Abstract
Cloud computing environments consist of many entities that have different roles, such as provider and customer, and multiple interactions amongst them. Trust is an essential element to develop confidence-based relationships amongst the various components in such a diverse environment. The current chapter presents the taxonomy of trust models and classification of information sources for trust assessment. Furthermore, it presents the taxonomy of risk factors in cloud computing environment. It analyses further the existing approaches and portrays the potential of enhancing trust development by merging trust assessment and risk assessment methodologies. The aim of the proposed solution is to combine information sources collected from various trust and risk assessment systems deployed in cloud services, with data related to attack patterns. Specifically, the approach suggests a new qualitative solution that could analyse each symptom, indicator, and vulnerability in order to detect the impact and likelihood of attacks directed at cloud computing environments. Therefore, possible implementation of the proposed framework might help to minimise false positive alarms, as well as to improve performance and security, in the cloud computing environment.
Original language | English |
---|---|
Title of host publication | Guide to Vulnerability Analysis for Computer Networks and Systems |
Subtitle of host publication | An Artificial Intelligence Approach |
Editors | Simon Parkinson, Andrew Crampton, Richard Hill |
Publisher | Springer International Publishing AG |
Chapter | 4 |
Pages | 81-99 |
ISBN (Electronic) | 9783319926247 |
ISBN (Print) | 9783319926230 |
DOIs | |
Publication status | Published - 8 Sep 2018 |
Publication series
Name | Computer Communications and Networks |
---|---|
Publisher | Springer |
ISSN (Print) | 1617-7975 |
ISSN (Electronic) | 2197-8433 |
Fingerprint
Dive into the research topics of 'A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection'. Together they form a unique fingerprint.Profiles
-
Stephen McGuire
- Department of Computer Science - Graduate Teaching Assistant - Informatics
- School of Computing and Engineering
- Centre for Planning, Autonomy and Representation of Knowledge - Member
Person: Academic, Doctor of Philosophy