DocumentCode :
2240275
Title :
Research on security evaluation of cloud computing based on attack graph
Author :
Yexia Cheng ; Yuejin Du ; JunFeng Xu ; Chunyang Yuan ; Zhi Xue
Author_Institution :
Sch. of Inf. Security Eng., Shanghai Jiaotong Univ., Shanghai, China
fYear :
2012
fDate :
Oct. 30 2012-Nov. 1 2012
Firstpage :
459
Lastpage :
465
Abstract :
Cloud computing is becoming more and more popular and its security is arising as well. In order to solve security issues and take security evaluation in cloud computing, its corresponding hierarchical security design model is introduced and an approach of security evaluation based on attack graph is proposed in cloud computing environment. Firstly, network threat model and automatic methods are presented to get information for generating attack graph automatically. By using symbolic model checking algorithm, attack graph is generated and visualized. Then, by combining the characteristics of Markov Chain with attack graph, two security evaluation metrics are proposed in cloud computing. They can be used for security evaluation, security hardness and give security suggestions in cloud computing.
Keywords :
Markov processes; cloud computing; formal verification; graph theory; security of data; Markov chain characteristics; attack graph; automatic methods; cloud computing environment; hierarchical security design model; network threat model; security evaluation metrics; security hardness; symbolic model checking algorithm; Cloud computing; Computational modeling; Data mining; Data structures; Markov processes; Network topology; Security; Markov Chain; attack graph; cloud computing; cloud security; security evaluation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd International Conference on
Conference_Location :
Hangzhou
Print_ISBN :
978-1-4673-1855-6
Type :
conf
DOI :
10.1109/CCIS.2012.6664448
Filename :
6664448
Link To Document :
بازگشت