Assessment Model of Cloud Service Security Level Based on Standardized Security Metric Hierarchy

被引:0
作者
Li X. [1 ,2 ]
Yang R. [3 ]
Chen X. [2 ,3 ]
Liu Y. [1 ]
Wang Q. [2 ,3 ]
机构
[1] College of Computer Sci., Sichuan Univ., Chengdu
[2] Cybersecurity Research Inst., Sichuan Univ., Chengdu
[3] College of Cybersecurity, Sichuan Univ., Chengdu
来源
Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences | 2020年 / 52卷 / 03期
关键词
Cloud service; Objective weight assignment; Security level assessment; Security metric; TOPSIS;
D O I
10.15961/j.jsuese.201900429
中图分类号
学科分类号
摘要
In order to cope with the issues existing in the traditional literature that assessment metrics are coarse-grained and non-quantitative as well as assessment methods are subjective and low efficiency, an assessment model of could service security level based on the standardized security metric hierarchy was proposed. First, a fine-grained, quantifiable and standardized cloud service security metric hierarchy was structured according to the principle of evaluation metric system. The content of cloud service security metric hierarchy was composed of both domestic and foreign standards related to the cloud service security. Second, a cloud service security level evaluation model was proposed based on the metric hierarchy. Considering the difference of metric' types and impact of attributes on the security features of cloud services, a security level assessment method was designed based on the objective weights assignment of the metrics to evaluate the security level of cloud services. Finally, a case study and a performance comparison experiment were respectively conducted to validate effectiveness of the proposed assessment model and efficiency of its evaluation method. Experimental results show that the proposed assessment method is efficient and accurate in the cloud service security level assessment, and the evaluation method outperforms the traditional cloud service security assessment methods. © 2020, Editorial Department of Advanced Engineering Sciences. All right reserved.
引用
收藏
页码:159 / 167
页数:8
相关论文
共 14 条
[1]  
Buyya R., Srirama S.N., Casale G., Et al., A manifesto for future generation cloud computing, ACM Computing Surveys, 51, 5, pp. 1-38, (2019)
[2]  
Singh A., Chatterjee K., Cloud security issues and challenges:A survey, Journal of Network and Computer Applications, 79, pp. 88-115, (2017)
[3]  
Cloud controls matrix v3.0.1
[4]  
Consensus assessments initiative questionnaire v3.0.1
[5]  
FedRAMP policy memo
[6]  
Information technology-cloud computing-service level agreement (SLA) framework part 1:Overview and concepts:19086-1, (2016)
[7]  
Jiang Z., Zhao W., Liu Y., Et al., Model for cloud computing security assessment based on classified protection, Computer Science, 40, 8, pp. 151-156, (2013)
[8]  
Yang A., Gao F., Bian M., Et al., Cloud computing security evaluation and countermeasure based on AHP-fuzzy comprehensive evaluation, Journal on Communications, 37, pp. 104-110, (2016)
[9]  
Gao Z., Lai Y., Peng D., Interval-valued hesitant fuzzy grey compromise relation analysis method for security of cloud computing evaluation, Journal of Computer Applications, 37, 10, pp. 2847-2853, (2017)
[10]  
Halabi T., Bellaiche M., Towards quantification and evaluation of security of cloud service providers, Journal of Information Security and Applications, 33, pp. 55-65, (2017)