An assessment model for cloud service security risk based on entropy and support vector machine

被引:9
作者
Jiang, Rong [1 ,2 ,3 ]
Ma, Zifei [4 ,5 ]
Yang, Juan [6 ]
机构
[1] Yunnan Univ Finance & Econ, Inst Intelligence Applicat, Kunming, Yunnan, Peoples R China
[2] Key Lab Serv Comp & Safety Management Yunnan Prov, Kunming, Yunnan, Peoples R China
[3] Kunming Key Lab Informat Econ & Informat Manageme, Kunming, Yunnan, Peoples R China
[4] Yunnan Agr Univ, Sch Water Conservancy, Kunming, Yunnan, Peoples R China
[5] Yunnan Univ, Sch Software, Kunming, Yunnan, Peoples R China
[6] KunmingOpen Coll, Kunming, Yunnan, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud service; entropy weight; multi-classification; support vector machine; technology risk assessment; SYSTEMS; EDGE;
D O I
10.1002/cpe.6423
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud services are open, shared, and complex. These characteristics will lead to many security risks and will affect the development of cloud services. Therefore, it is necessary to identify and measure the security risks of cloud services. However, there are still many deficiencies in this area. In light of this, this paper carries out an in-depth study from the perspective of technical security risk. Firstly, this paper combines the three aspects on cloud service security problems, objectives, and technologies. It attempts to explore the technological solutions to get security risk problems to achieve the expected security goals, and establish the cloud service technology security risk index system. Secondly, because of the strong subjectivity and the deficiency of the data obtained from cloud service providers, this paper establishes a cloud service security risk assessment model based on entropy weight theory and multi-classification support vector machine. Finally, the experimental results show that the evaluation model is feasible and effective.
引用
收藏
页数:22
相关论文
共 53 条
[41]  
Tanimoto MHS., 2011, 1 AC JNU INT C COMP
[42]  
Tim Mather SK., 2011, CLOUD SECURITY PRIVA
[43]   An Intelligent Video Analysis Method for Abnormal Event Detection in Intelligent Transportation Systems [J].
Wan, Shaohua ;
Xu, Xiaolong ;
Wang, Tian ;
Gu, Zonghua .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (07) :4487-4495
[44]   Cognitive computing and wireless communications on the edge for healthcare service robots [J].
Wan, Shaohua ;
Gu, Zonghua ;
Ni, Qiang .
COMPUTER COMMUNICATIONS, 2020, 149 :99-106
[45]  
Wu XP., 2010, SECURITY RISK ASSESS, V1st ed., P4
[46]  
Xiao Y., 2011, THEORY SUPPORT VECTO
[47]   A Survey on the Evolution of Risk Evaluation for Information Systems Security [J].
Yu Zhiwei ;
Ji Zhongyuan .
2012 INTERNATIONAL CONFERENCE ON FUTURE ELECTRICAL POWER AND ENERGY SYSTEM, PT B, 2012, 17 :1288-1294
[48]  
Zhang Q., 2018, RECENT PATENTS COMPU, V11, P32
[49]   Secure and Optimized Load Balancing for Multitier IoT and Edge-Cloud Computing Systems [J].
Zhang, Wei-Zhe ;
Elgendy, Ibrahim A. ;
Hammad, Mohamed ;
Iliyasu, Abdullah M. ;
Du, Xiaojiang ;
Guizani, Mohsen ;
El-Latif, Ahmed A. Abd .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (10) :8119-8132
[50]  
Zhang XL., 2013, NETINFO SECURITY, V13, P28