competitors from the market. To tackle this challenge, we propose, in this letter, a maximin game theoretical model which assists the broker, responsible for creating and managing federations, with maximizing the detection of such malicious providers. The challenge here is to deal with providers that try to minimize the detection maximization through distributing their misbehavior over several federations and changing their identities from time to time. Experiments conducted using real data from the CloudHarmony dataset reveal that our solution maximizes the detection of malicious providers and improves the profit and quality of service of the federations compared with the sky federation model |
en_US |
dc.language.iso |
en |
en_US |
dc.title |
On the Detection of Passive Malicious Providers in Cloud Federations |
en_US |
dc.type |
Article |
en_US |
dc.description.version |
Published |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
200904853 |
en_US |
dc.author.department |
Computer Science And Mathematics |
en_US |
dc.relation.journal |
IEEE Communications Letters |
en_US |
dc.journal.volume |
23 |
en_US |
dc.journal.issue |
1 |
en_US |
dc.article.pages |
64 - 67 |
en_US |
dc.keywords |
Cloud computing |
en_US |
dc.keywords |
Games |
en_US |
dc.keywords |
Quality of service |
en_US |
dc.keywords |
Monitoring |
en_US |
dc.keywords |
Probability distribution |
en_US |
dc.keywords |
Mathematical model |
en_US |
dc.keywords |
Security |
en_US |
dc.identifier.doi |
https://doi.org/10.1109/LCOMM.2018.2878714 |
en_US |
dc.identifier.ctation |
Hammoud, A., Otrok, H., Mourad, A., Wahab, O. A., & Bentahar, J. (2019). On the detection of passive malicious providers in cloud federations. IEEE Communications Letters, 23(1), 64-67. |
en_US |
dc.author.email |
azzam.mourad@lau.edu.lb |
|
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
https://ieeexplore.ieee.org/abstract/document/8515222 |
en_US |
dc.orcid.id |
https://orcid.org/0000-0001-9434-5322 |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |