[sub][/sub] Design of Quantifiable Real-Life Security Matrix for Cloud Computing

Abstract

 Cloud security has been evolved as a significant research area under the arena of information security that consists of network security and data security, and the area is not restricted to researchers only but also for the sake of cloud providers and users as well because of its tremendous potentiality towards flexible storage capacity, power of virtualization, multi-tenant features and highly commercial viability among the service industries, academia and others. However, the technology of concern, though possess lots of advantages, is all but free from some serious drawbacks relating to privacy and security issues, which are equally important for its wide acceptability in the real-life situations. Due to some popular as well as comparatively uncommon attack vectors, the security of cloud service has arose a big question in the success of the technology, resulting the need to measure properly to ensure the loss caused and also for adapting the appropriate countermeasures for those attacks.. A good number of attack vectors and threats have been identified responsible for the decline of the widespread of the cloud computing in the IT and ITes industries and a major thrust research area has been evolved in the current decade, particularly, to device and formalize the appropriate security metrics for the measurement of the impact of the varied attack vectors. Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats, fewer describe them in useful terms and fewer measure them in meaningful ways. It has been observed that any system could be continuously monitored for several attack vectors and steps could be taken to control those attacks with appropriate measures. The domain of the problem is chosen in the cloud security area because of its novelty, importance, wide scope of research, applicability in the real-life industries and also the carry forward prospect in the relevant field for future research works. In the present paper, a novel concept of Security Matrix has been proposed whose foundation is based on a mathematical model for computational easiness and technically based on security metrics of different types of attack vectors. The intention of the proposed matrix is to measure the impact of different types of attack vectors mathematically by using proper metrics and convert the weakness into strength by properly identifying the different types of threats and measuring the impact of the threats with proper and justified metrics in a definite manner.

Authors and Affiliations

Santanu Kumar Sen*

Keywords

Related Articles

 DE-DUPLICATION WITH ENHANCED RELIABILITY AND SECURE AUDITING IN CLOUD

 As the distributed computing innovation creates amid the most recent decade, outsourcing information to cloud administration for capacity turns into an alluring pattern, which benefits in saving endeavors on overw...

 Implementation on Quality Analysis in Web Applications to Develop Specification and Duplication Mining

  We propose an approach to Analysis of modern web applications and detect duplicated blocks of code to quality improvement and specification in Web sites and on the analysis of both the page structure, implemented...

 Evolution of Mobile Technology with 5 Generation

 Today, Computers play a vital role in science and business area and a one part of computer are network technology, change a human life wonderfully. Scientist innovates and developed some and to satisfy people’s d...

 Accident Detection and Notification System.

 During the last few years the numbers of vehicles travelling in our roads have increased, increasing the driver’s attention requirements. The instant effect of this is the dramatic increase in the amount of accide...

 A Real Time Implementation of an Image Scaling Processor Using VLSI Technique

 Image scaling is a very important technique and has been widely used in many image processing applications. In applications where the scaling process must be performed at the display rather than at the CPU OR GPU,...

Download PDF file
  • EP ID EP106189
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

Santanu Kumar Sen* (30). [sub][/sub] Design of Quantifiable Real-Life Security Matrix for Cloud Computing. International Journal of Engineering Sciences & Research Technology, 3(5), 19-28. https://europub.co.uk/articles/-A-106189