2021
DOI: 10.1007/s10586-021-03233-3
|View full text |Cite
|
Sign up to set email alerts
|

FFED: a novel strategy based on fast entropy to detect attacks against trust computing in cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…During the assessment, for the purpose of security assessment, the two methods all need to sort out the measurement indicators affecting system security and their related attributes and then adopt corresponding methods to assess these indicators. ese corresponding methods include AHP [36][37][38], information entropy [39][40][41], and trust chain [42][43][44]. In these methods, trust chain is a method which is mainly used to detect whether the system is attacked or damaged.…”
Section: Methods Comparisonmentioning
confidence: 99%
“…During the assessment, for the purpose of security assessment, the two methods all need to sort out the measurement indicators affecting system security and their related attributes and then adopt corresponding methods to assess these indicators. ese corresponding methods include AHP [36][37][38], information entropy [39][40][41], and trust chain [42][43][44]. In these methods, trust chain is a method which is mainly used to detect whether the system is attacked or damaged.…”
Section: Methods Comparisonmentioning
confidence: 99%
“…Therefore, this paper compares the proposed methods with other common security assessment methods. These methods include risk uncertainty assessment method based on information entropy [28], [30]- [32], risk weight method based on FAHP [24], [25], [56], risk level assessment method based on risk matrix [40], [41], and trust assessment method based on trust chain [42]- [44].…”
Section: B Methods Comparisonmentioning
confidence: 99%
“…Therefore, this paper compares the proposed methods with other common security assessment methods. These methods include risk uncertainty assessment method based on information entropy [28]- [30], risk weight method based on FAHP [22], [23], [51], risk level assessment method based on risk matrix [38], [39], and trust assessment method based on trust chain [40]- [42]. In order to reasonably compare the characteristics of different methods, this paper makes a comparative analysis from the following 5 aspects around input, output and assessment process of each method.…”
Section: B Methods Comparisonmentioning
confidence: 99%
“…However, this single model-based assessment lacks the analysis of changes in cloud service trustworthiness. The uncertainty assessment method based on information entropy [8][9][10][11][12] is an effective method to measure the trustworthiness of cloud service. However, the assessment result of this method only describes the uncertainty of risk, and does not give an estimate for the change of service trustworthiness.…”
Section: Related Researchmentioning
confidence: 99%