Font Size: a A A

Evaluation Of Cloud Security Attack And Defense Strategies And Security Technology Based On Game Theory

Posted on:2015-03-07Degree:MasterType:Thesis
Country:ChinaCandidate:H F ChenFull Text:PDF
GTID:2268330422467675Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
Cloud computing has many advantages, such as the SMEs do not have to investa lot of money to build infrastructure, just spend a small amount of money you canget the desired service, and can be deployed quickly realize, therefore, cloudcomputing been a very big concern, all countries have spent on research and a lot ofeffort in building cloud computing. With the rapid development of cloud computing,cloud computing contact our lives more closely. But cloud computing also faces avery serious security problem. How to improve the security of cloud computing, hasbecome an important research direction.Currently, security for cloud computing research, mainly on cloud serviceproviders want to provide end users of cloud services are safe and reliable. But whilecloud computing service providers to provide software and hardware resourcesdirectly to the cloud end-users, which facilitate end-user cloud cloud end-users hasalso increased security risks of cloud service providers. Therefore, for the end-userthrough the cloud user authentication after effective control is an important researchdirection of cloud computing security. In addition, research on cloud securitytechnology assessment is also very little paper to study in the cloud computingenvironment and users’ offensive and defensive game strategy research and technicalevaluation of the security environment in two aspects of cloud computing securityconduct a more comprehensive study, and gives security recommendations.Firstly, literature review, game theory applied to user trust, security policies andsecurity technology to optimize other aspects of the evaluation are summarized, thenthe theory of cloud computing are outlined. Then the characteristics for cloudcomputing environments, from the user’s offensive and defensive game strategies andtechnical evaluation of the safety aspects of the establishment of two game modelsrespectively, the cloud service provider’s recommendations drawn game strategy andsystem security. Specific research ideas and work content in the following areas: 1.Between the offensive and defensive abstract cloud end users and cloudservice providers to incomplete information dynamic game, from a security offensiveand defensive game strategies and technologies for safety evaluation system toestablish two incomplete information dynamic game model.2.Analysis of offensive and defensive strategy game based security model tobuild the game from the offensive and defensive models and repeated offensivemodel cloud security issues, and ultimately get the associated equilibrium andstrategic analysis.3.The analysis by the cloud service provider, untrusted users and intrusiondetection system (IDS) constitute a safety assessment model, the introduction of theconcept of repeated games of the model was a multi-stage dynamic game analysis.4.Done for safety evaluation model to simulate and analyze.
Keywords/Search Tags:game theory, cloud computing, cloud security, offensive anddefensive strategies, safety evaluation
PDF Full Text Request
Related items