DocumentCode :
3586010
Title :
A rule based mathematical model to improve risk assessment on cloud server
Author :
Devgun, Akash
Author_Institution :
Comput. Sci. Eng., Nat. Inst. of Technol., Jalandhar, India
fYear :
2014
Firstpage :
226
Lastpage :
231
Abstract :
When the communication is performed publicly one of the major challenges is the reliability of the communication. When this communication is performed on a cloud like distributed system where all services, products and infrastructure is available publicly with personal access capabilities, the reliability factor becomes more critical. The reliability itself is a complex form of measurement that includes the security, efficiency and the satisfaction level for the customer. In this presented work, a secure and reliable access over the cloud is being presented where different degree of reliability can be achieved by the customer. The presented work is a middle layer architecture where multiple clients are connected with reliability layer as the middle layer to access the multiple clouds. At the time of registration, users can opt the degree of reliability required by selecting the access degree. Based on this requirement, the security level and the cost of the cloud access will be decided. The presented work is the dynamic security structure specification in which all the reliability vectors are divided under 10 reliability features. These features include three main aspects called authenticity, control and availability. The authenticity is here being opted in form of single password authentication, generic authentication, code based authentication. The control is here defined in terms of public key secure data communication, private key secured communication, and tunnel based communication. The availability vector basically defines the authentication required for restricted area access, session based access or all page access. Each vector will be assigned by different cost and weightage vectors. Once the weightage and the cost will be assigned to the system, the fuzzy based analysis will be performed to identify the cost and risk vector over the system in a nominal form. Once a user is registered to the system, he has to select the degree of reliability based on whic- the security level and the cost of security will be decided for the users. The presented work is implemented in Java environment. The obtained results show the effective cloud security assessment and user security role assignment.
Keywords :
Java; cloud computing; fuzzy set theory; risk management; security of data; vectors; Java environment; all page access; availability vector; cloud like distributed system; cloud security assessment; cloud server; code based authentication; communication reliability; cost vector; dynamic security structure specification; fuzzy based analysis; generic authentication; middle layer architecture; password authentication; private key secured communication; public key secure data communication; reliability layer; restricted area access; risk assessment; risk vector; rule based mathematical model; secure cloud access; session based access; tunnel based communication; user security role assignment; Authentication; Computational modeling; Estimation; Mathematical model; Reliability; Servers; Authentication; Cloud Security; Reliability; assessment;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electronics,Communication and Computational Engineering (ICECCE), 2014 International Conference on
Type :
conf
DOI :
10.1109/ICECCE.2014.7086617
Filename :
7086617
Link To Document :
بازگشت