A Cooperative Game for Online Cloud Federation Formation based on Security Risk Assessment

被引:8
|
作者
Halabi, Talal [1 ]
Bellaiche, Martine [1 ]
Abusitta, Adel [1 ]
机构
[1] Ecole Polytech Montreal, Dept Comp & Software Engn, Montreal, PQ, Canada
关键词
Cloud Computing; Cloud security; Cloud federation; security risk assessment; coalitional game; game theory;
D O I
10.1109/CSCloud/EdgeCom.2018.00023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud federations allow Cloud Service Providers (CSPs) to deliver more efficient service performance by interconnecting their Cloud environments and sharing their resources. However, the security of the federated Cloud service could be compromised if the resources are shared with relatively insecure and unreliable CSPs. In this paper, we propose a Cloud federation formation model that considers the security risk levels of CSPs. We start by quantifying the security risk of CSPs according to well defined evaluation criteria related to security risk avoidance and mitigation, then we model the Cloud federation formation process as a hedonic coalitional game with a preference relation that is based on the security risk levels and reputations of CSPs. We propose a federation formation algorithm that enables CSPs to cooperate while considering the security risk introduced to their infrastructures, and refrain from cooperating with undesirable CSPs. According to the stability-based solution concepts that we use to evaluate the game, the model shows that CSPs will be able to form acceptable federations on the fly to service incoming resource provisioning requests whenever required.
引用
收藏
页码:83 / 88
页数:6
相关论文
共 50 条
  • [41] An Online Risk Based Security Assessment Via Conditional Value-at-risk in Uncertain Environment
    Deng, Wei-si
    Wu, Jia-si
    Zhang, Bu-han
    Ding, Hong-fa
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND AUTOMATION (ICEEA 2016), 2016,
  • [42] Cooperative game approach to form overlapping cloud federation based on inter-cloud architecture (Mar, 10.1007/s10586-021-03253-z, 2021)
    Ayachi, Messaouda
    Nacer, Hassina
    Slimani, Hachem
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1579 - 1582
  • [43] Method for router online security risk assessment quantification
    Department of Information Transmission, Xi'an Communications Institute, Xi'an 710106, China
    不详
    Yang, J.-G., 1600, Editorial Board of Journal on Communications (34):
  • [44] Security and privacy of digital economic risk assessment system based on cloud computing and blockchain
    Wenjin Jin
    Soft Computing, 2024, 28 : 2753 - 2768
  • [45] Information System Security Risk Assessment Based on Multidimensional Cloud Model and The Entropy Theory
    Huang, Liangliang
    Shen, Yongjun
    Zhang, Guidong
    Luo, Huixia
    PROCEEDINGS OF 2015 IEEE 5TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION, 2015, : 11 - 15
  • [46] An improved FAHP-cloud-based security risk assessment model for airborne networks
    Wang, Jing
    Li, Jingwen
    Li, Guo
    Huang, Tianjing
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2021, 21 (02) : 277 - 291
  • [47] An assessment model for cloud service security risk based on entropy and support vector machine
    Jiang, Rong
    Ma, Zifei
    Yang, Juan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (21):
  • [48] A method for network security risk assessment and decision-making based on the cloud model
    Zhang, Jie
    Tang, Jun
    Pei, Fang
    Journal of Convergence Information Technology, 2012, 7 (06) : 146 - 153
  • [49] ArchiMate based Security Risk Assessment as a service: preventing and responding to the cloud of things' risks
    Abbass, Wissam
    Baina, Amine
    Bellafkih, Mostafa
    2019 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2019, : 136 - 140
  • [50] Security mechanism in access control based on non-cooperative game
    1600, Editorial Board of Journal on Communications (35):