A Fuzzy Logic Based Risk Assessment Approach for Evaluating and Prioritizing Risks in Cloud Computing Environment

被引:1
作者
Amini, A. [1 ]
Jamil, N. [1 ]
Ahmad, A. R. [1 ]
Sulaiman, H. [1 ]
机构
[1] Univ Tenaga Nas, Coll Comp Sci & IT, Selangor, Malaysia
来源
RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY | 2018年 / 5卷
关键词
Cloud computing; Risk assessment; Fuzzy logic; Risk management; MODEL;
D O I
10.1007/978-3-319-59427-9_67
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is an innovative and popular paradigm in information technology. It delivers on-demand services by offering numerous advantages such as reduced management effort and efficient resource usage which would lead to economic saving. However, the associated flexibility and elasticity have caused many information security issues in a business environment. In such scenarios, all risk factors must be managed based on their probable effects on assets. Moreover, risk assessment as a core of risk management, estimates and prioritizes risks to reduce their impact and maximize the benefits of cloud computing for system providers and clients. In this paper, we adopt fuzzy logic to deal with insufficient information and estimate the severity and the likelihood of each risk mathematically. The aim of this paper is to develop a conceptual model to prioritize risks based on severity and probability. For estimating risk, human knowledge and expertise need to be integrated into role based circumstance. As a result, fuzzy logic is presented in this paper and the incenter on centroid method is proposed to convert linguistics data to numerical value in order to quantify the rate of risk. On the other hand, fuzzy logic has been used to deal with human experience as insufficient information to obtain the quantitative data due to the risk characterizing factors.
引用
收藏
页码:650 / 659
页数:10
相关论文
共 16 条
[1]   A fuzzy-based integrated framework for supply chain risk assessment [J].
Aqlan, Faisal ;
Lam, Sarah S. .
INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2015, 161 :54-63
[2]   Fuzzy logic-based user interface design for risk assessment considering human factor: A case study for high-voltage cell [J].
Aras, Faruk ;
Karakas, Ercuement ;
Bicen, Yunus .
SAFETY SCIENCE, 2014, 70 :387-396
[3]   Fuzzy-based approaches to substation reliability evaluation [J].
Bai, XG ;
Asgarpoor, S .
ELECTRIC POWER SYSTEMS RESEARCH, 2004, 69 (2-3) :197-204
[4]   Security risk assessment: Applying the concepts of fuzzy logic [J].
Bajpai, Shailendra ;
Sachdeva, Anish ;
Gupta, J. P. .
JOURNAL OF HAZARDOUS MATERIALS, 2010, 173 (1-3) :258-264
[5]  
Caralli R. A., 2007, INTRO OCTAVE ALLEGRO, P154
[6]  
Gonzalez A., 1994, Fuzzy Syst. A.I., V1, P57
[7]   Understanding Cloud Computing Vulnerabilities [J].
Grobauer, Bernd ;
Walloschek, Tobias ;
Stoecker, Elmar .
IEEE SECURITY & PRIVACY, 2011, 9 (02) :50-57
[8]   Information security risk analysis model using fuzzy decision theory [J].
Henriques de Gusmao, Ana Paula ;
Camara e Silva, Lucio ;
Silva, Maisa Mendonca ;
Poleto, Thiago ;
Cabral Seixas Costa, Ana Paula .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (01) :25-34
[9]   The New Risk Assessment Model for Information System in Cloud Computing Environment [J].
Liu Peiyu ;
Liu Dong .
CEIS 2011, 2011, 15
[10]   Business-driven management of infrastructure-level risks in Cloud providers [J].
Oriol Fito, J. ;
Guitart, Jordi .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 32 :41-53