A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider

John Mitchell, Syed Rizvi, Jungwoo Ryoo

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

Cloud computing represents the next evolutionary step in the realm of IT and offers a multitude of advantages over traditional computing models. However, there is a large trust deficit between cloud service users (CSUs) and cloud service providers (CSPs) that prevents the widespread adoption of the cloud among business professionals. Businesses are reluctant to migrate to the cloud due to the numerous security issues which affect data confidentiality and integrity. Therefore, a trust model is required to establish the positive reputation of the CSP. In this paper, we propose a fuzzy-logic based approach that allows the CSUs to determine the most trustworthy CSPs. Specifically, we develop the inference rules that will be applied in the fuzzy inference system (FIS) to provide the quantitative security index to the CSUs. One of the main advantages of the FIS is that it considers the uncertainties and ambiguities associated with measuring trust. Moreover, our proposed fuzzy based trust model is not limited to the CSU since it can be used by the CSPs in a self-evaluation process to promote improvement. To demonstrate the effectiveness of our proposed fuzzy based trust model, we present a case study where several popular CSPs are evaluated and ranked based on the security index.

Original languageEnglish (US)
Title of host publicationProceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015
EditorsJungwoo Ryoo, Hyoungshick Kim
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages19-24
Number of pages6
ISBN (Electronic)9781509010783
DOIs
StatePublished - Jan 10 2017
Event1st International Conference on Software Security and Assurance, ICSSA 2015 - Suwon, Gyeonggi, Korea, Republic of
Duration: Jul 27 2015 → …

Publication series

NameProceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015

Other

Other1st International Conference on Software Security and Assurance, ICSSA 2015
CountryKorea, Republic of
CitySuwon, Gyeonggi
Period7/27/15 → …

All Science Journal Classification (ASJC) codes

  • Software
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider'. Together they form a unique fingerprint.

  • Cite this

    Mitchell, J., Rizvi, S., & Ryoo, J. (2017). A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider. In J. Ryoo, & H. Kim (Eds.), Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015 (pp. 19-24). [7812941] (Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICSSA.2015.014