IIM  Vol.7 No.4 , July 2015
Development of Fuzzy Risk Calculation Method for a Dynamic Federation of Clouds
ABSTRACT
This paper suggests an approach for providing the dynamic federations of clouds. The approach is based on risk assessment technology and implements cloud federations without consideration of identity federations. Here, for solving this problem, first of all, important factors which are capable of seriously influencing the information security level of clouds are selected and then hierarchical risk assessment architecture is proposed based on these factors. Then, cloud provider’s risk priority vectors are formed by applying the AHP methodology and fuzzy logic excerpt type risk evaluation is carried out based on this vector.

Cite this paper
Alguliyev, R. and Abdullayeva, F. (2015) Development of Fuzzy Risk Calculation Method for a Dynamic Federation of Clouds. Intelligent Information Management, 7, 230-241. doi: 10.4236/iim.2015.74018.
References
[1]   Alguliev, R.M. and Abdullayeva, F.C. (2013) Identity Management Based Security Architecture of Cloud Computing on Multi-Agent Systems. Proceedings of the Third International Conference on Innovative Computing Technology (INTECH), London, 29-31 August 2013, 123-126.
http://dx.doi.org/10.1109/INTECH.2013.6653643

[2]   ∂liquliyev, R.M. and Abdullayeva, F.C. (2013) Bulud texnologiyalarinin t∂hlük∂sizlik probleml∂rinin t∂dqiqi v∂analizi. informasiya Texnologiyalari Probleml∂ri, 1, 3-14.

[3]   Carlini, E., Coppola, M., Dazzi, P., Ricci, L. and Righetti, G., (2012) Cloud Federations in Contrail. Euro-Par 2011: Parallel Processing Workshops, 7155, 159-168.

[4]   Rochwerger, B. (2009) The Reservoir Model and Architecture for Open Federated Cloud Computing. IBM Journal of Research and Development, 53, 535-545.
http://dx.doi.org/10.1147/JRD.2009.5429058

[5]   Buyya, R., Broberg, J. and Goscinski, A. (2011) Cloud Computing: Principles and Paradigms. John Wiley & Sons Inc., Hoboken. http://dx.doi.org/10.1002/9780470940105

[6]   Maler, E. and Reed, D. (2008) The Venn of Identity: Options and Issues in Federated Identity Management. IEEE Security & Privacy, 6, 16-23. http://dx.doi.org/10.1109/MSP.2008.50

[7]   Santos, D.R., Westphall, C.M. and Westphall, C.B. (2013) Risk-Based Dynamic Access Control for a Highly Scalable Cloud Federation. Proceedings of the Seventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2013), Barcelona, 25-31 August 2013, 8-13.

[8]   Cabarcos, P.A. (2011) Risk Assessment for Better Identity Management in Pervasive Environments. Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Seattle, 21-25 March 2011, 389-390.
http://dx.doi.org/10.1109/PERCOMW.2011.5766913

[9]   ETSI GS INS 004 (2010) Identity and Access Management for Networks and Services; Dynamic Federation Negotiation and Trust Management in IdM Systems.

[10]   Cabarcos, P.A., Marín, A.L., Sánchez, R.G., Almenares, F.M. and Sánchez, D.D. (2012) A Metric-Based Approach to Assess Risk for on Cloud Federated Identity Management. Journal of Network and Systems Management, 20, 513-533. http://dx.doi.org/10.1007/s10922-012-9244-2

[11]   Cloud Security Aliance (CSA) https://cloudsecurityalliance.org

[12]   ENISA (2009) Benefits, Risks and Recommendations for Information Security.

[13]   Latif, R., Abbas, H., Assar, S. and Ali, Q. (2014) Cloud Computing Risk Assessment: A Systematic Literature Review. Future Information Technology. Lecture Notes in Electrical Engineering, 276, 285-295.http://dx.doi.org/10.1007/978-3-642-40861-8_42

[14]   Ammar, F.B., Hafsa, I.H. and Ouni, F. (2011) Analytic Hierarchical Process for Multicriteria Decision Making in design of Flying Voltage Source Multilevel Inverters. European Journal of Electrical Engineering, 14, 719-756.http://dx.doi.org/10.3166/ejee.14.719-756

[15]   Nataraj, S. (2005) Analytic Hierarchy Process as a Decision-Support System in the Petroleum Pipeline Industry. Issues in Information Systems, VI, 16-21.

 
 
Top