Generic placeholder image

Recent Patents on Computer Science

Editor-in-Chief

ISSN (Print): 2213-2759
ISSN (Online): 1874-4796

Research Article

Cloud Computing Privacy Security Risk Analysis and Evaluation

Author(s): Qiujin Zhang, Rong Jiang*, Tong Li, Zifei Ma, Ming Yang and Juan Yang

Volume 11, Issue 1, 2018

Page: [32 - 43] Pages: 12

DOI: 10.2174/2213275911666180719121041

Price: $65

Abstract

Background: The most important question about the application and development of cloud computing is the privacy risk, as it has become the key factor for users in selecting cloud services. In order to have a better understanding of the privacy risk, resolve or make it controllable in an acceptable range, risk assessment is very necessary. However, specialized research on the assessment has not yet been found.

Methods: This paper has used Information Entropy Theory and Fuzzy Set Theory to evaluate cloud computing privacy security risk.

Results: This paper analyzes the research actuality of cloud computing privacy security and combs a number of cloud computing privacy security risks on the basis of digging deep into the characteristics of cloud computing and previous studies, thus further establishing an evaluation index system for privacy risk initiatively. Then, the entropy weight theory and fuzzy set theory are used to establish a fusion of multiple factors of the assessment model.

Conclusion: A practical case is given to prove the feasibility, rationality and effectiveness of the evaluation method.

Keywords: Cloud computing, privacy risks, risk assessment, information entropy, fuzzy set theory, entropy weight theory.

Graphical Abstract

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy