2019
DOI: 10.3390/e21050462
|View full text |Cite
|
Sign up to set email alerts
|

Research on a Trustworthiness Measurement Method of Cloud Service Construction Processes Based on Information Entropy

Abstract: The popularity of cloud computing has made cloud services gradually become the leading computing model nowadays. The trustworthiness of cloud services depends mainly on construction processes. The trustworthiness measurement of cloud service construction processes (CSCPs) is crucial for cloud service developers. It can help to find out the causes of failures and to improve the development process, thereby ensuring the quality of cloud service. Herein, firstly, a trustworthiness hierarchy model of CSCP was prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 33 publications
0
14
0
Order By: Relevance
“…Therefore, this paper compares the proposed methods with other common security assessment methods. These methods include risk uncertainty assessment method based on information entropy [28], [30]- [32], risk weight method based on FAHP [24], [25], [56], risk level assessment method based on risk matrix [40], [41], and trust assessment method based on trust chain [42]- [44].…”
Section: B Methods Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, this paper compares the proposed methods with other common security assessment methods. These methods include risk uncertainty assessment method based on information entropy [28], [30]- [32], risk weight method based on FAHP [24], [25], [56], risk level assessment method based on risk matrix [40], [41], and trust assessment method based on trust chain [42]- [44].…”
Section: B Methods Comparisonmentioning
confidence: 99%
“…Therefore, this paper compares the proposed methods with other common security assessment methods. These methods include risk uncertainty assessment method based on information entropy [28]- [30], risk weight method based on FAHP [22], [23], [51], risk level assessment method based on risk matrix [38], [39], and trust assessment method based on trust chain [40]- [42]. In order to reasonably compare the characteristics of different methods, this paper makes a comparative analysis from the following 5 aspects around input, output and assessment process of each method.…”
Section: B Methods Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…At present, fruitful achievements have been made in the research of risk assessment, but only a few researches focus on privacy risk assessment, and researches on privacy assessment for m-commerce applications are rare. In references [23][24][25][26], the risks were evaluated based on the concept of information entropy; a feasible program was proposed for the assessment of security risk in cloud computing, but the privacy security was not analyzed. In reference [27], a privacy-considered information security assessment model was built with the risk recommendation system based on the identifiability, context of use, quantity, sensitivity, and freshness of the personal identity information data.…”
Section: Research On Assessment Methods For Privacy Security Riskmentioning
confidence: 99%
“…Another example is the integral metric for scoring the weaknesses' severity-CWSS score [18]. In [19,20], the weighted sum is used for the trustworthiness calculation. In [21], the weighted sum is considered for the trustworthiness calculation, but it is also mentioned that this approach can be misleading [22].…”
Section: Related Researchmentioning
confidence: 99%