A New BRB Model for Cloud Security-State Prediction Based on the Large-Scale Monitoring Data

التفاصيل البيبلوغرافية
العنوان: A New BRB Model for Cloud Security-State Prediction Based on the Large-Scale Monitoring Data
المؤلفون: Xiaojing Yin, Zhichao Feng, Guanyu Hu, Pei-Li Qiao, Hang Wei, Zhiguo Zhou, Xiao-Xia Han
المصدر: IEEE Access, Vol 6, Pp 11907-11920 (2018)
بيانات النشر: IEEE, 2018.
سنة النشر: 2018
مصطلحات موضوعية: multi-attributes integration, Cloud computing security, General Computer Science, Computer science, business.industry, Reliability (computer networking), cloud computing, General Engineering, Evidential reasoning approach, 020206 networking & telecommunications, Cloud computing, 02 engineering and technology, computer.software_genre, Constraint (information theory), 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, General Materials Science, State (computer science), Data mining, lcsh:Electrical engineering. Electronics. Nuclear engineering, Belief rule base (BRB), business, computer, security-state prediction, lcsh:TK1-9971
الوصف: Considering the reliability of the cloud computing system, this paper aims to predict the security state with multiple large-scale attributes in cloud computing system. A double-layer method for predicting the security state of cloud computing system based on the belief rule-base model is proposed, where the evidential reasoning (ER) algorithm is employed to fuse the multiple system indicators of actual cloud system and make a reasonable assessment to describe the cloud security state. This method can utilize quantitative and qualitative information simultaneously. By using the ER algorithm to integrate multiple indicators whose attributes contain much uncertain information, the security state of the cloud computing system can be predicted accurately. Moreover, due to the initial parameters of the proposed models are given by experts that might cause imprecise results, the constraint CMA-ES algorithm is employed as the optimization tool to obtain the optimal parameters. A practical study about the cloud security-state prediction is verified to indicate the potential applications about the proposed prediction model in a cloud computing platform.
اللغة: English
تدمد: 2169-3536
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::82d4b27c7adee2560da4d5b3c0ef0332
https://ieeexplore.ieee.org/document/8126788/
حقوق: OPEN
رقم الأكسشن: edsair.doi.dedup.....82d4b27c7adee2560da4d5b3c0ef0332
قاعدة البيانات: OpenAIRE