Cloud configuration safety assessment method

A security assessment and security technology, applied in the field of cloud computing security, can solve the problem of no cloud architecture security assessment mechanism, no hierarchical analysis of cloud platform security, etc., to improve development quality, facilitate mathematical analysis, and simplify calculations.

Inactive Publication Date: 2015-09-02
TIANJIN UNIV
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is currently no sufficiently comprehensive cloud architecture security assessment mechanism
Although many scholars at home and abroad have carried out a lot of related work on cloud security evaluation and credibility evaluation in recent years, there is a common problem in their research work: there is no layered analysis of cloud platform security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud configuration safety assessment method
  • Cloud configuration safety assessment method
  • Cloud configuration safety assessment method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. If there are exemplary contents in these embodiments, they should not be construed as limiting the present invention.

[0029] The present invention is evaluated with the Google cloud platform as a specific embodiment. Select Google Compute Engine as the instance of the IaaS layer, Google App Engine as the instance of the PaaS layer, and Google Apps as the instance of the SaaS layer. First use the security evaluation model of each layer of service architecture, and then use the overall security evaluation model of the cloud platform to finally obtain the overall security value of the cloud platform architecture.

[0030] 1. IaaS instance analysis (Google Compute Engine)

[0031] First, analyze the security issues of GCE and the corresponding security evidence, including:

[0032] Virtual machine security issues: the reliability of the virtual ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud configuration safety assessment method. The cloud configuration safety assessment method comprises the following steps: (1), performing qualitative and quantitative analyzing on security problems and security evidences in the hierarchical structure of each service configuration including an IaaS layer, a Paas layer and an Saas layer; (2), assessing the security of each service configuration of a cloud platform; and (3), assessing the overall security of the cloud platform, establishing a first-level cloud security assessment model by use of a Sugeno fuzzy inference system based on an adaptive neural network, and analyzing the overall security of the cloud platform. Compared to the prior art, the number of users accessed to a network end is dynamically and reasonably controlled, loads accessed to the network end are always maintained within a certain acceptable scope, the users can be dispersed when a large number of users are simultaneously accessed to a network at the same frequency, the users can be accessed to the network as soon as possible, and the system random access performance in case of network congestion is greatly improved.

Description

technical field [0001] The invention relates to the field of cloud computing security, in particular to a method for evaluating the security of cloud architecture. Background technique [0002] According to the definition of NIST (National Institute of Standards and Technology), cloud computing is a mode that can obtain computing resources and improve their availability through the network in a convenient and pay-as-you-go manner. Computing resources include networks, servers, storage, applications, and services. These resources come from a shared, configurable resource pool, and can be acquired and released with the least effort and human intervention. [0003] More specifically, according to the types of services provided by the cloud computing platform, the three-tier architecture of the cloud computing platform is defined as follows: infrastructure as a service (IaaS), the ability provided to users is that the cloud provides processing, storage, network, and other basic ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/20H04L67/10
Inventor 李晓红白裕德孙达志许光全韩卓兵经雅婷
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products