Risk Situation Assessment Model Based on Interdomain Interaction in Cloud Computing Environment

With the widespread application of cloud computing sharing technology, the demand for cross-domain interaction is also increasing. However, due to the uncertainty of interaction behaviour and the difference of network service quality, the risk of cross-domain interaction cannot be accurately evaluated. Therefore, this paper proposes a risk situation evaluation model based on interdomain interactions. The model collects interactive credentials such as the frequency, credibility, and time-effectiveness of the user-submitted evaluations. At the same time, it collects the evaluation of quality of service provided by the network security domain. Then, we set up a risk evaluation equation based on the interaction credentials to implement the risk evaluation of cross-domain interaction behaviour. Finally, we apply MATLAB platform to simulate the evolution process of evaluation. The experimental results show that, compared with other models, the evaluation method proposed in this paper improves the accuracy of the evaluation results and meets the security requirements of multidomain interaction.

[1]  Jiao Wang,et al.  A Method for Information Security Risk Assessment Based on the Dynamic Bayesian Network , 2016, 2016 International Conference on Networking and Network Applications (NaNA).

[2]  Hai Yan Chen,et al.  Research on Information Security Risk Assessment Based on Discrete Dynamic Bayesian Network , 2014 .

[3]  Eui-nam Huh,et al.  mCSQAM: Service Quality Assessment Model in Mobile Cloud Services Environment , 2016, Mob. Inf. Syst..

[4]  Kijoon Chae,et al.  Non-redundant indirect trust search algorithm based on a cross-domain trust model in content delivery network , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[5]  Claude Godart,et al.  Enhancing Access-Control with Risk-Metrics for Collaboration on Social Cloud-Platforms , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[6]  Xi Hai-lon Simulation of Classification Optimization Model in Malicious Network Software Behavior Assessment , 2015 .

[7]  Hongbin Zhang,et al.  A Multi-Level Security Access Control Framework for Cross-Domain Networks , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[8]  M. Sasikumar,et al.  Trust Model for Measuring Security Strength of Cloud Computing Service , 2015 .

[9]  Guo Yu-cui Trust management model based on value-at-risk evaluation with changing time in P2P network , 2012 .

[10]  Zhou Guo Trust Evaluation Model Based on Role Separation , 2012 .

[11]  Mohamed Cheriet,et al.  Cloud Computing: A Risk Assessment Model , 2014, 2014 IEEE International Conference on Cloud Engineering.

[12]  Zhan Zhang,et al.  Research on a Risk Assessment Method considering Risk Association , 2016 .

[13]  Jing Hu,et al.  Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[14]  Bin Zhao,et al.  Towards more pro-active access control in computer systems and networks , 2015, Comput. Secur..

[15]  Zou Xiang Cross-domain role mapping method based on IRBAC , 2010 .

[16]  Juan-Luis Gorricho,et al.  Fuzzy System of Irrigation Applied to the Growth of Habanero Pepper (Capsicum chinense Jacq.) under Protected Conditions in Yucatan, Mexico , 2015, Int. J. Distributed Sens. Networks.

[17]  Qiang Liu,et al.  A Credible Bayesian-Based Trust Management Scheme for Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[18]  Weisong Shi,et al.  TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks , 2010, EWSN.

[19]  Xiangjun Li,et al.  Service Dynamic Trust Evaluation Model based on Bayesian Network in Distributed Computing Environment , 2015 .

[20]  Qing-Kai Zeng,et al.  Trust Evaluation Model Based on Role Separation: Trust Evaluation Model Based on Role Separation , 2014 .

[21]  Fengli Zhang,et al.  A Dynamic Access Control Model for Spatial Data , 2016, 2016 12th International Conference on Computational Intelligence and Security (CIS).

[22]  Paul D. Manuel,et al.  A trust model of cloud computing based on Quality of Service , 2015, Ann. Oper. Res..

[23]  Zhao Bin,et al.  Designs and Simulations of Multi-factor in Trust Evaluation , 2015 .

[24]  Carla Merkle Westphall,et al.  A framework and risk assessment approaches for risk-based access control in the cloud , 2016, J. Netw. Comput. Appl..

[25]  Zhenyu Liu,et al.  An Efficient Dynamic Trust Evaluation Model for Wireless Sensor Networks , 2017, J. Sensors.