A Cooperative Game for Online Cloud Federation Formation based on Security Risk Assessment

被引:8
作者
Halabi, Talal [1 ]
Bellaiche, Martine [1 ]
Abusitta, Adel [1 ]
机构
[1] Ecole Polytech Montreal, Dept Comp & Software Engn, Montreal, PQ, Canada
来源
2018 5TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2018) / 2018 4TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2018) | 2018年
关键词
Cloud Computing; Cloud security; Cloud federation; security risk assessment; coalitional game; game theory;
D O I
10.1109/CSCloud/EdgeCom.2018.00023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud federations allow Cloud Service Providers (CSPs) to deliver more efficient service performance by interconnecting their Cloud environments and sharing their resources. However, the security of the federated Cloud service could be compromised if the resources are shared with relatively insecure and unreliable CSPs. In this paper, we propose a Cloud federation formation model that considers the security risk levels of CSPs. We start by quantifying the security risk of CSPs according to well defined evaluation criteria related to security risk avoidance and mitigation, then we model the Cloud federation formation process as a hedonic coalitional game with a preference relation that is based on the security risk levels and reputations of CSPs. We propose a federation formation algorithm that enables CSPs to cooperate while considering the security risk introduced to their infrastructures, and refrain from cooperating with undesirable CSPs. According to the stability-based solution concepts that we use to evaluate the game, the model shows that CSPs will be able to form acceptable federations on the fly to service incoming resource provisioning requests whenever required.
引用
收藏
页码:83 / 88
页数:6
相关论文
共 50 条
  • [31] GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot
    Gill, Komal Singh
    Saxena, Sharad
    Sharma, Anju
    COMPUTERS & SECURITY, 2020, 92 (92)
  • [32] Traditional Security Risk Assessment Methods in Cloud Computing Environment: Usability Analysis
    Albakri, Sameer Hasan
    Shanmugam, Bharanidharan
    Samy, Ganthan Narayana
    Idris, Norbik Bashah
    Ahmed, Azuan
    JURNAL TEKNOLOGI, 2015, 73 (02):
  • [33] Comparative Study of Information Security Risk Assessment Models for Cloud Computing systems
    Jouini, Mouna
    Rabai, Latifa Ben Arfa
    7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 1084 - 1089
  • [34] Security and privacy of digital economic risk assessment system based on cloud computing and blockchain
    Wenjin Jin
    Soft Computing, 2024, 28 : 2753 - 2768
  • [35] ArchiMate based Security Risk Assessment as a service: preventing and responding to the cloud of things' risks
    Abbass, Wissam
    Baina, Amine
    Bellafkih, Mostafa
    2019 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2019, : 136 - 140
  • [36] Security and privacy of digital economic risk assessment system based on cloud computing and blockchain
    Jin, Wenjin
    SOFT COMPUTING, 2024, 28 (03) : 1971 - 1988
  • [37] Security Design and Implementation of the Cloud-based Online System
    Chen, Wei
    Shang, Yuting
    2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR EDUCATION (ICTE 2016), 2016, : 233 - 236
  • [38] A Research on The Indicator System of Cloud Computing Security Risk Assessment
    Zhang, Jijun
    Sun, Dejian
    Zhai, Donghang
    2012 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2012, : 121 - 123
  • [39] Empirical Assessment for Security Risk and Availability in Public Cloud Frameworks
    El-Attar, Noha E.
    Awad, Wael A.
    Omara, Fatma A.
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2016, : 17 - 25
  • [40] Security Risk Assessment of Cloud Computing Services in a Networked Environment
    Weintraub, Eli
    Cohen, Yuval
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (11) : 79 - 90