An assessment model for cloud service security risk based on entropy and support vector machine

被引:9
作者
Jiang, Rong [1 ,2 ,3 ]
Ma, Zifei [4 ,5 ]
Yang, Juan [6 ]
机构
[1] Yunnan Univ Finance & Econ, Inst Intelligence Applicat, Kunming, Yunnan, Peoples R China
[2] Key Lab Serv Comp & Safety Management Yunnan Prov, Kunming, Yunnan, Peoples R China
[3] Kunming Key Lab Informat Econ & Informat Manageme, Kunming, Yunnan, Peoples R China
[4] Yunnan Agr Univ, Sch Water Conservancy, Kunming, Yunnan, Peoples R China
[5] Yunnan Univ, Sch Software, Kunming, Yunnan, Peoples R China
[6] KunmingOpen Coll, Kunming, Yunnan, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud service; entropy weight; multi-classification; support vector machine; technology risk assessment; SYSTEMS; EDGE;
D O I
10.1002/cpe.6423
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud services are open, shared, and complex. These characteristics will lead to many security risks and will affect the development of cloud services. Therefore, it is necessary to identify and measure the security risks of cloud services. However, there are still many deficiencies in this area. In light of this, this paper carries out an in-depth study from the perspective of technical security risk. Firstly, this paper combines the three aspects on cloud service security problems, objectives, and technologies. It attempts to explore the technological solutions to get security risk problems to achieve the expected security goals, and establish the cloud service technology security risk index system. Secondly, because of the strong subjectivity and the deficiency of the data obtained from cloud service providers, this paper establishes a cloud service security risk assessment model based on entropy weight theory and multi-classification support vector machine. Finally, the experimental results show that the evaluation model is feasible and effective.
引用
收藏
页数:22
相关论文
共 53 条
[11]  
Cloud Security Alliance, 2013, NOT 9 CLOUD COMP TOP
[12]  
Ding XH., 2014, COMPUT SCI, V41, P284
[13]  
Ding Y., 2014, CHINESE J COMPUT, V37, P1
[14]   Packet classification based on the decision tree with information entropy [J].
Dong, Xiaoming ;
Qian, Meng ;
Jiang, Rong .
JOURNAL OF SUPERCOMPUTING, 2020, 76 (06) :4117-4131
[15]   Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks [J].
Elgendy, Ibrahim A. ;
Zhang, Wei-Zhe ;
Zeng, Yiming ;
He, Hui ;
Tian, Yu-Chu ;
Yang, Yuanyuan .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (04) :2410-2422
[16]  
Erdal C., 2018, J CLOUD COMPUT, V7, P1
[17]  
Feng Deng-Guo, 2011, Journal of Software, V22, P71, DOI 10.3724/SP.J.1001.2011.03958
[18]  
Fu S., 2013, INFORM SCIENCES, V31, P117
[19]  
Fu S., 2013, J MODEM INF, V33, P34
[20]  
Fu S., 2013, J MODERN INF, V33, P10