Evaluation Model of Cloud Storage Security Level with the Fusion Analytic Hierarchy Process

被引:0
|
作者
Cheng Cheng [1 ]
Zhuo Enyi [2 ]
机构
[1] Xian Univ Architecture & Technol, Sch Management, Xian, Peoples R China
[2] Xian Univ Architecture & Technol, Xian, Peoples R China
关键词
Cloud storage; Ciphertext access control; Safety evaluation; Permission revocation; Dynamic re-encryption;
D O I
10.14257/ijsia.2016.10.9.09
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In view of excessive calculation and bandwidth cost, excessive complexity of the user access permission revocation in the cloud storage service, taking the ciphertext access control scheme of property encryption system (CP - ABE) of ciphertext strategy as the theoretical background, this article designed a cloud storage permission revocation optimization mechanism based on the dynamic re-encryption, namely DRPRO. The mechanism uses (k, n) threshold scheme to divide data information into several blocks, and dynamically selects a data information block to implement the re-encryption, and completes the user access permission revocation realization process by data partitioning, reconstruction, transfer, extraction, permission revocation and other subalgorithm successively. Theoretical analysis and simulation experiment evaluation show that under the premise of ensuring the high security of cloud storage service user data, DRPRO mechanism reduces the calculation and bandwidth cost of the user access permission revocation effectively, and its performance efficiency has been further optimized and improved.
引用
收藏
页码:77 / 86
页数:10
相关论文
共 50 条
  • [1] Research on Security Evaluation of Government Cloud Platform Based on Fuzzy Analytic Hierarchy Process
    Chen, Jing
    Zhang, Feng
    [J]. 2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [2] Evaluation Model for Computer Network Information Security Based on Analytic Hierarchy Process
    Xi Zhen-yuan
    Chen He
    Wang Xiang-zhong
    Sheng Jian-ling
    Fan Yu-tao
    [J]. 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 186 - 189
  • [3] An Evaluation Model for Information Security of Android Application Based on Analytic Hierarchy Process
    Wan Yan
    Wang Guolin
    Feng Xiangyang
    [J]. 2016 WORLD AUTOMATION CONGRESS (WAC), 2016,
  • [4] Survivability evaluation of network information system based on the cloud model and analytic hierarchy process
    Liu, Yan-Hua
    Chen, Guo-Long
    Wu, Rui-Fen
    [J]. Tongxin Xuebao/Journal on Communications, 2014, 35 (08): : 107 - 115
  • [5] Analytical hierarchy process model for managing cloud security
    Rizvi, Zainab Batool
    Khan, Chaudry Bilal Ahmad
    O'Sullivan, Michael
    [J]. INFORMATION AND COMPUTER SECURITY, 2024, 32 (01) : 93 - 111
  • [6] Evaluation of the national information security policy by analytic hierarchy process
    Andrade dos Santos, Clarice Saraiva
    Gaviao, Luiz Octavio
    dos Santos Oliveira, Leonardo Augusto
    Pereira, Jose Cristiano
    [J]. PERSPECTIVAS EM CIENCIA DA INFORMACAO, 2022, 27 (04): : 108 - 145
  • [7] Quantitative Evaluation of Cloud Elasticity based on Fuzzy Analytic Hierarchy Process
    Yang, Bo
    Zhang, Fan
    Khan, Samee U.
    [J]. 2022 IEEE CLOUD SUMMIT, 2022, : 105 - 112
  • [8] An Evaluation Method for Cloud Service Usability Based on Analytic Hierarchy Process
    Zhou, Ping
    Wang, Ze-Sheng
    Yin, Bo
    Guo, Shao-Yong
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 44 (01): : 79 - 85
  • [9] Scheduling in Cloud Computing Environment Using Analytic Hierarchy Process Model
    Makwe, Aditya
    Kanungo, Priyesh
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [10] Evaluation of Blasting Effect Based on Analytic Hierarchy Process and Cloud Model in Open-Pit Mines
    Jiang Fuliang
    Yang Wenchao
    Zhang Shuai
    Li Ming
    Wang Xiaoli
    Guo Jintao
    Chen Guan
    [J]. 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA), 2018, : 57 - 61