Design and Implementation of a Cloud Computing Security Assessment Model Based on Hierarchical Analysis and Fuzzy Comprehensive Evaluation
By: Yihong Zou
Potential Business Impact:
Helps keep your online information safe.
At the rapid pace of technological evolution, the emerging cloud computing technology has promoted the digitalization and business innovation of the enterprise in all industries due to its advantages of data storage and service mode. Nevertheless, given the swift progress in cloud computing services, the security problems have gradually appeared. The data breach and cyber attack happen frequently, which cause huge losses to enterprises and individuals. These issues have gradually become important constraints for the popularization of cloud computingTo tackle the problems outlined above, this paper constructs a security evaluation framework for cloud computing services, integrating the Analytic Hierarchy Process (AHP) with the Fuzzy Comprehensive Evaluation method. By applying this scientific and systematic methodology, the framework enables enterprises and individuals to better apprehend the security posture of cloud services, thereby fostering the healthy evolution of the entire industry.
Similar Papers
Hybrid Cloud Security: Balancing Performance, Cost, and Compliance in Multi-Cloud Deployments
Cryptography and Security
Helps companies use computers better and cheaper.
LLM-Assisted AHP for Explainable Cyber Range Evaluation
Cryptography and Security
Helps pick the best computer defense training games.
The "4W+1H" of Software Supply Chain Security Checklist for Critical Infrastructure
Software Engineering
Protects important computer systems from online attacks.