{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T01:24:45Z","timestamp":1767835485451,"version":"3.49.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-025-05189-0","type":"journal-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T11:40:46Z","timestamp":1755603646000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A cloud service security risk measurement method based on information entropy and Markov chain"],"prefix":"10.1007","volume":"28","author":[{"given":"Jian","family":"Yu","sequence":"first","affiliation":[]},{"given":"Xiangmei","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,19]]},"reference":[{"key":"5189_CR1","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s10586-024-04696-w","volume":"28","author":"K Routray","year":"2025","unstructured":"Routray, K., Bera, P.: Privacy preserving spatio-temporal attribute-based encryption for cloud applications. Clust. Comput. 28, 34 (2025). https:\/\/doi.org\/10.1007\/s10586-024-04696-w","journal-title":"Clust. Comput."},{"key":"5189_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10586-024-04718-7","volume":"28","author":"M Haris","year":"2025","unstructured":"Haris, M., Zubair, S.: Battle Royale deep reinforcement learning algorithm for effective load balancing in cloud computing. Clust. Comput. 28, 19 (2025). https:\/\/doi.org\/10.1007\/s10586-024-04718-7","journal-title":"Clust. Comput."},{"key":"5189_CR3","first-page":"44","volume":"2","author":"A Kumar","year":"2024","unstructured":"Kumar, A., et al.: Adoption and acquisition of artificial intelligence and cloud computing by small and medium enterprises (SMEs) for enhancing environment sustainability. Indian J. Environ. Prot. 2, 44 (2024)","journal-title":"Indian J. Environ. Prot."},{"issue":"1","key":"5189_CR4","first-page":"35","volume":"4","author":"AA Mughal","year":"2021","unstructured":"Mughal, A.A.: Cybersecurity architecture for the cloud: protecting network in a virtual environment. Int. J. Intel. Autom. Comput. 4(1), 35\u201348 (2021)","journal-title":"Int. J. Intel. Autom. Comput."},{"issue":"1","key":"5189_CR5","first-page":"13","volume":"7","author":"H Akbar","year":"2023","unstructured":"Akbar, H., Zubair, M., Malik, M.S.: The security issues and challenges in cloud computing. Int. J. Electronic Crime Invest. 7(1), 13\u201332 (2023)","journal-title":"Int. J. Electronic Crime Invest."},{"issue":"3","key":"5189_CR6","doi-asserted-by":"publisher","first-page":"422","DOI":"10.3390\/network3030018","volume":"3","author":"M Chauhan","year":"2023","unstructured":"Chauhan, M., Shiaeles, S.: An analysis of cloud security frameworks, problems and proposed solutions. Network 3(3), 422\u2013450 (2023)","journal-title":"Network"},{"issue":"2","key":"5189_CR7","first-page":"32","volume":"10","author":"L Yaolei","year":"2019","unstructured":"Yaolei, L., Xingshu, C., Xiang, L.: A security evaluation model for cloud computing service supply chain. Cyberspace Secur. 10(2), 32\u201340 (2019)","journal-title":"Cyberspace Secur."},{"key":"5189_CR8","doi-asserted-by":"crossref","unstructured":"Zhengwei, J., Ran, D., Zhigang, L., et al.: A meta-synthesis approach for cloud service provider selection based on secsla, Computational and Information Sciences(ICCIS), 2013 Fifth International Conference, pp. 1356\u20131360 (2013).","DOI":"10.1109\/ICCIS.2013.359"},{"key":"5189_CR9","first-page":"1","volume":"42","author":"X Li","year":"2018","unstructured":"Li, X., Jin, X., Wang, Q., et al.: SCCAF: a secure and compliant continuous assessment Fra-nework in cloud-based IoT context. Wireless Commun. Mobile Comput. 42, 1\u201318 (2018)","journal-title":"Wireless Commun. Mobile Comput."},{"issue":"4","key":"5189_CR10","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.jss.2018.05.004","volume":"34","author":"L Lu","year":"2018","unstructured":"Lu, L., Yuan, Y.: A novel TOPSIS evaluation scheme for cloud service trustworthiness combining objective and subjective aspects. J. Syst. Softw. 34(4), 71\u201386 (2018)","journal-title":"J. Syst. Softw."},{"issue":"3","key":"5189_CR11","first-page":"311","volume":"41","author":"Z Xiaolin","year":"2021","unstructured":"Xiaolin, Z., Chonghan, Z., Jingfeng, X., Qingyu, L., Guo, G.: Research on a multidimensional network security measurement model based on TOPSIS. J. Beijing Inst. Technol. 41(3), 311\u2013321 (2021)","journal-title":"J. Beijing Inst. Technol."},{"issue":"3","key":"5189_CR12","first-page":"71","volume":"53","author":"R Shuhua","year":"2018","unstructured":"Shuhua, R., Junhao, W., Hui, M., et al.: Cloud security risk assessment measurement model. J. Shandong Univ. 53(3), 71\u201376 (2018)","journal-title":"J. Shandong Univ."},{"key":"5189_CR13","doi-asserted-by":"crossref","unstructured":"Saripalli, P., Ben, W.: QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security.2010 IEEF 3rd International Conference on Cloud Computing, pp. 232\u2013245 (2010).","DOI":"10.1109\/CLOUD.2010.22"},{"key":"5189_CR14","unstructured":"Chandran, S., Mridula, A.: Cloud Computing:analysing the risks involved in cloud computing environments. Proceedings of Natural Sciences and Engineering (2020)."},{"issue":"11","key":"5189_CR15","first-page":"49","volume":"37","author":"F Benming","year":"2011","unstructured":"Benming, F., Zhuo, T., Kenli, L.: Risk calculation model for storage resources in cloud environment. Comput. Eng. 37(11), 49\u201351 (2011)","journal-title":"Comput. Eng."},{"issue":"24","key":"5189_CR16","first-page":"50","volume":"32","author":"F Xuefeng","year":"2018","unstructured":"Xuefeng, F., Gong, J., Lv, X.: The application of fuzzy neural network information security risk assessment method in information systems. Modern Comput. 32(24), 50\u201354 (2018)","journal-title":"Modern Comput."},{"issue":"02","key":"5189_CR17","first-page":"61","volume":"32","author":"Y Yihan","year":"2020","unstructured":"Yihan, Y., Fu, Y., Xiaoping, W.: Construction of privacy security risk assessment system in the Internet environment. J. Naval Univ. Eng. 32(02), 61\u201366 (2020)","journal-title":"J. Naval Univ. Eng."},{"issue":"07","key":"5189_CR18","first-page":"1489","volume":"38","author":"F Yu","year":"2010","unstructured":"Yu, F., Wu, X., Ye, Q., Peng, X.: Research on information system security risk assessment based on fuzzy set and entropy weight theory. J. Electron. 38(07), 1489\u20131494 (2010)","journal-title":"J. Electron."},{"issue":"06","key":"5189_CR19","first-page":"207","volume":"31","author":"F Sha","year":"2012","unstructured":"Sha, F., Dan, S.: Information security risk assessment method based on AHP and fuzzy comprehensive evaluation. Lab. Res. Exp. 31(06), 207\u2013211 (2012)","journal-title":"Lab. Res. Exp."},{"issue":"09","key":"5189_CR20","first-page":"117","volume":"31","author":"F Sha","year":"2013","unstructured":"Sha, F., Yezhi, X., Minghua, L.: Research on campus information system security risk assessment based on fuzzy set and entropy weight theory. Intel. Sci. 31(09), 117\u2013121 (2013)","journal-title":"Intel. Sci."},{"issue":"17","key":"5189_CR21","first-page":"103","volume":"43","author":"F Sha","year":"2013","unstructured":"Sha, F., Wenbin, L., Juan, X.: Application of fuzzy risk assessment method based on entropy weight theory in network systems. Math. Pract. Underst. 43(17), 103\u2013109 (2013)","journal-title":"Math. Pract. Underst."},{"issue":"1","key":"5189_CR22","first-page":"128","volume":"34","author":"C Song","year":"2022","unstructured":"Song, C., Guangwei, W.: Research on information system security risk assessment. Commun. Technol. 34(1), 128\u2013130 (2022)","journal-title":"Commun. Technol."},{"issue":"2","key":"5189_CR23","first-page":"1288","volume":"17","author":"ZW Yu","year":"2023","unstructured":"Yu, Z.W., Ji, Z.Y.: A survey on the evolution of risk evaluation for information systems security. Energy Procedia 17(2), 1288\u20131294 (2023)","journal-title":"Energy Procedia"},{"issue":"10","key":"5189_CR24","first-page":"62","volume":"42","author":"L Xianyu","year":"2022","unstructured":"Xianyu, L.: Analysis of possible network security risks in cloud environment. Comput. CD Software Appl. 42(10), 62\u201364 (2022)","journal-title":"Comput. CD Software Appl."},{"issue":"11","key":"5189_CR25","first-page":"36","volume":"3","author":"J Zhengwei","year":"2019","unstructured":"Zhengwei, J., Baoxu, L.: Analysis of cloud computing security threats and risks. Inform. Secur. Technol. 3(11), 36\u201338 (2019)","journal-title":"Inform. Secur. Technol."},{"issue":"2","key":"5189_CR26","first-page":"1","volume":"37","author":"L Zhaoji","year":"2021","unstructured":"Zhaoji, L., Xiong, F., Ruchuan, W., Zhijie, H.: Research on key issues of cloud computing security. Inform. Technol. Res. 37(2), 1\u20134 (2021)","journal-title":"Inform. Technol. Res."},{"issue":"7","key":"5189_CR27","first-page":"8","volume":"30","author":"Z Weikuang","year":"2021","unstructured":"Weikuang, Z., Liu, M., Li, Z.: Research on competitive intelligence security issues and countermeasures of enterprises in the cloud era. Intel. J. 30(7), 8\u201312 (2021)","journal-title":"Intel. J."},{"key":"5189_CR28","unstructured":"Heiser, J., Nicolett, M.: Asseing the Security Risks of Cloud Computing. Stand ford: Gartner Group Research Report (2018)."},{"key":"5189_CR29","doi-asserted-by":"crossref","unstructured":"Barakat, L., Miles, S., Luck, M.: Efficient Correlation-aware Service Selection[C].Proceedings of 2012 IEEF International Conference on Web Services (ICWS), pp. 1\u20138(2012).","DOI":"10.1109\/ICWS.2012.62"},{"key":"5189_CR30","doi-asserted-by":"crossref","unstructured":"Wagner, F., Klein, A., Klopper, B., et al.: Multi-objective Service Composition with Time- and Input-Dependent QoS, Proceedigs of 2023 IEEE 29th Inenaional Conference on Web Services (ICWS), pp. 234\u2013241 (2023).","DOI":"10.1109\/ICWS.2012.40"},{"issue":"4","key":"5189_CR31","first-page":"128","volume":"37","author":"C Huiping","year":"2018","unstructured":"Huiping, C., Ling, J., Yuqing, C.: A review of research on cloud service security risks. Intel. J. 37(4), 128\u2013134 (2018)","journal-title":"Intel. J."},{"key":"5189_CR32","unstructured":"Fadhil, I.S., Nizar, N.B., Rostam, R.J.: \u201cSecurity and privacy issues in cloud computing.\u201d Authorea Preprints (2023)."},{"key":"5189_CR33","doi-asserted-by":"crossref","unstructured":"Hasan, M. Z., et al.: \u201cData security and integrity in cloud computing.\u201d 2023 International Conference for Advancement in Technology (ICONAT). IEEE, 2023.","DOI":"10.1109\/ICONAT57137.2023.10080440"},{"issue":"3","key":"5189_CR34","doi-asserted-by":"publisher","first-page":"1918","DOI":"10.1109\/TDSC.2020.3041733","volume":"19","author":"B Jiang","year":"2022","unstructured":"Jiang, B., Ming, L., Ravi, T.: Local information privacy and its application to privacy-preserving data aggregation. IEEE Trans. Dependable Secure Comput. 19(3), 1918\u20131935 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"5189_CR35","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.jer.2023.10.031","volume":"12","author":"AK Samha","year":"2024","unstructured":"Samha, A.K.: Strategies for efficient resource management in federated cloud environments supporting Infrastructure as a Service (IaaS). J. Eng. Res. 12(2), 101\u2013114 (2024)","journal-title":"J. Eng. Res."},{"key":"5189_CR36","first-page":"78","volume":"6","author":"XD Hou","year":"2024","unstructured":"Hou, X.D.: Research on the challenges and countermeasures of cloud computing PaaS platform application in the information and innovation industry. Consum. Electron. 6, 78\u201380 (2024)","journal-title":"Consum. Electron."},{"issue":"8","key":"5189_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJDST.307903","volume":"13","author":"A Tanveer","year":"2022","unstructured":"Tanveer, A., Rajiv, P., Mohammad, F.: Authorization model for securing cloud SaaS services (Netflix). Int. J. Distrib. Syst. Technol. 13(8), 1\u201313 (2022)","journal-title":"Int. J. Distrib. Syst. Technol."},{"key":"5189_CR38","unstructured":"China Information Security Standardization Technical Committee GB\/T 31509\u20132021 Information Security Technology - Implementation Guidelines for Information Security Risk Assessment, Beijing: China Standards Publishing House, (2021)."},{"key":"5189_CR39","unstructured":"China Information Security Standardization Technical Committee.GB\/T 31509\u20132021 Information Security Technology Information Security Risk Assessment Implementation Guide, Beijing, China Standard Press (2021)."},{"key":"5189_CR40","volume-title":"GB\/T 31167\u20132022 information security technology cloud computing service security guidelines","author":"China Information Security Standardization Technical Committee","year":"2022","unstructured":"China Information Security Standardization Technical Committee: GB\/T 31167\u20132022 information security technology cloud computing service security guidelines. China Standards Publishing House, Beijing (2022)"},{"key":"5189_CR41","unstructured":"China Information Security Standardization Technical Committee.GB\/T 31167\u20132022 Information Security Technology Cloud Computing Services Security Guide, Beijing, China Standard Press (2022)"},{"key":"5189_CR42","volume-title":"GB\/T 31168\u20132022 information security technology cloud computing service security capability requirements","author":"China Information Security Standardization Technical Committee","year":"2022","unstructured":"China Information Security Standardization Technical Committee: GB\/T 31168\u20132022 information security technology cloud computing service security capability requirements. China Standards Publishing House, Beijing (2022)"},{"key":"5189_CR43","unstructured":"China Information Security Standardization Technical Committee.GB\/T 31168\u20132022 Information Security Technology Cloud Computing Services Security Capability Requirements, Beijing, China Standard Press,(2022)."},{"key":"5189_CR44","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-030-73991-1_3","volume":"988","author":"R Wolf","year":"2021","unstructured":"Wolf, R.: Information and entropies. Lect. Notes Phys. 988, 53\u201389 (2021)","journal-title":"Lect. Notes Phys."},{"issue":"4","key":"5189_CR45","first-page":"664","volume":"20","author":"Y Ming","year":"2018","unstructured":"Ming, Y., Rong, J., Tilei, G., Wan, X.: Research on cloud computing security risk assessment based on information entropy and Markov chain. Int. J. Netw. Secur. 20(4), 664\u2013673 (2018)","journal-title":"Int. J. Netw. Secur."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05189-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05189-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05189-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T19:08:00Z","timestamp":1757963280000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05189-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,19]]},"references-count":45,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5189"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05189-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,19]]},"assertion":[{"value":"11 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"516"}}