A broker-based cooperative security-SLA evaluation methodology for personal cloud computing

An underlying cloud computing feature, outsourcing of resources, makes the service-level agreement (SLA) a critical factor for quality of service (QoS), and many researchers have addressed the question of how an SLA can be evaluated. Lately, security SLAs have also received much attention to guarantee security in a user perspective and provide optimal and efficient security service in the security paradigm shifting by cloud computing, such as security as a service. The quantitative measurement of security metrics is a considerably difficult problem and might be considered one of the multi-dimensional aspects of security threats. To address these issues, we provide a novel cooperative security-SLA evaluation model for the personal cloud service environment including a multi-dimensional approach to analyze security threats depending on services type as well as a cooperative model to reach a general consensus of priorities, that is, indicators depending on services type and security metrics based on cloud brokers. Copyright © 2014 John Wiley & Sons, Ltd.

[1]  Martin Gilje Jaatun,et al.  Security in Service Level Agreements for Cloud Computing , 2011, CLOSER.

[2]  Biao Song,et al.  A market-oriented dynamic collaborative cloud services platform , 2010, Ann. des Télécommunications.

[3]  Yang Wang,et al.  On-Demand Security Architecture for Cloud Computing , 2012, Computer.

[4]  Martin Gilje Jaatun,et al.  Security SLAs for Federated Cloud Services , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[5]  Yonghua Zhu,et al.  The SLA Evaluation Model for Cloud Computing , 2013 .

[6]  Eui-Nam Huh,et al.  Threats Evaluation for SLAs in Cloud Computing , 2013 .

[7]  Thomas L. Saaty,et al.  Decision making with dependence and feedback : the analytic network process : the organization and prioritization of complexity , 1996 .

[8]  Eui-nam Huh,et al.  Personal Cloud Computing Security Framework , 2010, 2010 IEEE Asia-Pacific Services Computing Conference.

[9]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[10]  Akhil Sahai,et al.  Specifying and monitoring guarantees in commercial grids through SLA , 2003, CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings..

[11]  Mark Ryan,et al.  Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..

[12]  Eui-nam Huh,et al.  Refundable Service through Cloud Brokerage , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.

[13]  Biao Song,et al.  A novel Threat Evaluation method for privacy-aware system in RFID , 2011, Int. J. Ad Hoc Ubiquitous Comput..

[14]  Martin Gilje Jaatun,et al.  Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..

[15]  Thomas L. Saaty,et al.  How to Make a Decision: The Analytic Hierarchy Process , 1990 .