A Research for Cloud Computing Security Risk Assessment
Hua Tang*, 1, 2, Jiejun Yang1, 3, Xiaofang Wang1, Qi Zhou4
1 College of Safety Science and Engineering, Nanjing Tech University, Nanjing, Jiangsu, 211800, China
2 Information Technology Center, Hubei University of Technology, Wuhan, Hubei, 430068, China
3 School of Legal Studies, Guangdong University of Foreign Studies, Guangzhou, Guangdong, 510420, China
4 School of Industrial Design, Hubei University of Technology, Wuhan, Hubei, 430068, China
Abstract
In order to solve the problem of the complexity of the process and the accuracy of evaluation results in cloud computing security risk assessment, the hierarchical holographic modeling method is applied to cloud computing risk identification phase, so as to clearly capture the cloud computing risk factors through a comprehensive analysis of cloud computing security domains. Moreover, with cloud computing security factors as the basic unit, fuzzy set theory and entropy weight method are used to accurately quantify the probability of cloud computing security risks and the resulting losses for a comprehensive assessment of cloud computing security risks. Finally, an example is given for calculation and verification, and the deficiencies of cloud computing security risk assessment are analyzed.
Keywords: Cloud computing security, Entropy weight method, Fuzzy set theory, Hierarchical holographic modeling, Risk assessment.
Article Information
Article History:
Received Date: 19/05/2016
Revision Received Date: 08/09/2016
Acceptance Date: 09/09/2016
Electronic publication date: 31/10/2016
Collection year: 2016
© Tang et al.; Licensee Bentham Open
open-access license: This is an open access article licensed under the terms of the Creative Commons Attribution-Non-Commercial 4.0 International Public License (CC BY-NC 4.0) (
https://creativecommons.org/licenses/by-nc/4.0/legalcode), which permits unrestricted, non-commercial use, distribution and reproduction in any medium, provided the work is properly cited.
Correspondence:
Address correspondence to this author at the Information Technology Center, Hubei University of Technology, Wuhan, Hubei, 430068, China; Tel: +86 27 59750810; Fax: +86 27 59750815; E-mails: th@mail.hbut.edu.cn, tanghua_2008@163.com
Open Peer Review Details |
Manuscript submitted on 19-05-2016 |
Original Manuscript |
A Research for Cloud Computing Security Risk Assessment |