Abstract

Cloud computing is gaining a lot of popularity with an increasing number of services available in the market. This has rendered services selection and evaluation a difficult and challenging task, particularly for security-based evaluation. A key problem with much of the literature on cloud services security evaluation is that it fails to consider the overall evaluation context given the cloud characteristics and the underlying influence factors including threats, vulnerabilities, and security controls. In this paper, we propose a holistic risk-driven security evaluation approach for cloud services selection. We first use fuzzy DEMATEL method to jointly assess the likelihood and impact of threats with respect to the cloud service types, the exploitability of vulnerabilities to the identified threats, and the effectiveness of security controls in mitigating those vulnerabilities. Consequently, the overall diffusion of risk is captured via the relations across these concepts, which is leveraged to filter and prioritize the most critical security controls. The selected controls were then weighted using a combination of fuzzy DEMATEL and fuzzy ANP methods based on several factors, including their effectiveness in preventing the identified risks, user’s preferences and level of control (i.e., responsibilities). The latter denotes how much control a cloud user is transferring to the cloud provider. To enhance the reliability of the results, the subjective weights were integrated with objective weights using the Entropy method. Finally, the TOPSIS method was employed for services ranking and the Improvement Gap Analysis (IGA) method was leveraged to provide more insights on the strength and weaknesses of the selected services. An illustrative example is given to demonstrate the application of the proposed framework.

Highlights

  • Cloud computing has become increasingly popular due to its cost-effective and resources efficient services

  • To demonstrate the applicability of the proposed framework, we present an example of an evaluation for a SaaS service using data extracted from NIST security reference architecture [17] and CSA STAR repository, which is a public registry that documents the security controls provided by popular cloud computing

  • We proposed a holistic risk-driven security evaluation approach for cloud services selection

Read more

Summary

INTRODUCTION

Cloud computing has become increasingly popular due to its cost-effective and resources efficient services. The selection of the critical security controls in the cloud needs to consider the overall dependencies between the vulnerabilities, threats, and the particular cloud services characteristics. Following a risk-driven approach for cloud services selection helps in assessing the effectiveness of the security controls. Adopting a risk-driven approach in selecting the evaluation criteria considering the relevant vulnerabilities and threats likelihoods, would enable measurement of the effectiveness of the security controls. We further assess the extent of the effectiveness of the implemented security controls by analyzing their performance gaps against an assumed ideal using improvement gap analysis (IGA) method [19] Another essential step related to the evaluation process is the weighting of the criteria.

Cloud Services Security-based Evaluation
Dependency-Aware Cloud Security Evaluation Methods
PROPOSED FRAMEWORK
Context Building and Criteria Selection
Criteria Weighting
Services Ranking
Performance Improvement and Gap Analysis
CASE STUDY
H MMH MH H 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Objective
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.