Abstract
Cloud computing is a promising paradigm and seen as a trend on information and technology. However, it is a challenge to ensure the security of cloud computing. Compared with other security schemes, Encryption-as-a-Service (EaaS) not only avoids the risk of cloud, but also is more efficient. For commercial success of Encryption-as-a-Service, we present a quality model to evaluate the quality level of service. We define four quality characteristics of Encryption-as-a-Service, and propose the corresponding metrics based on practical experience and research. Moreover, we define \( LE_{EaaS} \) as a comprehensive metric for the quality level, and determine weighting coefficients utilizing CRITIC method, which will make the evaluation more practical.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yan, Z., Deng, R.H., Varadharajan, V.: Cryptography and data security in cloud computing. Inf. Sci. 387, 53–55 (2017)
Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14992-4_13
Lifei, W., Haojin, Z., Zhenfu, C.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)
Takabi, H., Joshi, J.B.D., Ahn, G.J., et al.: SecureCloud: towards a comprehensive security framework for cloud computing environments. In: Computer Software and Applications Conference Workshops, pp. 393–398. IEEE Computer Society (2010)
Rahmani, H., Sundararajan, E., Ali, Z.M.: Encryption as a Service (EaaS) as a solution for cryptography in cloud. Procedia Technol. 11(1), 1202–1210 (2013)
Jureta, I.J., Herssens, C., Faulkner, S.: A comprehensive quality model for service-oriented systems. Softw. Qual. J. 17(1), 65–98 (2009)
Lee, J.Y., Lee, J.W., Cheun, D.W.: A quality model for Evaluating Software-as-a-Service in cloud computing. In: ACIS International Conference on Software Engineering Research, Management and Applications, pp. 261–266. IEEE (2009)
ISO/IEC: Systems and software engineering – Systems and software Quality Requirements and Evaluation (SQuaRE) – System and software quality models (2011)
Stalk, G., Hout, T.M.: Competing against time: how time-based competition is reshaping global markets (1990)
Brockhoff, K.: Simplicity wins: how Germany’s mid-sized industrial companies succeed. R&D Manag. 26(2), 192–193 (2010)
Frølund, S., Koistinen, J.: Quality of services specification in distributed object systems design. Distrib. Syst. Eng. 5(4), 179–202 (1998)
Zongjun, W.: Method of determining multi-target weighting coefficient and selection strategy. Syst. Eng. Electron. 15(6), 35–41 (1993)
Yuda, H.: Practical Multi-target Optimization. Shanghai Scientific and Technical Publishers, Shanghai (1990)
Jiaji, X.: Multi-target Decision. Hunan Scientific and Technical Publishers, Changsha (1989)
Yuanyuan, W., Ye, T., Wengdong, W.: Index weight decision based on AHP for information retrieval on mobile device. In: International Proceedings of Computer Science & Information Tech (2012)
Zeyan, W., Xiaoxin, Y., Shenru, Z.: Weighting method and application based on ideal optimization schemes. Syst. Eng. 20(2), 6–9 (2002)
Diakoulaki, D., Mavrotas, G., Papayannakis, L.: Determining objective weights in multiple criteria problems: the CRITIC method. Comput. Oper. Res. 22(7), 763–770 (1995)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Wu, J., Zhu, Z., Guo, S. (2017). A Quality Model for Evaluating Encryption-as-a-Service. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_51
Download citation
DOI: https://doi.org/10.1007/978-3-319-72395-2_51
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72394-5
Online ISBN: 978-3-319-72395-2
eBook Packages: Computer ScienceComputer Science (R0)