Skip to main content

Quantitative Evaluation Method of Cloud Security

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 557))

  • 938 Accesses

Abstract

As cloud computing technology has been widely used in the world, the security assessment of cloud computing platform has caught lots of attention. Based on the characteristics of cloud computing platform, this article presents an indicator system to evaluate the security of cloud computing. The system makes use of fuzzy membership function to express the subjective evaluation elements and adopt G.A. Miller theory to quantify the overall security of cloud computing platform. The method in the paper not only helps to get the optimal weight, but also takes both the experts’ preference to assessment program and optimal ranking into account. And the example shows that the methodology in this paper is operable and reasonable for the assessment of cloud computing platform security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, C., Yu, J.: Security of Cloud System. Science Press, Tokyo (2014)

    Google Scholar 

  2. Feng, D.G., Zhang, M., Zhang, Y., et al.: Study on cloud computing security. J. Softw. 22(1), 71–83 (2011)

    Article  Google Scholar 

  3. Lin, C., Su, W., Meng, K., Liu, Q., Liu, W.: Cloud computing security: architecture, mechanism and modeling. Chin. J. Comput. 9, 1765–1784 (2013)

    Google Scholar 

  4. Chen, X., Yu, J., Chen, C., Ren, W.: Cloud computing security framework based on classified protection. China Digital Med. 11, 44–47 (2014)

    Google Scholar 

  5. Chen, X., Chen, C., Tao, Y., Hu, J.: Cloud security assessment system based on classifying and grading. IEEE Cloud Comput. 2(2), 58–67 (2015)

    Article  Google Scholar 

  6. Chen, C., Zhu, X., Shen, P., Hu, J.: A hierarchical clustering method for big data oriented ciphertext search. In: INFOCOM 2014 Workshop on Security and Privacy in Big Data, pp. 559–564 (2014)

    Google Scholar 

  7. Jiang, Z., Zhao, W., Liu, Y., Liu, B.: Model for cloud computing security assessment based on classified protection. Comput. Sci. 8, 151–156 (2013)

    Google Scholar 

  8. Yan, Q., Chen, Z., Duan, Y., Wang, L.: Information system security metrics and evaluation model. Acta Electronica Sinica 9, 1351–1355 (2003)

    Google Scholar 

  9. Chen, C., Feng, D., Xu, Z.: A research on quantitative evaluation on the assurance of information security products. Acta Electronica Sinica 10, 1886–1891 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Ma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhao, X., Zhang, W., Ma, W. (2015). Quantitative Evaluation Method of Cloud Security. In: Niu, W., et al. Applications and Techniques in Information Security. ATIS 2015. Communications in Computer and Information Science, vol 557. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48683-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-48683-2_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-48682-5

  • Online ISBN: 978-3-662-48683-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics