Skip to main content

A Quality Model for Evaluating Encryption-as-a-Service

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10658))

Abstract

Cloud computing is a promising paradigm and seen as a trend on information and technology. However, it is a challenge to ensure the security of cloud computing. Compared with other security schemes, Encryption-as-a-Service (EaaS) not only avoids the risk of cloud, but also is more efficient. For commercial success of Encryption-as-a-Service, we present a quality model to evaluate the quality level of service. We define four quality characteristics of Encryption-as-a-Service, and propose the corresponding metrics based on practical experience and research. Moreover, we define \( LE_{EaaS} \) as a comprehensive metric for the quality level, and determine weighting coefficients utilizing CRITIC method, which will make the evaluation more practical.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yan, Z., Deng, R.H., Varadharajan, V.: Cryptography and data security in cloud computing. Inf. Sci. 387, 53–55 (2017)

    Article  Google Scholar 

  2. Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14992-4_13

    Chapter  Google Scholar 

  3. Lifei, W., Haojin, Z., Zhenfu, C.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)

    Article  Google Scholar 

  4. Takabi, H., Joshi, J.B.D., Ahn, G.J., et al.: SecureCloud: towards a comprehensive security framework for cloud computing environments. In: Computer Software and Applications Conference Workshops, pp. 393–398. IEEE Computer Society (2010)

    Google Scholar 

  5. Rahmani, H., Sundararajan, E., Ali, Z.M.: Encryption as a Service (EaaS) as a solution for cryptography in cloud. Procedia Technol. 11(1), 1202–1210 (2013)

    Article  Google Scholar 

  6. Jureta, I.J., Herssens, C., Faulkner, S.: A comprehensive quality model for service-oriented systems. Softw. Qual. J. 17(1), 65–98 (2009)

    Article  Google Scholar 

  7. Lee, J.Y., Lee, J.W., Cheun, D.W.: A quality model for Evaluating Software-as-a-Service in cloud computing. In: ACIS International Conference on Software Engineering Research, Management and Applications, pp. 261–266. IEEE (2009)

    Google Scholar 

  8. ISO/IEC: Systems and software engineering – Systems and software Quality Requirements and Evaluation (SQuaRE) – System and software quality models (2011)

    Google Scholar 

  9. Stalk, G., Hout, T.M.: Competing against time: how time-based competition is reshaping global markets (1990)

    Google Scholar 

  10. Brockhoff, K.: Simplicity wins: how Germany’s mid-sized industrial companies succeed. R&D Manag. 26(2), 192–193 (2010)

    Article  Google Scholar 

  11. Frølund, S., Koistinen, J.: Quality of services specification in distributed object systems design. Distrib. Syst. Eng. 5(4), 179–202 (1998)

    Article  Google Scholar 

  12. Zongjun, W.: Method of determining multi-target weighting coefficient and selection strategy. Syst. Eng. Electron. 15(6), 35–41 (1993)

    Google Scholar 

  13. Yuda, H.: Practical Multi-target Optimization. Shanghai Scientific and Technical Publishers, Shanghai (1990)

    Google Scholar 

  14. Jiaji, X.: Multi-target Decision. Hunan Scientific and Technical Publishers, Changsha (1989)

    Google Scholar 

  15. Yuanyuan, W., Ye, T., Wengdong, W.: Index weight decision based on AHP for information retrieval on mobile device. In: International Proceedings of Computer Science & Information Tech (2012)

    Google Scholar 

  16. Zeyan, W., Xiaoxin, Y., Shenru, Z.: Weighting method and application based on ideal optimization schemes. Syst. Eng. 20(2), 6–9 (2002)

    Google Scholar 

  17. Diakoulaki, D., Mavrotas, G., Papayannakis, L.: Determining objective weights in multiple criteria problems: the CRITIC method. Comput. Oper. Res. 22(7), 763–770 (1995)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jin Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, J., Zhu, Z., Guo, S. (2017). A Quality Model for Evaluating Encryption-as-a-Service. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72395-2_51

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72394-5

  • Online ISBN: 978-3-319-72395-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics