Toward a Risk Assessment Model Based On Multi-Agent System for Cloud Consumer
Authors: Saadia Drissi, Siham Benhadou, Hicham Medromi
Abstract:
The cloud computing is an innovative paradigm that introduces several changes in technology that have resulted a new ways for cloud providers to deliver their services to cloud consumers mainly in term of security risk assessment, thus, adapting a current risk assessment tools to cloud computing is a very difficult task due to its several characteristics that challenge the effectiveness of risk assessment approaches. As consequence, there is a need of risk assessment model adapted to cloud computing. This paper requires a new risk assessment model based on multi-agent system and AHP model as fundamental steps towards the development of flexible risk assessment approach regarding cloud consumers.
Keywords: Cloud computing, risk assessment model, multi-agent system, AHP model, cloud consumer.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1093422
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2261References:
[1] Cloud Security Alliance (CSA): Top threats to cloud computing, version 1.0. http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf, March 2010.
[2] Burton S. Kaliski Jr. and Wayne Pauley,Toward Risk Assessment as a Service in Cloud Environment, EMC Corporation, Hopkinton, MA, USA, 2010.
[3] EBIOS, Central Directorate for Information Systems Security, Version 2010 website.
[Online]. Available: http://www.ssi.gouv.fr.
[4] Operationally Critical Threat, Asset and Vulnerability Evaluation (OCTAVE), Carnegie Mellon - Software Engineering Institute, (1999).
[5] Method Harmonized Risk Analysis (MEHARI) Principles and mechanisms CLUSIF, Issue 3, October 2004.
[6] Mell P, Grance T. Perspectives on cloud computing and standards. National Institute of Standards and Technology (NIST). Information Technology Laboratory; 2009.
[7] CSS, White paper on software and service architectures, Infrastructures and Engineering – Action Paper on the area for the future EU competitiveness Volume 2: Background information, Version 1.3, retrieved:15.08.2010,http://www.euecss.eu/contents/documentation/volume%20two_ECSS%20White%20Paper.pdf
[8] Miller, M. (2008). Cloud computing: Web-based applications that change the way you work and collaborate online. Indianapolis,
[9] Van Scoy, Roger L. Software Development Risk: Opportunity, Not Problem
[10] R. Farrell, "Securing the cloud-governance, risk and compliance issues reign supreme,” Information Security Journal: A Global Perspective, 2010.
[11] A. Sayouti, H. Medromi–"Les Systèmes Multi-Agents : Application au Contrôle sur Internet” Auteurs Éditions universitaires européennes, Août 2012.
[12] P. Saripalli and B. Walters, QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security , In the Proceedings of the IEEE 3rd International Conference on Cloud Computing, 2010, pp. 280-288.
[13] Peiyu L., Dong L.. "The New Risk Assessment Model for Information System in Cloud Computing Environment”, Procedia Engineering 15, 2011, pp. 3200 – 3204 .
[14] Z. Xuan, N. Wuwong , et al., "Information Security Risk Management Framework for the Cloud Computing Environments,” in 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), 2010.
[15] Amit Sangroya, Saurabh Kumar, Jaideep Dhok, Vasudeva Varma, "Towards Analyzing Data Security Risks in Cloud Computing Environments”, International Conference on Information Systems, Technology, and Management (ICISTM), Bangkok, Thailand, 2010.
[16] Drissi S., Houmani H., Medromi H., Survey: risk assessment for cloud computing, International Journal of Advanced Computer Science and Applications,2013, pp.143-148.
[17] S. Drissi and H. Medromi, "A new risk assessment approach for cloud consumer”, Journal of Communication and Computer (JCC), March 2014 (accepted).
[18] A. Altuzarra, J. M. Moreno-Jimnez and M. Salvador, A Bayesian prioritization procedure for AHP-group decision making, European Journal of Operational Research, vol.182, no.1 , 2007, pp.367-382.
[19] R. Ramanathan and L. S. Ganesh, Group preference aggregation methods employed in AHP: An evaluation and an intrinsic process for deriving members' weightages, European Journal of Operational Research, vol.79, no.2 , 1994, pp.249-265.
[20] R. F. Dyer and E. H. Forman, Group decision support with the analytic hierarchy process, Decision Support Systems, vol.8, no.2, pp.99-124, 1992.