基于规则的云服务器风险评估数学模型

Akash Devgun
{"title":"基于规则的云服务器风险评估数学模型","authors":"Akash Devgun","doi":"10.1109/ICECCE.2014.7086617","DOIUrl":null,"url":null,"abstract":"When the communication is performed publicly one of the major challenges is the reliability of the communication. When this communication is performed on a cloud like distributed system where all services, products and infrastructure is available publicly with personal access capabilities, the reliability factor becomes more critical. The reliability itself is a complex form of measurement that includes the security, efficiency and the satisfaction level for the customer. In this presented work, a secure and reliable access over the cloud is being presented where different degree of reliability can be achieved by the customer. The presented work is a middle layer architecture where multiple clients are connected with reliability layer as the middle layer to access the multiple clouds. At the time of registration, users can opt the degree of reliability required by selecting the access degree. Based on this requirement, the security level and the cost of the cloud access will be decided. The presented work is the dynamic security structure specification in which all the reliability vectors are divided under 10 reliability features. These features include three main aspects called authenticity, control and availability. The authenticity is here being opted in form of single password authentication, generic authentication, code based authentication. The control is here defined in terms of public key secure data communication, private key secured communication, and tunnel based communication. The availability vector basically defines the authentication required for restricted area access, session based access or all page access. Each vector will be assigned by different cost and weightage vectors. Once the weightage and the cost will be assigned to the system, the fuzzy based analysis will be performed to identify the cost and risk vector over the system in a nominal form. Once a user is registered to the system, he has to select the degree of reliability based on which the security level and the cost of security will be decided for the users. The presented work is implemented in Java environment. The obtained results show the effective cloud security assessment and user security role assignment.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A rule based mathematical model to improve risk assessment on cloud server\",\"authors\":\"Akash Devgun\",\"doi\":\"10.1109/ICECCE.2014.7086617\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"When the communication is performed publicly one of the major challenges is the reliability of the communication. When this communication is performed on a cloud like distributed system where all services, products and infrastructure is available publicly with personal access capabilities, the reliability factor becomes more critical. The reliability itself is a complex form of measurement that includes the security, efficiency and the satisfaction level for the customer. In this presented work, a secure and reliable access over the cloud is being presented where different degree of reliability can be achieved by the customer. The presented work is a middle layer architecture where multiple clients are connected with reliability layer as the middle layer to access the multiple clouds. At the time of registration, users can opt the degree of reliability required by selecting the access degree. Based on this requirement, the security level and the cost of the cloud access will be decided. The presented work is the dynamic security structure specification in which all the reliability vectors are divided under 10 reliability features. These features include three main aspects called authenticity, control and availability. The authenticity is here being opted in form of single password authentication, generic authentication, code based authentication. The control is here defined in terms of public key secure data communication, private key secured communication, and tunnel based communication. The availability vector basically defines the authentication required for restricted area access, session based access or all page access. Each vector will be assigned by different cost and weightage vectors. Once the weightage and the cost will be assigned to the system, the fuzzy based analysis will be performed to identify the cost and risk vector over the system in a nominal form. Once a user is registered to the system, he has to select the degree of reliability based on which the security level and the cost of security will be decided for the users. The presented work is implemented in Java environment. The obtained results show the effective cloud security assessment and user security role assignment.\",\"PeriodicalId\":223751,\"journal\":{\"name\":\"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECCE.2014.7086617\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCE.2014.7086617","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

当通信公开进行时,主要的挑战之一是通信的可靠性。当这种通信在类似云的分布式系统上执行时,所有服务、产品和基础设施都是公开可用的,具有个人访问功能,可靠性因素变得更加关键。可靠性本身是一种复杂的测量形式,包括安全性、效率和客户满意度。在本文中,介绍了一种安全可靠的云访问方式,其中客户可以实现不同程度的可靠性。提出的工作是一个中间层架构,其中多个客户端以可靠性层作为中间层连接以访问多个云。在注册时,用户可以通过选择访问程度来选择所需的可靠性程度。基于这一需求,将决定云访问的安全级别和成本。本文的工作是动态安全结构规范,其中所有的可靠性向量被划分为10个可靠性特征。这些特性包括三个主要方面,即真实性、控制性和可用性。其真实性主要有单密码认证、通用认证和基于代码的认证三种形式。这里根据公钥安全数据通信、私钥安全通信和基于隧道的通信来定义控制。可用性向量基本上定义了受限区域访问、基于会话的访问或所有页面访问所需的身份验证。每个向量将被分配不同的成本和权重向量。一旦将权重和成本分配给系统,将执行基于模糊的分析,以名义形式确定系统的成本和风险向量。一旦用户注册到系统,他必须选择可靠性程度,以此为基础为用户决定安全级别和安全成本。本文工作是在Java环境中实现的。结果表明,该方法能够有效地进行云安全评估和用户安全角色分配。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A rule based mathematical model to improve risk assessment on cloud server
When the communication is performed publicly one of the major challenges is the reliability of the communication. When this communication is performed on a cloud like distributed system where all services, products and infrastructure is available publicly with personal access capabilities, the reliability factor becomes more critical. The reliability itself is a complex form of measurement that includes the security, efficiency and the satisfaction level for the customer. In this presented work, a secure and reliable access over the cloud is being presented where different degree of reliability can be achieved by the customer. The presented work is a middle layer architecture where multiple clients are connected with reliability layer as the middle layer to access the multiple clouds. At the time of registration, users can opt the degree of reliability required by selecting the access degree. Based on this requirement, the security level and the cost of the cloud access will be decided. The presented work is the dynamic security structure specification in which all the reliability vectors are divided under 10 reliability features. These features include three main aspects called authenticity, control and availability. The authenticity is here being opted in form of single password authentication, generic authentication, code based authentication. The control is here defined in terms of public key secure data communication, private key secured communication, and tunnel based communication. The availability vector basically defines the authentication required for restricted area access, session based access or all page access. Each vector will be assigned by different cost and weightage vectors. Once the weightage and the cost will be assigned to the system, the fuzzy based analysis will be performed to identify the cost and risk vector over the system in a nominal form. Once a user is registered to the system, he has to select the degree of reliability based on which the security level and the cost of security will be decided for the users. The presented work is implemented in Java environment. The obtained results show the effective cloud security assessment and user security role assignment.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Performance comparison of GTS mechanism enabled IEEE 802.15.4 based Wireless Sensor Networks using LAR and DYMO protocol PLC based controller simulation for Raytheon precision laser driller/welder Automated vigilant transportation system for minimizing the Road accidents Reconfigurable Solar Converter for PV battery application Acoustic Echo Cancellation using time and frequency domain adaptive filter methods on Tms320c6713dsk
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1