Abstract
As cloud computing technology has been widely used in the world, the security assessment of cloud computing platform has caught lots of attention. Based on the characteristics of cloud computing platform, this article presents an indicator system to evaluate the security of cloud computing. The system makes use of fuzzy membership function to express the subjective evaluation elements and adopt G.A. Miller theory to quantify the overall security of cloud computing platform. The method in the paper not only helps to get the optimal weight, but also takes both the experts’ preference to assessment program and optimal ranking into account. And the example shows that the methodology in this paper is operable and reasonable for the assessment of cloud computing platform security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, C., Yu, J.: Security of Cloud System. Science Press, Tokyo (2014)
Feng, D.G., Zhang, M., Zhang, Y., et al.: Study on cloud computing security. J. Softw. 22(1), 71–83 (2011)
Lin, C., Su, W., Meng, K., Liu, Q., Liu, W.: Cloud computing security: architecture, mechanism and modeling. Chin. J. Comput. 9, 1765–1784 (2013)
Chen, X., Yu, J., Chen, C., Ren, W.: Cloud computing security framework based on classified protection. China Digital Med. 11, 44–47 (2014)
Chen, X., Chen, C., Tao, Y., Hu, J.: Cloud security assessment system based on classifying and grading. IEEE Cloud Comput. 2(2), 58–67 (2015)
Chen, C., Zhu, X., Shen, P., Hu, J.: A hierarchical clustering method for big data oriented ciphertext search. In: INFOCOM 2014 Workshop on Security and Privacy in Big Data, pp. 559–564 (2014)
Jiang, Z., Zhao, W., Liu, Y., Liu, B.: Model for cloud computing security assessment based on classified protection. Comput. Sci. 8, 151–156 (2013)
Yan, Q., Chen, Z., Duan, Y., Wang, L.: Information system security metrics and evaluation model. Acta Electronica Sinica 9, 1351–1355 (2003)
Chen, C., Feng, D., Xu, Z.: A research on quantitative evaluation on the assurance of information security products. Acta Electronica Sinica 10, 1886–1891 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhao, X., Zhang, W., Ma, W. (2015). Quantitative Evaluation Method of Cloud Security. In: Niu, W., et al. Applications and Techniques in Information Security. ATIS 2015. Communications in Computer and Information Science, vol 557. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48683-2_19
Download citation
DOI: https://doi.org/10.1007/978-3-662-48683-2_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-48682-5
Online ISBN: 978-3-662-48683-2
eBook Packages: Computer ScienceComputer Science (R0)