An assessment model for cloud service security risk based on entropy and support vector machine

被引:9
作者
Jiang, Rong [1 ,2 ,3 ]
Ma, Zifei [4 ,5 ]
Yang, Juan [6 ]
机构
[1] Yunnan Univ Finance & Econ, Inst Intelligence Applicat, Kunming, Yunnan, Peoples R China
[2] Key Lab Serv Comp & Safety Management Yunnan Prov, Kunming, Yunnan, Peoples R China
[3] Kunming Key Lab Informat Econ & Informat Manageme, Kunming, Yunnan, Peoples R China
[4] Yunnan Agr Univ, Sch Water Conservancy, Kunming, Yunnan, Peoples R China
[5] Yunnan Univ, Sch Software, Kunming, Yunnan, Peoples R China
[6] KunmingOpen Coll, Kunming, Yunnan, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud service; entropy weight; multi-classification; support vector machine; technology risk assessment; SYSTEMS; EDGE;
D O I
10.1002/cpe.6423
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud services are open, shared, and complex. These characteristics will lead to many security risks and will affect the development of cloud services. Therefore, it is necessary to identify and measure the security risks of cloud services. However, there are still many deficiencies in this area. In light of this, this paper carries out an in-depth study from the perspective of technical security risk. Firstly, this paper combines the three aspects on cloud service security problems, objectives, and technologies. It attempts to explore the technological solutions to get security risk problems to achieve the expected security goals, and establish the cloud service technology security risk index system. Secondly, because of the strong subjectivity and the deficiency of the data obtained from cloud service providers, this paper establishes a cloud service security risk assessment model based on entropy weight theory and multi-classification support vector machine. Finally, the experimental results show that the evaluation model is feasible and effective.
引用
收藏
页数:22
相关论文
共 53 条
[1]  
[Anonymous], 2012, Cloud computing: Benefits, Risks and Recommendations for Information Security
[2]  
[Anonymous], 2014, INVENTORY 10 SECURIT
[3]  
[Anonymous], 2013, MOST SERIOUS ACCIDEN
[4]  
[Anonymous], 2013, INFORM SCIENTIST
[5]  
Bai P., 2008, SUPPORT VECTOR MACHI, V1st ed., P13
[6]  
Carroll M., 2011, 2011 INFORM SECURITY, P1, DOI [DOI 10.1109/ISSA.2011.6027519, 10.1109/ISSA.2011.6027519]
[7]   An Intelligent Platooning Algorithm for Sustainable Transportation Systems in Smart Cities [J].
Chen, Chen ;
Zhang, Yuru ;
Khosravi, Mohammad R. ;
Pei, Qingqi ;
Wan, Shaohua .
IEEE SENSORS JOURNAL, 2021, 21 (14) :15437-15447
[8]  
Chen Quan, 2009, Journal of Computer Applications, V29, P2562, DOI 10.3724/SP.J.1087.2009.02562
[9]  
Chen YZ., 2013, RES INFORM SECURITY
[10]  
Clarke Roger, 2013, J. theor. appl. electron. commer. res., V8, P59, DOI 10.4067/S0718-18762013000300005