Abstract
To solve the problem of security evaluation in cloud computing, the modeling and analyzing methods of security evaluation about cloud computing are very important. Firstly, extending behavioral profiles into comprehensive behavioral profiles. Then, studying the degree of keeping consistent behavior relation which looks as the objective evaluation function based on comprehensive behavioral profiles. Finally, using behavioral theory of Petri Net to solve the evaluation function, a new method for security evaluation in cloud computing is proposed. The theoretical analysis and specific example show that the method is very effective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Daniel JA (2009) Data management in the cloud: limitations and opportunities. IEEE Data Eng Bull 32:3–12
Ristov S, Gusev M, Kostoska M (2012) A new methodology for security evaluation in cloud computing. In: Ristov S, Gusev M, Kostoska M 35th international convention on information and communication technology, electronics and microelectronics. IEEE, Piscataway, NJ, USA, pp 1484–1489
Dawei S, Guiran C, Lina S, Fengyun L, Xingwei W (2011) A dynamic multi-dimensional trust evaluation model to enhance security of cloud computing environments. Int J Innovative Comput Appl 3:200–212
Wei W, Guosun Z, Junqi Z, Daizhong T (2012) Dynamic trust evaluation and scheduling framework for cloud computing. Secur Commun Netw 5:311–318
Qiang G, Dawei S, Guiran, C, Lina S, Xingwei W (2011) Modeling and evaluation of trust in cloud computing environments. In: Proceedings of the 2011 3rd international conference on advanced computer control (ICACC 2011). doi:10.1109/ICACC.2011.6016378
Wenchuan Y, Bei J, Bowei C (2012) Study of a fuzzy comprehensive evaluation problem in cloud computing. Artif Intell Comput Intell. doi:10.1007/978-3-642-37502-6_16
Hyukho K, Hana L, Woongsup K, Yangwoo K (2010) A trust evaluation model for QoS guarantee in Cloud systems. Grid Distrib Comput 3:1–10
Qintian L, Chuang L, Ni Y (2010) Evaluation of user behavior trust in cloud computing. In: 2010 international conference on computer application and system modeling. doi:10.1109/ICCASM.2010.5620636
Fang XW, Jiang CJ, Yin ZX (2011) The trustworthiness analyzing of interacting business process based on the induction information. Comput Sci Inf Syst 8:843–867
Matthias W, Jan M (2012) Perceived consistency between process models. Inf Syst 37:80–98
Matthias W, Artem P, Nirmit DI, Jan M, Mathias W (2011) Process compliance analysis based on behavioural profiles. Inf Syst 36:1009–1025
Matthias W, Holger Z, Jan M (2011) Optimizing complex event queries over business processes using behavioural Profiles. In: Matthias W, Holger Z, Jan M, ZurMuehlen M, Su JW Lecture notes in business information processing. Springer, Heidelberg, pp 743–754
Matthias W, Jan M, Mathias W (2011) Efficient consistency measurement based on behavioral profiles of process models. IEEE Trans Softw Eng 37:3410–3429
Matthias W (2011) Behavioural profiles—a relational approach to behaviour consistency. Institutional Repository of the University of Potsdam. http://opus.kobv.de/ubp/volltexte/2011/5559/URNurn:nbn:de:kobv:517‐opus‐55590
Acknowledgments
We would like to thank the support of the National Natural Science Foundation of China under Grant No. 61272153, No. 61170059, No. 61170172, No. 61100058 and No. 61073102, Anhui Provincial Soft Science Foundation (12020503031), the Natural Science Foundation of Educational Government of Anhui Province of China (KJ2011A086 and KJ2012A073), Anhui Provincial Natural Science Foundation(1208085MF105), the youth academic backbone foundation of AUST, the Natural Science Foundation of Shanxi (Nos. 2011021013–2).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fang, X., Wang, M., Wu, S. (2013). A Method for Security Evaluation in Cloud Computing Based on Petri Behavioral Profiles. In: Yin, Z., Pan, L., Fang, X. (eds) Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013. Advances in Intelligent Systems and Computing, vol 212. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37502-6_71
Download citation
DOI: https://doi.org/10.1007/978-3-642-37502-6_71
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37501-9
Online ISBN: 978-3-642-37502-6
eBook Packages: EngineeringEngineering (R0)