Cloud computing risk assessment method based on game theory

As a product of the development of the Internet, security issues of cloud computing has attracted much attention whether it is from the cloud providers' point of view or from the perspective of cloud users. From the view of information security, risk assessment model is established in this paper using game theory, which involves the damage and the restore of the cloud system. Using the framework, the interaction between attacker and defender has been analysed and risk assessment of vulnerable points in cloud environment is conducted.

[1]  Ben Walters,et al.  QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[2]  Ibrahim Sogukpinar,et al.  Scalable risk assessment method for cloud computing using game theory (CCRAM) , 2015, Comput. Stand. Interfaces.

[3]  Mohamed Cheriet,et al.  Cloud Computing: A Risk Assessment Model , 2014, 2014 IEEE International Conference on Cloud Engineering.

[4]  Liu Dong,et al.  The New Risk Assessment Model for Information System in Cloud Computing Environment , 2011 .

[5]  Zhang Jin Rough Network Security Analysis Model Based on Dynamic Game , 2015 .

[6]  Karim Djemame,et al.  Towards a Service Lifecycle Based Methodology for Risk Assessment in Cloud Computing , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.