Trusted cloud service selection method based on risk assessment, cloud system, and cloud server

A risk assessment and service selection technology, applied in the field of cloud service security, can solve data confidentiality, security, privacy, controllability is difficult to control, hinder the application and promotion of cloud services, unwilling to use cloud services, etc. Achieve the effect of realizing credibility and effectiveness, improving safety and credibility, and increasing trust

Inactive Publication Date: 2017-10-13
XIAN UNIV OF FINANCE & ECONOMICS
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] To sum up, the problem existing in the existing technology is: in actual cloud computing applications, although cloud system resources are abundant and there are various types of cloud services, because cloud services require users to hand over data to cloud services for processing or storage, this means It is difficult for users to control the confidentiality, security, privacy, and controllability of data stored in the cloud, so it is difficult for users to truly trust cloud services. In addition, as the number of cloud service providers continues to increase in recent years, Faced with many cloud service providers, it is difficult for users to judge whether the cloud services provided by them are safe and suitable for them. Users become hesitant to choose cloud services, or even unwilling to use cloud services, which seriously hinders the application and promotion of cloud services.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted cloud service selection method based on risk assessment, cloud system, and cloud server
  • Trusted cloud service selection method based on risk assessment, cloud system, and cloud server
  • Trusted cloud service selection method based on risk assessment, cloud system, and cloud server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032]In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0033] The present invention first establishes a risk assessment model, takes the confidentiality, integrity and availability indicators of the trusted cloud service as the input of the risk model, calculates the risk value of the cloud service, and inputs the risk value into the trust model as the cloud service trust factor, and finally Output the trust value of each cloud service as the basis for users to choose cloud services.

[0034] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0035] Such as figure 1 As shown, the method for sele...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of cloud service security, and discloses a trusted cloud service selection method based on risk assessment, a cloud system, and a cloud server. Starting from the perspective of risk assessment, the confidentiality, integrity, availability and controllability indexes of a cloud service are input as risk factors to calculate the risk assessment value of the cloud service. The risk assessment value is input to a trust model as one of evaluation indexes affecting the credibility of the cloud service to calculate the trust value of the cloud service. Risk assessment is introduced to a cloud service trust model. On one hand, the security of cloud services can be measured, and the credibility of cloud service providers can be assessed more comprehensively. On the other hand, cloud service providers can develop effective strategies according to the risk assessment results in order to reduce the possibility of security threats, improve the security and credibility of cloud services, and increase the trust degree of cloud users to cloud services, and cloud users can select more credible cloud service providers according to the trust values to realize credible and effective cloud service selection.

Description

technical field [0001] The invention belongs to the technical field of cloud service security, and in particular relates to a method for selecting a trusted cloud service based on risk assessment, a cloud system and a cloud server. Background technique [0002] By integrating distributed resources, cloud computing builds a computing environment that responds to multiple service requirements, meets user customization requirements, and can access its corresponding service resources through the network. The characteristics of cloud computing for resource sharing and efficient utilization have attracted the attention of more and more enterprises, freeing them from the heavy pressure of IT infrastructure management and maintenance, and focusing more on their core business development. However, due to the breadth, dynamics, distribution, virtualization, and storage transparency of cloud computing, it is difficult for cloud users to know which nodes their own data and applications ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06G06Q10/06G06Q50/30
CPCG06Q10/0635G06Q10/0639G06Q50/30H04L63/20H04L67/10
Inventor 赵蕾苏荟王刚向新银王浩鸣
Owner XIAN UNIV OF FINANCE & ECONOMICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products