HiRAM: A hierarchical risk assessment model and its implementation for an industrial Internet of Things in the cloud

被引:4
作者
Sun, Wen-Lin [1 ]
Tang, Ying-Han [1 ]
Huang, Yu-Lun [1 ,2 ]
机构
[1] Natl Yang Ming Chiao Tung Univ, Dept Elect & Elect Engn, Hsinchu, Taiwan
[2] Natl Yang Ming Chiao Tung Univ, Dept Elect & Elect Engn, 1001 Univ Rd, Hsinchu 300, Taiwan
关键词
analytic hierarchy process; cloud risk assessment; industrial internet-of-things;
D O I
10.1002/stvr.1847
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The trend towards intelligent control processes has introduced the Internet of Things (IoT) and cloud computing technologies to factories. IoT devices can sense data and send it to a cloud for further analysis in a factory. Consequently, the quantity of such valuable data flowing in an industrial cyber-physical system has gradually increased. Tailoring a risk assessment system for Industrial IoT (IIoT) is essential, particularly for a cloud platform that handles the IIoT data flow. In this study, we leverage analytic hierarchy processes (AHPs) and propose Hierarchical Risk Assessment Model (HiRAM) for an IIoT cloud platform. The proposed model allows the platform to self-evaluate its security status. Furthermore, a modular and responsive Risk Assessment System based on HiRAM, called HiRAM-RAS, is realized and evaluated in a real-world IIoT cloud platform. We deploy HiRAM-RAS to a sample application and introduce the practical deployment procedures. We then estimate the practicality of the HiRAM-RAS by injecting different degrees of errors and launching Distributed denial-of-service (DDoS) attacks. The results demonstrate the changes in integrity and availability scores evaluated by HiRAM.
引用
收藏
页数:27
相关论文
共 44 条
[1]   Cyber risk assessment in cloud provider environments: Current models and future needs [J].
Akinrolabu, Olusola ;
Nurse, Jason R. C. ;
Martin, Andrew ;
New, Steve .
COMPUTERS & SECURITY, 2019, 87
[2]   Evaluating distributed IoT databases for edge/cloud platforms using the analytic hierarchy process [J].
Alelaiwi, Abdulhameed .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 124 :41-46
[3]  
AMINI A, 2018, COMPREHENSIVE REV EX, P12004
[4]  
Andrea I, 2015, 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P180, DOI 10.1109/ISCC.2015.7405513
[5]  
Brunelli M., 2015, Introduction to the Analytic Hierarchy Process, P17
[6]   A risk assessment model for selecting cloud service providers [J].
Cayirci, Erdal ;
Garaga, Alexandr ;
de Oliveira, Anderson Santana ;
Roudier, Yves .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2016, 5
[7]  
CELIK Z, 2018, BIG SAFETY SECURITY, P147
[8]   A NOTE ON THE ANALYSIS OF SUBJECTIVE JUDGMENT MATRICES [J].
CRAWFORD, G ;
WILLIAMS, C .
JOURNAL OF MATHEMATICAL PSYCHOLOGY, 1985, 29 (04) :387-405
[9]   A Risk Assessment Framework for Cloud Computing [J].
Djemame, Karim ;
Armstrong, Django ;
Guitart, Jordi ;
Macias, Mario .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2016, 4 (03) :265-278
[10]   A NOTE ON SAATY RANDOM INDEXES [J].
DONEGAN, HA ;
DODD, FJ .
MATHEMATICAL AND COMPUTER MODELLING, 1991, 15 (10) :135-137