Research on Security Evaluation of Cloud Computing Based on Attack Graph

Yexia Cheng,Yuejin Du,Junfeng Xu,Chunyang Yuan,Zhi Xue
DOI: https://doi.org/10.1109/ccis.2012.6664448
2012-01-01
Abstract:Cloud computing is becoming more and more popular and its security is arising as well. In order to solve security issues and take security evaluation in cloud computing, its corresponding hierarchical security design model is introduced and an approach of security evaluation based on attack graph is proposed in cloud computing environment. Firstly, network threat model and automatic methods are presented to get information for generating attack graph automatically. By using symbolic model checking algorithm, attack graph is generated and visualized. Then, by combining the characteristics of Markov Chain with attack graph, two security evaluation metrics are proposed in cloud computing. They can be used for security evaluation, security hardness and give security suggestions in cloud computing.
What problem does this paper attempt to address?