Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain

The measurement and assessment of risk is an important basis for the research of cloud computing security risk, it can provide important data for risk management decisions. However, due to the uncertainties of risk occurrences and losses, actual risk have multiple stochastic states, make the research of cloud computing risk become more difficult. In order to measure the risk and avoid the influence of subjective factors, a measurement and assessment model of cloud computing risk is established in this paper. The established model used Markov chain to describe random risk environment, and used information entropy to measure risk, effectively reduced the existing subjective factors in the assessment process, provided a practical and reliable method for risk management decisions.

[1]  Mushtaq Ahmad Security Risks of Cloud Computing and Its Emergence as 5th Utility Service , 2010, ISA.

[2]  Frank Gens,et al.  Cloud Computing Benefits, risks and recommendations for information security , 2010 .

[3]  Guiran Chang,et al.  Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments , 2011 .

[4]  Hiroyuki Sato,et al.  Risk Management on the Security Problem in Cloud Computing , 2011, 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering.

[5]  Richard Morrell,et al.  Cloud computing: new challenges and opportunities , 2011, Netw. Secur..

[6]  Wang Zhao-cheng Research on Information Security Risk Assessment Based on Cloud Computing Model , 2011 .

[7]  Liao Ming-hua An Approach for Campus Information Systems Security Risk Assessment Based on Fuzzy Set and Entropy Weight , 2013 .

[8]  Zhu Sheng Cloud Computing Security Risk Assessment Based on Level Protection Strategy , 2013 .

[9]  Liu Bao-xu Model for Cloud Computing Security Assessment Based on Classified Protection , 2013 .

[10]  X Duan Research on supply chain partner selection based on Markov chain dynamic fuzzy evaluation in cloud computing , 2014 .

[11]  H. Föllmer,et al.  Consistent Risk Measures and a non-linear Extension of Backwards Martingale Convergence. , 2015 .

[12]  Fei Xiang,et al.  A Quantitative and Qualitative Analysis-based Security Risk Assessment for Multimedia Social Networks , 2016, Int. J. Netw. Secur..

[13]  Carla Merkle Westphall,et al.  A framework and risk assessment approaches for risk-based access control in the cloud , 2016, J. Netw. Comput. Appl..

[14]  Guoyu Bai,et al.  A risk matrix analysis method based on potential risk influence: A case study on cryogenic liquid hydrogen filling system , 2016 .

[15]  Min-Shiang Hwang,et al.  A Survey of Public Auditing for Secure Data Storage in Cloud Computing , 2016, Int. J. Netw. Secur..

[16]  Latifa Ben Arfa Rabai,et al.  Comparative Study of Information Security Risk Assessment Models for Cloud Computing systems , 2016, ANT/SEIT.

[17]  Min-Shiang Hwang,et al.  A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing , 2016, Int. J. Netw. Secur..

[18]  Sovan Mitra Efficient option risk measurement with reduced model risk , 2017 .

[19]  Umesh Kumar Singh,et al.  Information Security Risk Management Framework for University Computing Environment , 2017, Int. J. Netw. Secur..

[20]  Hongbin Zhang,et al.  Access Control Based Resource Allocation in Cloud Computing Environment , 2017, Int. J. Netw. Secur..

[21]  Nicola Loperfido,et al.  Data breaches: Goodness of fit, pricing, and risk measurement , 2017 .

[22]  Myeonggil Choi The Security Risks of Cloud Computing , 2019 .