scholarly journals Risk Situation Assessment Model Based on Interdomain Interaction in Cloud Computing Environment

2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Gaocai Wang ◽  
Ning Yu

With the widespread application of cloud computing sharing technology, the demand for cross-domain interaction is also increasing. However, due to the uncertainty of interaction behaviour and the difference of network service quality, the risk of cross-domain interaction cannot be accurately evaluated. Therefore, this paper proposes a risk situation evaluation model based on interdomain interactions. The model collects interactive credentials such as the frequency, credibility, and time-effectiveness of the user-submitted evaluations. At the same time, it collects the evaluation of quality of service provided by the network security domain. Then, we set up a risk evaluation equation based on the interaction credentials to implement the risk evaluation of cross-domain interaction behaviour. Finally, we apply MATLAB platform to simulate the evolution process of evaluation. The experimental results show that, compared with other models, the evaluation method proposed in this paper improves the accuracy of the evaluation results and meets the security requirements of multidomain interaction.

2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
Baofeng Shi ◽  
Bin Meng ◽  
Jing Wang

This paper introduces a novel decision assessment method which is suitable for customers’ credit risk evaluation and credit decision. First of all, the paper creates an optimal credit rating model, and it consisted of an objective function and two constraint conditions. The first constraint condition of the strictly increasing LGDs eliminates the unreasonable phenomenon that the higher the credit rating is, the higher the LGD (loss given default) is. Secondly, on the basis of the credit rating results, a credit decision-making assessment model based on measuring the acceptable maximum LGD of commercial banks is established. Thirdly, empirical results using the data on 2817 farmers’ microfinance of a Chinese commercial bank suggest that the proposed approach can accurately find out the good customers from all the loan applications. Moreover, our approach contributes to providing a reference for decision assessment of customers in other commercial banks in the world.


Electronics ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 130 ◽  
Author(s):  
Guofang Dong ◽  
Wei Wei ◽  
Xu Xia ◽  
Marcin Woźniak ◽  
Robertas Damaševičius

Improving safety management and risk evaluation methods is important for the global mining industry, which is the backbone of the industrial development of our society. To prevent any accidental loss or harm to human life and property, a safety risk assessment method is needed to perform the continuous risk assessment of mines. Based on the requirements of mine safety evaluation, this paper proposes the Pb-Zn mine safety risk evaluation model based on the fuzzy-grey correlation analysis method. The model is compared with the risk assessment model based on the fuzzy TOPSIS method. Through the experiments, our results demonstrate that the proposed fuzzy-grey correlation model is more sensitive to risk and has less effect on the evaluation results under different scoring attitudes (cautious, rational, and relaxed).


2019 ◽  
Vol 29 (2) ◽  
pp. 221-229
Author(s):  
Lin Long ◽  
Zhida Li

In order to better evaluate the monitoring risk of deep excavation, an assessment model based on fuzzy theory was established by combining the uncertainty and membership degree of evaluation indexes with the fuzziness of experts’ comments. Firstly, considering the risk sources as evaluation indexes, the monitoring risk evaluation system for deep excavation was establish, and the risk evaluation function was constructed. Secondly, the risk assessment model based on fuzzy theory was put forward, analytic hierarchy process was used to determine the weight of evaluation indexes, and expert evaluation weight was introduced to correct the evaluation function. Finally, comprehensive risk grade in deep excavation was obtained and the risk decisions were put forward by calculating the value of modified evaluation function. Through the application of the monitoring risk assessment model in the deep excavation of World Trade Group, the results are in accordance with the engineering practice. The results suggest that the model based on fuzzy theory is efficient for evaluating the monitoring risks and can be used in the application of deep excavation evaluation. Meanwhile, the applicability and accuracy of the assessment model are verified.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Zhenguo Yan ◽  
Yanping Wang

In order to effectively reduce the risk of subway fires and to improve the safety of passengers, a review of the background to subway fires employing literature and comparative analyses, computer simulation, expert consultation, and other research methods has been employed to conduct an in-depth study of subway fire risk assessment and control measures. A subway fire risk assessment model based on analysis theory was established. Firstly, a subway fire risk evaluation index system was developed, and the weight values of each level were determined using the interval analytic hierarchy process (IAHP), then the evaluation was derived using the fuzzy evaluation method, and the passenger distribution simulation was introduced to improve the objectivity of the evaluation. The results show that the fire evaluation of this subway system is safe. The results show that a subway fire risk assessment model may provide a scientific basis for establishing prevention and control measures, extinguishing methods, passenger safety evacuation schemes, and carrying out fire safety management activities during subway operations.


Author(s):  
Jin Han ◽  
Jing Zhan ◽  
Xiaoqing Xia ◽  
Xue Fan

Background: Currently, Cloud Service Provider (CSP) or third party usually proposes principles and methods for cloud security risk evaluation, while cloud users have no choice but accept them. However, since cloud users and cloud service providers have conflicts of interests, cloud users may not trust the results of security evaluation performed by the CSP. Also, different cloud users may have different security risk preferences, which makes it difficult for third party to consider all users' needs during evaluation. In addition, current security evaluation indexes for cloud are too impractical to test (e.g., indexes like interoperability, transparency, portability are not easy to be evaluated). Methods: To solve the above problems, this paper proposes a practical cloud security risk evaluation method of decision-making based on conflicting roles by using the Analytic Hierarchy Process (AHP) with Aggregation of Individual priorities (AIP). Results: Not only can our method bring forward a new index system based on risk source for cloud security and corresponding practical testing methods, but also can obtain the evaluation result with the risk preferences of conflicting roles, namely CSP and cloud users, which can lay a foundation for improving mutual trusts between the CSP and cloud users. The experiments show that the method can effectively assess the security risk of cloud platforms and in the case where the number of clouds increased by 100% and 200%, the evaluation time using our methodology increased by only by 12% and 30%. Conclusion: Our method can achieve consistent decision based on conflicting roles, high scalability and practicability for cloud security risk evaluation.


Sign in / Sign up

Export Citation Format

Share Document