Cloud Computing Privacy Security Risk Analysis and Evaluation

Author(s): Qiujin Zhang, Rong Jiang*, Tong Li, Zifei Ma, Ming Yang, Juan Yang.

Journal Name: Recent Patents on Computer Science

Volume 11 , Issue 1 , 2018

Become EABM
Become Reviewer

Graphical Abstract:


Abstract:

Background: The most important question about the application and development of cloud computing is the privacy risk, as it has become the key factor for users in selecting cloud services. In order to have a better understanding of the privacy risk, resolve or make it controllable in an acceptable range, risk assessment is very necessary. However, specialized research on the assessment has not yet been found.

Methods: This paper has used Information Entropy Theory and Fuzzy Set Theory to evaluate cloud computing privacy security risk.

Results: This paper analyzes the research actuality of cloud computing privacy security and combs a number of cloud computing privacy security risks on the basis of digging deep into the characteristics of cloud computing and previous studies, thus further establishing an evaluation index system for privacy risk initiatively. Then, the entropy weight theory and fuzzy set theory are used to establish a fusion of multiple factors of the assessment model.

Conclusion: A practical case is given to prove the feasibility, rationality and effectiveness of the evaluation method.

Keywords: Cloud computing, privacy risks, risk assessment, information entropy, fuzzy set theory, entropy weight theory.

Rights & PermissionsPrintExport Cite as

Article Details

VOLUME: 11
ISSUE: 1
Year: 2018
Page: [32 - 43]
Pages: 12
DOI: 10.2174/2213275911666180719121041
Price: $58

Article Metrics

PDF: 20
HTML: 1