Title :
Research on security evaluation of cloud computing based on attack graph
Author :
Yexia Cheng ; Yuejin Du ; JunFeng Xu ; Chunyang Yuan ; Zhi Xue
Author_Institution :
Sch. of Inf. Security Eng., Shanghai Jiaotong Univ., Shanghai, China
fDate :
Oct. 30 2012-Nov. 1 2012
Abstract :
Cloud computing is becoming more and more popular and its security is arising as well. In order to solve security issues and take security evaluation in cloud computing, its corresponding hierarchical security design model is introduced and an approach of security evaluation based on attack graph is proposed in cloud computing environment. Firstly, network threat model and automatic methods are presented to get information for generating attack graph automatically. By using symbolic model checking algorithm, attack graph is generated and visualized. Then, by combining the characteristics of Markov Chain with attack graph, two security evaluation metrics are proposed in cloud computing. They can be used for security evaluation, security hardness and give security suggestions in cloud computing.
Keywords :
Markov processes; cloud computing; formal verification; graph theory; security of data; Markov chain characteristics; attack graph; automatic methods; cloud computing environment; hierarchical security design model; network threat model; security evaluation metrics; security hardness; symbolic model checking algorithm; Cloud computing; Computational modeling; Data mining; Data structures; Markov processes; Network topology; Security; Markov Chain; attack graph; cloud computing; cloud security; security evaluation;
Conference_Titel :
Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd International Conference on
Conference_Location :
Hangzhou
Print_ISBN :
978-1-4673-1855-6
DOI :
10.1109/CCIS.2012.6664448