Model of Security Evaluation of Infrastructure as a Service Layer of Cloud Computing System

被引:1
|
作者
李传龙 [1 ]
高静 [1 ]
机构
[1] College of Computer and Information Engineering,Inner Mongolia Agricultural University
基金
中国国家自然科学基金;
关键词
cloud computing; security; infrastructure as a service(IaaS); evaluation model;
D O I
10.19884/j.1672-5220.2015.02.031
中图分类号
TP393.09 [];
学科分类号
080402 ;
摘要
At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model of IaaS.After analyzing the vulnerabilities performance of IaaS cloud computing system,the mapping relationship was established between the vulnerabilities of IaaS and the nine threats of cloud computing which was released by cloud security alliance(CSA).According to the mapping relationship,a model for evaluating security of IaaS was proposed which verified the effectiveness of the model on OpenStack by the analytic hierarchy process(AHP) and the fuzzy evaluation method.
引用
收藏
页码:323 / 327
页数:5
相关论文
共 50 条
  • [1] A Novel Approach to Cloud Computing: Infrastructure as a Service Security
    Jain, Sarika
    Tyagi, Prachi
    Kalra, Siddharth
    2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 501 - 504
  • [2] Authentication and secured execution for the Infrastructure-as-a-Service layer of the Cloud Computing model
    Hubert, Laurent
    Sirdey, Renaud
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 291 - 297
  • [3] Cloud Computing: Exploring Security Design Approaches in Infrastructure as a Service
    Jog, Manas
    Madiajagan, M.
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 156 - 159
  • [4] Infrastructure as a Service: Cloud Computing Model for Micro Companies
    Polkowski, Zdzislaw
    Nycz-Lukaszewska, Malgorzata
    ADVANCES IN DATA SCIENCE AND MANAGEMENT, 2020, 37 : 307 - 320
  • [5] Security as a Service Model for Virtualization Vulnerabilities in Cloud Computing
    Paikrao, Rahul L.
    Patil, Varsha H.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 559 - 562
  • [6] Research on the security mechanism of cloud computing service model
    Zhang Y.
    Automatic Control and Computer Sciences, 2016, 50 (2) : 98 - 106
  • [7] Security Issues In Service Model Of Cloud Computing Environment
    Krishna, B. Hari
    Kiran, S.
    Murali, G.
    Reddy, R. Pradeep Kumar
    FOURTH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTER SCIENCE & ENGINEERING (ICRTCSE 2016), 2016, 87 : 246 - 251
  • [8] Standardization Approaches within Cloud Computing: Evaluation of Infrastructure as a Service Architecture
    Labes, Stine
    Repschlaeger, Jonas
    Zarnekow, Ruediger
    Stanik, Alexander
    Kao, Odej
    2012 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2012, : 923 - 930
  • [9] Safeguarding Cloud Computing Infrastructure: A Security Analysis
    Alenezi, Mamdouh
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 37 (02): : 159 - 167
  • [10] A Layered Security Approach for Cloud Computing Infrastructure
    Yildiz, Mehmet
    Abawajy, Jemal
    Ercan, Tuncay
    Bernoth, Andrew
    2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, : 763 - +