[sub][/sub] Design of Quantifiable Real-Life Security Matrix for Cloud Computing

Abstract

 Cloud security has been evolved as a significant research area under the arena of information security that consists of network security and data security, and the area is not restricted to researchers only but also for the sake of cloud providers and users as well because of its tremendous potentiality towards flexible storage capacity, power of virtualization, multi-tenant features and highly commercial viability among the service industries, academia and others. However, the technology of concern, though possess lots of advantages, is all but free from some serious drawbacks relating to privacy and security issues, which are equally important for its wide acceptability in the real-life situations. Due to some popular as well as comparatively uncommon attack vectors, the security of cloud service has arose a big question in the success of the technology, resulting the need to measure properly to ensure the loss caused and also for adapting the appropriate countermeasures for those attacks.. A good number of attack vectors and threats have been identified responsible for the decline of the widespread of the cloud computing in the IT and ITes industries and a major thrust research area has been evolved in the current decade, particularly, to device and formalize the appropriate security metrics for the measurement of the impact of the varied attack vectors. Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats, fewer describe them in useful terms and fewer measure them in meaningful ways. It has been observed that any system could be continuously monitored for several attack vectors and steps could be taken to control those attacks with appropriate measures. The domain of the problem is chosen in the cloud security area because of its novelty, importance, wide scope of research, applicability in the real-life industries and also the carry forward prospect in the relevant field for future research works. In the present paper, a novel concept of Security Matrix has been proposed whose foundation is based on a mathematical model for computational easiness and technically based on security metrics of different types of attack vectors. The intention of the proposed matrix is to measure the impact of different types of attack vectors mathematically by using proper metrics and convert the weakness into strength by properly identifying the different types of threats and measuring the impact of the threats with proper and justified metrics in a definite manner.

Authors and Affiliations

Santanu Kumar Sen*

Keywords

Related Articles

 A Review on Dynamic Voltage Restorer (DVR) to Improve Power Quality

 In distribution system the most common phenomena is voltage sag, in which will be effected on the different load mostly sensitive. Generally the custom power devices is An effective solution to mitigate The DVR is...

 CLASSIFICATION OF EEG SIGNAL DATA USING HYBRID OF NEURO-FUZZY

 Brain Computing interface technology represents a very highly growing field now-a-days for the research because of its unique applications system. In this paper we investigate classification methods of mental comm...

 Flow of a Jeffrey Fluid between Finite Deformable Porous Layers

 The flow of a Jeffrey fluid between a thin deformable porous layers is investigated. The governing equations are solved in the free flow and porous flow regions. The expressions for the velocity field and deformat...

 CURRENT STARVED VCO DESIGNED USING 70NM CMOS PROCESS

 Current starved VCO is simple ring oscillator consisting of cascaded current starved inverters. This paper gives a performance evaluation of five staged Current Starved VCO on simulating tool Tanner 13.0 using 70n...

 A STUDY OF STRENGTH ANALYSIS IN SHEET METAL BY BENDING PROCESS: A REVIEW

 Various types of bending process are designed as per shape and thickness of work piece. The strength of sheet metal varies with the shape due to bending. The change in shape causes the change in moment of inertia....

Download PDF file
  • EP ID EP106189
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

Santanu Kumar Sen* (30). [sub][/sub] Design of Quantifiable Real-Life Security Matrix for Cloud Computing. International Journal of Engineering Sciences & Research Technology, 3(5), 19-28. https://europub.co.uk/articles/-A-106189