earticle

논문검색

A Security Assessment Framework and Selection Method for Outsourcing Cloud Service

초록

영어

Cloud services have become state of the art of resource sharing and interoperability among different service providers. The federated cloud seek to reduce costs and maximize efficiency, provide flexible and reliable services composed of various external cloud service and internal services, but this would introduce a risk of security due to outsourcing. For organization which provide an integrity cloud service must rely on SLA to illustrate the capacity of risk and performance, the various providers involved in the federations or services compositions should effectively distribute the organizational responsibilities and SLA. To solve the fears and deal with the threats associated with outsourcing, new method for selection of outsourcing cloud service providers(CSP) based on assessment of security and performance is urgently needed. This paper presents an approach on how to select the proper CSP to guarantee organizational SLA, which quantify the SLA terms and calculate a security weight, the organization can choose the appropriate CSP based on security weight, meanwhile minimize the business cost. This paper make contribution on modeling the capacity of the CSP, considering the business cost and historical performance. The proposed approach is validated through case study that shows selected CSP through our approach can best meet the organizational security and cost needs.

목차

Abstract
 1. Introduction
 2. Motivation Scenario
 3. Selection Method
 4. Security Assessment Framework
  4.1. Risk Assessment
  4.2. Trust Assessment
  4.3. Security Assessment
 5. Evaluation
  5.1. Case Study about Security Assessment
  5.2. Comparing with Others
 6. Conclusion
 Acknowledgements
 References

저자정보

  • Xiaochen Liu Beijing Key Laboratory of Network Technology, School of Computer Science and Engineering, Beihang University, China
  • Chunhe Xia Beijing Key Laboratory of Network Technology, School of Computer Science and Engineering, Beihang University, China
  • Jiajin Cao Beijing Key Laboratory of Network Technology, School of Computer Science and Engineering, Beihang University, China
  • Jinghua Gao Beijing Key Laboratory of Network Technology, School of Computer Science and Engineering, Beihang University, China
  • Zhao Wei Lenovo Corporate Research & Development, Subsystem Research Lab,China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.