Information Security Risk Assessment Based on Cloud Computing and BP Neural Network

  • Zheng ZhangEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1146)


With the rapid development of information technology, the risk of information security has also risen. At present, individuals, and nations attach great importance to information security issues, and information security assessment has become a necessary technical means. This paper uses cloud computing and BP neural network to use the analytic hierarchy process to evaluate the information security risk and verify the applicability of this method to information security evaluation. This paper collects and processes a large number of information security risk events, and obtains four first-level indicators that affect information security, including law, platform, user, and technology, and analyzes them with the first-level indicators. Causes, discuss them and draw relevant conclusions. The experimental results show that to reduce information security risks, related technology companies should invest heavily in technology security research, improve technology security and reliability, and the platform should consciously do a good job of protecting customer privacy and optimizing operation plans. Related departments should also introduce and Update relevant laws and regulations in a timely manner and popularize corresponding treatment methods for users who encounter security risks. Users also need to raise their own method awareness. It is also verified that the method is suitable for information security risk assessment and has good results.


Cloud computing BP neural network Information security risk assessment Analytic hierarchy process 


  1. 1.
    Rodrigues, T.G., Suto, K., Nishiyama, H.: Hybrid method for minimizing service delay in edge cloud computing through VM migration and transmission power control. IEEE Trans. Comput. 66(5), 810–819 (2017)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Buyya, R., Yeo, C.S., Venugopal, S.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009)CrossRefGoogle Scholar
  3. 3.
    Al-Dhuraibi, Y., Paraiso, F., Djarallah, N.: Elasticity in cloud computing: state of the art and research challenges. IEEE Trans. Serv. Comput. 11, 430–447 (2017)CrossRefGoogle Scholar
  4. 4.
    Ma, L., Wang, B., Yan, S.: Temperature error correction based on BP neural network in meteorological wireless sensor network. Int. J. Sens. Netw. 23(4), 265 (2017)CrossRefGoogle Scholar
  5. 5.
    Lu, Y., Zhang, P.-P., Wang, X.-Y.: AACMM length error compensation based on PSO-BP neural network. Acta Metrol. Sin. 38(3), 271–275 (2017)Google Scholar
  6. 6.
    Zhao, H., Shi, S., Jiang, H.: Calibration of AOTF-based 3D measurement system using multiplane model based on phase fringe and BP neural network. Opt. Express 25(9), 10413 (2017)CrossRefGoogle Scholar
  7. 7.
    Wang, F., Dong, Z., Wu, Z.: Optimization of maize planting density and fertilizer application rate based on BP neural network. Trans. Chin. Soc. Agric. Eng. 33(6), 92–99 (2017)CrossRefGoogle Scholar
  8. 8.
    Wang, G., Zhang, Y.S., Yang, L.: Paste-filling weighing control system optimization based on neural network. World J. Eng. 14(2), 155–158 (2017)CrossRefGoogle Scholar
  9. 9.
    Ayatollahi, H., Shagerdi, G.: Information security risk assessment in hospitals. Open Med. Inform. J. 11(1), 37–43 (2017)CrossRefGoogle Scholar
  10. 10.
    Zhou, C., Wang, Z., Guo, J.: Research on information security system of waste terminal disposal process. IOP Conf. Ser. Earth Environ. Sci. 64(1), 012074 (2017)CrossRefGoogle Scholar
  11. 11.
    Fu, C., Wang, X., Zhang, W.: A component security attribute model driven information security risk assessment approach for train control center. Tiedao Xuebao/J. China Railw. Soc. 39(8), 77–84 (2017)Google Scholar
  12. 12.
    Aditham, S., Ranganathan, N.: A system architecture for the detection of insider attacks in big data systems. IEEE Trans. Dependable Secur. Comput. 15(6), 974–987 (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Jiangxi Vocational and Technical College of CommunicationsNanchangChina

Personalised recommendations