Font Size: a A A

Research On Information Security Risk Assessment Method In Cloud Computing Environment

Posted on:2019-05-30Degree:MasterType:Thesis
Country:ChinaCandidate:T ZouFull Text:PDF
GTID:2348330542477824Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of IT technology,cloud computing and other new industries have been rapidly advanced in China.Moreover,pilot and demonstration projects have been carried out in several cities involving the politics,economy,culture,education and other fields.Cloud computing is regarded as the next revolution in science and technology,which will bring fundamental change of work and business model.However,at present,cloud computing is still in the development stage and there are many challenges in academia and industry.Security is the main obstacle to the spread of cloud computing technology,The large-scale use of virtualization technology makes the existing cloud computing system facing new threats,which is not considered in the traditional IT network.So,combined with the characteristics of cloud computing,a reasonable and effective security risk assessment for cloud computing network is of great significance to solve the cloud security problem.The main contents of this paper are as follows:(1)Based on the security features of cloud computing,the CIADA is proposed which is named from confidentiality,integrity,availability,dependability and auditability this five security properties of security risk analysis system in cloud computing environment.Base on the Hadoop,Nessus and Snort,we designed the information security assessment process in cloud computing environment,including asset identification,threat identification,vulnerability identification,game model analysis and risk calculation.(2)Based on the static game theory,the static game theory,we study the attack-defense process of malicious attacker and cloud computing system in cloud computing.The conflicts of rational players in game model are also analyzed.By solving the Nash equilibrium solution of cloud computing system and attacker,the best defense/attack probability is analyzed.Through the numerical simulation of the optimal solutions,the influence factors and changing tendency of the defense/attack probability are analyzed.(3)Setting up the cloud computing system environment with Hadoop,combining the Nessus and Snort system,this paper uses the cloud computing information security risk assessment method constructed in this paper to analyze the experiment,and verify the feasibility of the evaluation process.
Keywords/Search Tags:Cloud Computing, Informaiton Security, Risk Assessment, Game Theory
PDF Full Text Request
Related items