Skip to main content
Top

2013 | OriginalPaper | Chapter

A Method for Security Evaluation in Cloud Computing Based on Petri Behavioral Profiles

Authors : Xianwen Fang, Mimi Wang, Shenbing Wu

Published in: Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

To solve the problem of security evaluation in cloud computing, the modeling and analyzing methods of security evaluation about cloud computing are very important. Firstly, extending behavioral profiles into comprehensive behavioral profiles. Then, studying the degree of keeping consistent behavior relation which looks as the objective evaluation function based on comprehensive behavioral profiles. Finally, using behavioral theory of Petri Net to solve the evaluation function, a new method for security evaluation in cloud computing is proposed. The theoretical analysis and specific example show that the method is very effective.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Daniel JA (2009) Data management in the cloud: limitations and opportunities. IEEE Data Eng Bull 32:3–12 Daniel JA (2009) Data management in the cloud: limitations and opportunities. IEEE Data Eng Bull 32:3–12
2.
go back to reference Ristov S, Gusev M, Kostoska M (2012) A new methodology for security evaluation in cloud computing. In: Ristov S, Gusev M, Kostoska M 35th international convention on information and communication technology, electronics and microelectronics. IEEE, Piscataway, NJ, USA, pp 1484–1489 Ristov S, Gusev M, Kostoska M (2012) A new methodology for security evaluation in cloud computing. In: Ristov S, Gusev M, Kostoska M 35th international convention on information and communication technology, electronics and microelectronics. IEEE, Piscataway, NJ, USA, pp 1484–1489
3.
go back to reference Dawei S, Guiran C, Lina S, Fengyun L, Xingwei W (2011) A dynamic multi-dimensional trust evaluation model to enhance security of cloud computing environments. Int J Innovative Comput Appl 3:200–212CrossRef Dawei S, Guiran C, Lina S, Fengyun L, Xingwei W (2011) A dynamic multi-dimensional trust evaluation model to enhance security of cloud computing environments. Int J Innovative Comput Appl 3:200–212CrossRef
4.
go back to reference Wei W, Guosun Z, Junqi Z, Daizhong T (2012) Dynamic trust evaluation and scheduling framework for cloud computing. Secur Commun Netw 5:311–318CrossRef Wei W, Guosun Z, Junqi Z, Daizhong T (2012) Dynamic trust evaluation and scheduling framework for cloud computing. Secur Commun Netw 5:311–318CrossRef
5.
go back to reference Qiang G, Dawei S, Guiran, C, Lina S, Xingwei W (2011) Modeling and evaluation of trust in cloud computing environments. In: Proceedings of the 2011 3rd international conference on advanced computer control (ICACC 2011). doi:10.1109/ICACC.2011.6016378 Qiang G, Dawei S, Guiran, C, Lina S, Xingwei W (2011) Modeling and evaluation of trust in cloud computing environments. In: Proceedings of the 2011 3rd international conference on advanced computer control (ICACC 2011). doi:10.​1109/​ICACC.​2011.​6016378
7.
go back to reference Hyukho K, Hana L, Woongsup K, Yangwoo K (2010) A trust evaluation model for QoS guarantee in Cloud systems. Grid Distrib Comput 3:1–10MATH Hyukho K, Hana L, Woongsup K, Yangwoo K (2010) A trust evaluation model for QoS guarantee in Cloud systems. Grid Distrib Comput 3:1–10MATH
8.
9.
go back to reference Fang XW, Jiang CJ, Yin ZX (2011) The trustworthiness analyzing of interacting business process based on the induction information. Comput Sci Inf Syst 8:843–867CrossRef Fang XW, Jiang CJ, Yin ZX (2011) The trustworthiness analyzing of interacting business process based on the induction information. Comput Sci Inf Syst 8:843–867CrossRef
10.
go back to reference Matthias W, Jan M (2012) Perceived consistency between process models. Inf Syst 37:80–98CrossRef Matthias W, Jan M (2012) Perceived consistency between process models. Inf Syst 37:80–98CrossRef
11.
go back to reference Matthias W, Artem P, Nirmit DI, Jan M, Mathias W (2011) Process compliance analysis based on behavioural profiles. Inf Syst 36:1009–1025CrossRef Matthias W, Artem P, Nirmit DI, Jan M, Mathias W (2011) Process compliance analysis based on behavioural profiles. Inf Syst 36:1009–1025CrossRef
12.
go back to reference Matthias W, Holger Z, Jan M (2011) Optimizing complex event queries over business processes using behavioural Profiles. In: Matthias W, Holger Z, Jan M, ZurMuehlen M, Su JW Lecture notes in business information processing. Springer, Heidelberg, pp 743–754 Matthias W, Holger Z, Jan M (2011) Optimizing complex event queries over business processes using behavioural Profiles. In: Matthias W, Holger Z, Jan M, ZurMuehlen M, Su JW Lecture notes in business information processing. Springer, Heidelberg, pp 743–754
13.
go back to reference Matthias W, Jan M, Mathias W (2011) Efficient consistency measurement based on behavioral profiles of process models. IEEE Trans Softw Eng 37:3410–3429 Matthias W, Jan M, Mathias W (2011) Efficient consistency measurement based on behavioral profiles of process models. IEEE Trans Softw Eng 37:3410–3429
Metadata
Title
A Method for Security Evaluation in Cloud Computing Based on Petri Behavioral Profiles
Authors
Xianwen Fang
Mimi Wang
Shenbing Wu
Copyright Year
2013
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-642-37502-6_71

Premium Partner