Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 212))

Abstract

To solve the problem of security evaluation in cloud computing, the modeling and analyzing methods of security evaluation about cloud computing are very important. Firstly, extending behavioral profiles into comprehensive behavioral profiles. Then, studying the degree of keeping consistent behavior relation which looks as the objective evaluation function based on comprehensive behavioral profiles. Finally, using behavioral theory of Petri Net to solve the evaluation function, a new method for security evaluation in cloud computing is proposed. The theoretical analysis and specific example show that the method is very effective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Daniel JA (2009) Data management in the cloud: limitations and opportunities. IEEE Data Eng Bull 32:3–12

    Google Scholar 

  2. Ristov S, Gusev M, Kostoska M (2012) A new methodology for security evaluation in cloud computing. In: Ristov S, Gusev M, Kostoska M 35th international convention on information and communication technology, electronics and microelectronics. IEEE, Piscataway, NJ, USA, pp 1484–1489

    Google Scholar 

  3. Dawei S, Guiran C, Lina S, Fengyun L, Xingwei W (2011) A dynamic multi-dimensional trust evaluation model to enhance security of cloud computing environments. Int J Innovative Comput Appl 3:200–212

    Article  Google Scholar 

  4. Wei W, Guosun Z, Junqi Z, Daizhong T (2012) Dynamic trust evaluation and scheduling framework for cloud computing. Secur Commun Netw 5:311–318

    Article  Google Scholar 

  5. Qiang G, Dawei S, Guiran, C, Lina S, Xingwei W (2011) Modeling and evaluation of trust in cloud computing environments. In: Proceedings of the 2011 3rd international conference on advanced computer control (ICACC 2011). doi:10.1109/ICACC.2011.6016378

  6. Wenchuan Y, Bei J, Bowei C (2012) Study of a fuzzy comprehensive evaluation problem in cloud computing. Artif Intell Comput Intell. doi:10.1007/978-3-642-37502-6_16

    Google Scholar 

  7. Hyukho K, Hana L, Woongsup K, Yangwoo K (2010) A trust evaluation model for QoS guarantee in Cloud systems. Grid Distrib Comput 3:1–10

    MATH  Google Scholar 

  8. Qintian L, Chuang L, Ni Y (2010) Evaluation of user behavior trust in cloud computing. In: 2010 international conference on computer application and system modeling. doi:10.1109/ICCASM.2010.5620636

  9. Fang XW, Jiang CJ, Yin ZX (2011) The trustworthiness analyzing of interacting business process based on the induction information. Comput Sci Inf Syst 8:843–867

    Article  Google Scholar 

  10. Matthias W, Jan M (2012) Perceived consistency between process models. Inf Syst 37:80–98

    Article  Google Scholar 

  11. Matthias W, Artem P, Nirmit DI, Jan M, Mathias W (2011) Process compliance analysis based on behavioural profiles. Inf Syst 36:1009–1025

    Article  Google Scholar 

  12. Matthias W, Holger Z, Jan M (2011) Optimizing complex event queries over business processes using behavioural Profiles. In: Matthias W, Holger Z, Jan M, ZurMuehlen M, Su JW Lecture notes in business information processing. Springer, Heidelberg, pp 743–754

    Google Scholar 

  13. Matthias W, Jan M, Mathias W (2011) Efficient consistency measurement based on behavioral profiles of process models. IEEE Trans Softw Eng 37:3410–3429

    Google Scholar 

  14. Matthias W (2011) Behavioural profiles—a relational approach to behaviour consistency. Institutional Repository of the University of Potsdam. http://opus.kobv.de/ubp/volltexte/2011/5559/URNurn:nbn:de:kobv:517‐opus‐55590

Download references

Acknowledgments

We would like to thank the support of the National Natural Science Foundation of China under Grant No. 61272153, No. 61170059, No. 61170172, No. 61100058 and No. 61073102, Anhui Provincial Soft Science Foundation (12020503031), the Natural Science Foundation of Educational Government of Anhui Province of China (KJ2011A086 and KJ2012A073), Anhui Provincial Natural Science Foundation(1208085MF105), the youth academic backbone foundation of AUST, the Natural Science Foundation of Shanxi (Nos. 2011021013–2).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xianwen Fang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fang, X., Wang, M., Wu, S. (2013). A Method for Security Evaluation in Cloud Computing Based on Petri Behavioral Profiles. In: Yin, Z., Pan, L., Fang, X. (eds) Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013. Advances in Intelligent Systems and Computing, vol 212. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37502-6_71

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37502-6_71

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37501-9

  • Online ISBN: 978-3-642-37502-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics