Risk Situation Assessment Model Based on Interdomain Interaction in Cloud Computing Environment

被引:0
|
作者
Wang, Gaocai [1 ]
Yu, Ning [1 ]
机构
[1] Guangxi Univ, Sch Comp & Elect & Informat, Nanning, Peoples R China
基金
中国国家自然科学基金;
关键词
ACCESS-CONTROL;
D O I
10.1155/2020/7816925
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread application of cloud computing sharing technology, the demand for cross-domain interaction is also increasing. However, due to the uncertainty of interaction behaviour and the difference of network service quality, the risk of cross-domain interaction cannot be accurately evaluated. Therefore, this paper proposes a risk situation evaluation model based on interdomain interactions. The model collects interactive credentials such as the frequency, credibility, and time-effectiveness of the user-submitted evaluations. At the same time, it collects the evaluation of quality of service provided by the network security domain. Then, we set up a risk evaluation equation based on the interaction credentials to implement the risk evaluation of cross-domain interaction behaviour. Finally, we apply MATLAB platform to simulate the evolution process of evaluation. The experimental results show that, compared with other models, the evaluation method proposed in this paper improves the accuracy of the evaluation results and meets the security requirements of multidomain interaction.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] ISA-based model for risk assessment in cloud computing environment
    Benfateh, Amal
    Gharnati, F.
    Agouti, T.
    [J]. International Conference on Multimedia Computing and Systems -Proceedings, 2017, 0 : 377 - 383
  • [2] ISA-based Model for Risk Assessment in Cloud Computing Environment
    Benfateh, Amal
    Gharnati, F.
    Agouti, T.
    [J]. PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2016, : 377 - 383
  • [3] The New Risk Assessment Model for Information System in Cloud Computing Environment
    Liu Peiyu
    Liu Dong
    [J]. CEIS 2011, 2011, 15
  • [4] Cloud Computing: A Risk Assessment Model
    Shameli-Sendi, Alireza
    Cheriet, Mohamed
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 147 - 152
  • [5] Situation Awareness Based Resource Requirement in Cloud Computing Environment
    Wang, Junshe
    Li, Zheng
    Zhang, Hongbin
    [J]. 2017 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC 2017), VOL 2, 2017, : 93 - 96
  • [6] A RISK ASSESSMENT MODEL WITHIN CLOUD COMPUTING
    Neghina, Diana-Elena
    Scarlat, Emil
    [J]. INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2012, : 18 - +
  • [7] Study on risk assessment of information security based on cloud computing model
    Wu, Guo-Hua
    Liu, Yu-Cheng
    Qi, Kai-Kai
    Wang, Peng
    Xu, Jian-Da
    [J]. Proceedings of the 2016 International Conference on Engineering and Advanced Technology, 2016, 82 : 91 - 95
  • [8] Enhanced QoS-Based Model for Trust Assessment in Cloud Computing Environment
    Hassan, Hala
    El-Desouky, Ali Ibrahim
    Ibrahim, Abdelhameed
    El-Kenawy, El-Sayed M.
    Arnous, Reham
    [J]. IEEE ACCESS, 2020, 8 (08): : 43752 - 43763
  • [9] Security Risk Assessment of Cloud Computing Services in a Networked Environment
    Weintraub, Eli
    Cohen, Yuval
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (11) : 79 - 90
  • [10] Model of assessment of risks of information security in the environment of cloud computing
    Djuraev, R. X.
    Umirzakov, B. M.
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMMUNICATIONS TECHNOLOGIES (ICISCT), 2016,