• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Han, Jin (Han, Jin.) | Zhan, Jing (Zhan, Jing.) | Xia, Xiaoqing (Xia, Xiaoqing.) | Fan, Xue (Fan, Xue.)

Indexed by:

EI Scopus

Abstract:

Background: Currently, Cloud Service Provider (CSP) or third party usually proposes principles and methods for cloud security risk evaluation, while cloud users have no choice but to accept them. However, since cloud users and cloud service providers have conflicts of interests, cloud users may not trust the results of security evaluation performed by the CSP. Different cloud users may have different security risk preferences, which makes it difficult for the third party to con-sider all users' needs during evaluation. In addition, current security evaluation indexes for the cloud are too impractical to test (e.g., indexes like interoperability, transparency, portability are not easy to be evaluated). Methods: To solve the above problems, this paper proposes a practical cloud security risk evaluation method of decision-making based on conflicting roles by using the Analytic Hierarchy Process (AHP) with Aggregation of Individual Priorities (AIP). Results: Not only can our method bring forward a new index system based on risk source for cloud security and corresponding practical testing methods, but also can obtain the evaluation result with the risk preferences of conflicting roles, namely CSP and cloud users, which can lay a foundation for improving mutual trusts between the CSP and cloud users. The experiments show that the method can effectively assess the security risk of cloud platforms and in the case where the number of clouds increased by 100% and 200%, the evaluation time using our methodology increased by only 12% and 30%. Conclusion: Our method can achieve consistent decisions based on conflicting roles, high scalability and practicability for cloud security risk evaluation. © 2021 Bentham Science Publishers.

Keyword:

Distributed database systems Decision making Trusted computing Analytic hierarchy process Testing Risk assessment

Author Community:

  • [ 1 ] [Han, Jin]School of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 2 ] [Zhan, Jing]School of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 3 ] [Zhan, Jing]Beijing Key Laboratory of Trusted Computing, Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 4 ] [Xia, Xiaoqing]School of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 5 ] [Fan, Xue]School of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

Recent Advances in Computer Science and Communications

ISSN: 2666-2558

Year: 2021

Issue: 3

Volume: 14

Page: 874-886

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 1

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 5

Affiliated Colleges:

Online/Total:943/10573442
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.