{"title":"基于规则的云服务器风险评估数学模型","authors":"Akash Devgun","doi":"10.1109/ICECCE.2014.7086617","DOIUrl":null,"url":null,"abstract":"When the communication is performed publicly one of the major challenges is the reliability of the communication. When this communication is performed on a cloud like distributed system where all services, products and infrastructure is available publicly with personal access capabilities, the reliability factor becomes more critical. The reliability itself is a complex form of measurement that includes the security, efficiency and the satisfaction level for the customer. In this presented work, a secure and reliable access over the cloud is being presented where different degree of reliability can be achieved by the customer. The presented work is a middle layer architecture where multiple clients are connected with reliability layer as the middle layer to access the multiple clouds. At the time of registration, users can opt the degree of reliability required by selecting the access degree. Based on this requirement, the security level and the cost of the cloud access will be decided. The presented work is the dynamic security structure specification in which all the reliability vectors are divided under 10 reliability features. These features include three main aspects called authenticity, control and availability. The authenticity is here being opted in form of single password authentication, generic authentication, code based authentication. The control is here defined in terms of public key secure data communication, private key secured communication, and tunnel based communication. The availability vector basically defines the authentication required for restricted area access, session based access or all page access. Each vector will be assigned by different cost and weightage vectors. Once the weightage and the cost will be assigned to the system, the fuzzy based analysis will be performed to identify the cost and risk vector over the system in a nominal form. Once a user is registered to the system, he has to select the degree of reliability based on which the security level and the cost of security will be decided for the users. The presented work is implemented in Java environment. The obtained results show the effective cloud security assessment and user security role assignment.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A rule based mathematical model to improve risk assessment on cloud server\",\"authors\":\"Akash Devgun\",\"doi\":\"10.1109/ICECCE.2014.7086617\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"When the communication is performed publicly one of the major challenges is the reliability of the communication. When this communication is performed on a cloud like distributed system where all services, products and infrastructure is available publicly with personal access capabilities, the reliability factor becomes more critical. The reliability itself is a complex form of measurement that includes the security, efficiency and the satisfaction level for the customer. In this presented work, a secure and reliable access over the cloud is being presented where different degree of reliability can be achieved by the customer. The presented work is a middle layer architecture where multiple clients are connected with reliability layer as the middle layer to access the multiple clouds. At the time of registration, users can opt the degree of reliability required by selecting the access degree. Based on this requirement, the security level and the cost of the cloud access will be decided. The presented work is the dynamic security structure specification in which all the reliability vectors are divided under 10 reliability features. These features include three main aspects called authenticity, control and availability. The authenticity is here being opted in form of single password authentication, generic authentication, code based authentication. The control is here defined in terms of public key secure data communication, private key secured communication, and tunnel based communication. The availability vector basically defines the authentication required for restricted area access, session based access or all page access. Each vector will be assigned by different cost and weightage vectors. Once the weightage and the cost will be assigned to the system, the fuzzy based analysis will be performed to identify the cost and risk vector over the system in a nominal form. Once a user is registered to the system, he has to select the degree of reliability based on which the security level and the cost of security will be decided for the users. The presented work is implemented in Java environment. The obtained results show the effective cloud security assessment and user security role assignment.\",\"PeriodicalId\":223751,\"journal\":{\"name\":\"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECCE.2014.7086617\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCE.2014.7086617","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A rule based mathematical model to improve risk assessment on cloud server
When the communication is performed publicly one of the major challenges is the reliability of the communication. When this communication is performed on a cloud like distributed system where all services, products and infrastructure is available publicly with personal access capabilities, the reliability factor becomes more critical. The reliability itself is a complex form of measurement that includes the security, efficiency and the satisfaction level for the customer. In this presented work, a secure and reliable access over the cloud is being presented where different degree of reliability can be achieved by the customer. The presented work is a middle layer architecture where multiple clients are connected with reliability layer as the middle layer to access the multiple clouds. At the time of registration, users can opt the degree of reliability required by selecting the access degree. Based on this requirement, the security level and the cost of the cloud access will be decided. The presented work is the dynamic security structure specification in which all the reliability vectors are divided under 10 reliability features. These features include three main aspects called authenticity, control and availability. The authenticity is here being opted in form of single password authentication, generic authentication, code based authentication. The control is here defined in terms of public key secure data communication, private key secured communication, and tunnel based communication. The availability vector basically defines the authentication required for restricted area access, session based access or all page access. Each vector will be assigned by different cost and weightage vectors. Once the weightage and the cost will be assigned to the system, the fuzzy based analysis will be performed to identify the cost and risk vector over the system in a nominal form. Once a user is registered to the system, he has to select the degree of reliability based on which the security level and the cost of security will be decided for the users. The presented work is implemented in Java environment. The obtained results show the effective cloud security assessment and user security role assignment.