A Cooperative Game for Online Cloud Federation Formation based on Security Risk Assessment

被引:8
|
作者
Halabi, Talal [1 ]
Bellaiche, Martine [1 ]
Abusitta, Adel [1 ]
机构
[1] Ecole Polytech Montreal, Dept Comp & Software Engn, Montreal, PQ, Canada
来源
2018 5TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2018) / 2018 4TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2018) | 2018年
关键词
Cloud Computing; Cloud security; Cloud federation; security risk assessment; coalitional game; game theory;
D O I
10.1109/CSCloud/EdgeCom.2018.00023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud federations allow Cloud Service Providers (CSPs) to deliver more efficient service performance by interconnecting their Cloud environments and sharing their resources. However, the security of the federated Cloud service could be compromised if the resources are shared with relatively insecure and unreliable CSPs. In this paper, we propose a Cloud federation formation model that considers the security risk levels of CSPs. We start by quantifying the security risk of CSPs according to well defined evaluation criteria related to security risk avoidance and mitigation, then we model the Cloud federation formation process as a hedonic coalitional game with a preference relation that is based on the security risk levels and reputations of CSPs. We propose a federation formation algorithm that enables CSPs to cooperate while considering the security risk introduced to their infrastructures, and refrain from cooperating with undesirable CSPs. According to the stability-based solution concepts that we use to evaluate the game, the model shows that CSPs will be able to form acceptable federations on the fly to service incoming resource provisioning requests whenever required.
引用
收藏
页码:83 / 88
页数:6
相关论文
共 50 条
  • [21] Game Theory Meets Security Risk Assessment - Overview and Current Developments
    Pfluegel, Eckhard
    2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,
  • [22] Game Theory Meets Security Risk Assessment - Overview and Current Developments
    Pfluegel, Eckhard
    2017 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2017,
  • [23] Security Risk Assessment of Mobile Internet Under Cloud Computing Mode
    Chen, Luping
    Guo, Yongzhen
    Zhou, Feng
    TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 219 - 226
  • [24] Cloud Communication based Ship Communication Network Security Risk Assessment Model
    Zhou, Hongzhi
    Yu, Gan
    Li, Linguo
    JOURNAL OF COASTAL RESEARCH, 2020, : 991 - 995
  • [25] Manufacturing Cloud Service Composition Based on the Non-Cooperative and Cooperative Game Theory
    Goodarzi, E. Vaziri
    Houshmand, M.
    Valilai, O. Fatahi
    Ghezavati, V
    Bamdad, S.
    2020 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEE IEEM), 2020, : 1122 - 1125
  • [26] Research on the Security Risk Assessment and the Solutions of Cloud Computing
    Ding, Wen
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 481 - 486
  • [27] A Method of the Cloud Computing Security Management Risk Assessment
    Wang, Hongbing
    Liu, Feng
    Liu, Heng
    ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2012, 141 : 609 - +
  • [28] Security Risk Assessment on Cloud: A Systematic Mapping Study
    Annunziata, Giusy
    Sheykina, Alexandra
    Palomba, Fabio
    De Lucia, Andrea
    Catolino, Gemma
    Ferrucci, Filomena
    PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 604 - 613
  • [29] Security risk assessment framework for cloud computing environments
    Albakri, Sameer Hasan
    Shanmugam, Bharanidharan
    Samy, Ganthan Narayana
    Idris, Norbik Bashah
    Ahmed, Azuan
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2114 - 2124
  • [30] GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot
    Gill, Komal Singh
    Saxena, Sharad
    Sharma, Anju
    COMPUTERS & SECURITY, 2020, 92 (92)