[sub][/sub] Design of Quantifiable Real-Life Security Matrix for Cloud Computing

Abstract

 Cloud security has been evolved as a significant research area under the arena of information security that consists of network security and data security, and the area is not restricted to researchers only but also for the sake of cloud providers and users as well because of its tremendous potentiality towards flexible storage capacity, power of virtualization, multi-tenant features and highly commercial viability among the service industries, academia and others. However, the technology of concern, though possess lots of advantages, is all but free from some serious drawbacks relating to privacy and security issues, which are equally important for its wide acceptability in the real-life situations. Due to some popular as well as comparatively uncommon attack vectors, the security of cloud service has arose a big question in the success of the technology, resulting the need to measure properly to ensure the loss caused and also for adapting the appropriate countermeasures for those attacks.. A good number of attack vectors and threats have been identified responsible for the decline of the widespread of the cloud computing in the IT and ITes industries and a major thrust research area has been evolved in the current decade, particularly, to device and formalize the appropriate security metrics for the measurement of the impact of the varied attack vectors. Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats, fewer describe them in useful terms and fewer measure them in meaningful ways. It has been observed that any system could be continuously monitored for several attack vectors and steps could be taken to control those attacks with appropriate measures. The domain of the problem is chosen in the cloud security area because of its novelty, importance, wide scope of research, applicability in the real-life industries and also the carry forward prospect in the relevant field for future research works. In the present paper, a novel concept of Security Matrix has been proposed whose foundation is based on a mathematical model for computational easiness and technically based on security metrics of different types of attack vectors. The intention of the proposed matrix is to measure the impact of different types of attack vectors mathematically by using proper metrics and convert the weakness into strength by properly identifying the different types of threats and measuring the impact of the threats with proper and justified metrics in a definite manner.

Authors and Affiliations

Santanu Kumar Sen*

Keywords

Related Articles

 Assessment of Biomedical waste management in Amravati (M.S)

 Biomedical waste management is of great importance due to its infectious and hazardous nature that can cause undesirable effects on humans and the environment. The objective of this study was Assessment Biomedical...

 Achieving Efficient Security and less Energy Consumption using Node Energy in WSN

 Wireless Sensor Networks (WSN), an element of pervasive computing, are presently being used on a large scale to monitor real-time environmental status Designing cost-efficient, secure network protocols for Wireles...

 Android base Gaming Application

 Android is a mobile operating system (OS) based on the Linux Kernal that is currently developed by Google.With a user interface based on direct manipulation ,Android is designed primarily for touch screen mobile...

 CARTAN-KAHLER THEORY AND PROLONGATION

 In this paper we speak about Cartan-Kahler Theory and Applications to exterior differential system, we have shown that some definitions, theorems and examples. Therefore, the results are derived from the proprieti...

A FAST AND EFFICIENT VISION BASED APPROACH FOR DETECTION OF FIRE IN REAL TIME SCENARIO

F ire is a huge serious disruption which leads to economic and environmental losses . So it is necessary to detect occurrence of fire at early stage . Alarm is not issued unless particles reach the senso...

Download PDF file
  • EP ID EP106189
  • DOI -
  • Views 85
  • Downloads 0

How To Cite

Santanu Kumar Sen* (30). [sub][/sub] Design of Quantifiable Real-Life Security Matrix for Cloud Computing. International Journal of Engineering Sciences & Research Technology, 3(5), 19-28. https://europub.co.uk/articles/-A-106189