Community Cloud: Concept, Model, Attacks and Solution

被引:2
|
作者
Nicanfar, Hasen
Liu, Qiang
TalebiFard, Peyman
Cai, Wei
Leung, Victor C. M.
机构
关键词
Community Cloud; Security; Privacy; IDS; SECURITY; PRIVACY;
D O I
10.1109/CloudCom.2013.163
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new model of community cloud (ComC) interaction that is based on the demand of tenants and propose an intrusion detection mechanism for the proposed model. ComC is a solution that is more secure than the public cloud, and less costly than the private cloud. We argue that our proposed model of the ComC will be more beneficial to consumers as well as providers. Our evaluation shows the efficiency of the proposed model from cost and operation point of views. In addition, our analysis shows that our proposed IDS can make the ComC a safe environment and can guarantee the security and privacy of the customers.
引用
收藏
页码:126 / 131
页数:6
相关论文
共 50 条
  • [21] A cloud supported model for efficient community health awareness
    Quwaider, Muhannad
    Jararweh, Yaser
    PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 35 - 50
  • [22] Cloud-CoCoSo: Cloud Model-Based Combined Compromised Solution Model for Trusted Cloud Service Provider Selection
    Sudakshina Mandal
    Danish Ali Khan
    Arabian Journal for Science and Engineering, 2022, 47 : 10307 - 10332
  • [23] Evaluation of Kubernetes Schedulers for a Community Cloud Computing Model
    Gough, Erik
    PRACTICE AND EXPERIENCE IN ADVANCED RESEARCH COMPUTING 2024, PEARC 2024, 2024,
  • [24] Cloud-CoCoSo: Cloud Model-Based Combined Compromised Solution Model for Trusted Cloud Service Provider Selection
    Mandal, Sudakshina
    Khan, Danish Ali
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2022, 47 (08) : 10307 - 10332
  • [25] Implementation of a solution Cloud Computing with Map Reduce model
    Baya, Chalabi
    HIGH PERFORMANCE COMPUTING SYMPOSIUM 2013 (HPCS 2013), 2014, 540
  • [26] A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud
    Godfrey, Michael
    Zulkernine, Mohammad
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 163 - 170
  • [27] Private Data Inference Attacks against Cloud: Model, Technologies, and Research Directions
    Gong, Xueluan
    Chen, Yanjiao
    Wang, Qian
    Wang, Meng
    Li, Shuyang
    IEEE COMMUNICATIONS MAGAZINE, 2022, 60 (09) : 46 - 52
  • [28] RECENT ATTACKS ON CONCEPT OF INTELLIGENCE
    VERNON, PE
    REVUE INTERNATIONALE DE PSYCHOLOGIE APPLIQUEE, 1975, 24 (02): : 93 - 98
  • [29] Quantum walks-based classification model with resistance for cloud computing attacks
    Wu, Xiaodong
    Jin, Zhigang
    Zhou, Junyi
    Duan, Chenxu
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 232
  • [30] First Stage Detection of Node Capture Attacks in WSN based on Cloud Model
    Lu Peng
    Zhang Guangwei
    Xu Xiaobin
    Sun Qibo
    Yang Fangchun
    RESEARCH IN MATERIALS AND MANUFACTURING TECHNOLOGIES, PTS 1-3, 2014, 835-836 : 905 - 912