An assessment model for cloud service security risk based on entropy and support vector machine

被引:9
作者
Jiang, Rong [1 ,2 ,3 ]
Ma, Zifei [4 ,5 ]
Yang, Juan [6 ]
机构
[1] Yunnan Univ Finance & Econ, Inst Intelligence Applicat, Kunming, Yunnan, Peoples R China
[2] Key Lab Serv Comp & Safety Management Yunnan Prov, Kunming, Yunnan, Peoples R China
[3] Kunming Key Lab Informat Econ & Informat Manageme, Kunming, Yunnan, Peoples R China
[4] Yunnan Agr Univ, Sch Water Conservancy, Kunming, Yunnan, Peoples R China
[5] Yunnan Univ, Sch Software, Kunming, Yunnan, Peoples R China
[6] KunmingOpen Coll, Kunming, Yunnan, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud service; entropy weight; multi-classification; support vector machine; technology risk assessment; SYSTEMS; EDGE;
D O I
10.1002/cpe.6423
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud services are open, shared, and complex. These characteristics will lead to many security risks and will affect the development of cloud services. Therefore, it is necessary to identify and measure the security risks of cloud services. However, there are still many deficiencies in this area. In light of this, this paper carries out an in-depth study from the perspective of technical security risk. Firstly, this paper combines the three aspects on cloud service security problems, objectives, and technologies. It attempts to explore the technological solutions to get security risk problems to achieve the expected security goals, and establish the cloud service technology security risk index system. Secondly, because of the strong subjectivity and the deficiency of the data obtained from cloud service providers, this paper establishes a cloud service security risk assessment model based on entropy weight theory and multi-classification support vector machine. Finally, the experimental results show that the evaluation model is feasible and effective.
引用
收藏
页数:22
相关论文
共 53 条
[21]  
Fu Yu, 2011, Journal of Naval University of Engineering, V23, P10, DOI 10.3969/j.issn.1009-3486.2011.01.003
[22]  
[付钰 FU Yu], 2006, [武汉大学学报. 理学版, Journal of Wuhan University. Natural Science Edition], V52, P631
[23]   Scalable risk assessment method for cloud computing using game theory (CCRAM) [J].
Furuncu, Evrim ;
Sogukpinar, Ibrahim .
COMPUTER STANDARDS & INTERFACES, 2015, 38 :44-50
[24]  
Giffin J. T., 2005, Recent Advances in Intrusion Detection. 8th International Symposium, RAID 2005. Revised Papers (Lecture Notes in Computer Science Vol. 3858), P185
[25]  
[韩起云 Han Qiyun], 2012, [计算机测量与控制, Computer Measurement & Control], V20, P2473
[26]  
Heiser J., 2008, ASSESSING SECURITY R
[27]  
Jiang R, 2014, J INF SCI ENG, V30, P1279
[28]  
[姜政伟 Jiang Zhengwei], 2013, [计算机科学, Computer Science], V40, P151
[29]  
Jiang ZW., 2012, INF SECUR, V11, P36
[30]  
Kamal Dahbur BM., 2011, P 2011 INT C INT SEM