Community Cloud: Concept, Model, Attacks and Solution

被引:2
|
作者
Nicanfar, Hasen
Liu, Qiang
TalebiFard, Peyman
Cai, Wei
Leung, Victor C. M.
机构
关键词
Community Cloud; Security; Privacy; IDS; SECURITY; PRIVACY;
D O I
10.1109/CloudCom.2013.163
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new model of community cloud (ComC) interaction that is based on the demand of tenants and propose an intrusion detection mechanism for the proposed model. ComC is a solution that is more secure than the public cloud, and less costly than the private cloud. We argue that our proposed model of the ComC will be more beneficial to consumers as well as providers. Our evaluation shows the efficiency of the proposed model from cost and operation point of views. In addition, our analysis shows that our proposed IDS can make the ComC a safe environment and can guarantee the security and privacy of the customers.
引用
收藏
页码:126 / 131
页数:6
相关论文
共 50 条
  • [31] A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems
    Kholidy, Hisham A.
    Erradi, Abdelkarim
    Abdelwahed, Sherif
    Azab, Abdulrahman
    2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 14 - +
  • [32] Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models
    Gong, Xueluan
    Wang, Qian
    Chen, Yanjiao
    Yang, Wang
    Jiang, Xinchang
    IEEE COMMUNICATIONS MAGAZINE, 2020, 58 (12) : 83 - 89
  • [33] A Survey on Data Integrity Attacks and DDoS Attacks in Cloud Computing
    Tian, Yun
    Nogales, Andres F. Romero
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 788 - 794
  • [34] A Proof-of-Concept Model Demonstration of System Level Cyber Attacks on Availability
    Kannan, Uma
    Swamidurai, Rajendran
    Umphress, David
    IEEE SOUTHEASTCON 2018, 2018,
  • [35] Exploiting INFN-Cloud to implement a Cloud solution to support the CYGNO computing model
    Amaro, F. D.
    Antonacci, M.
    Baracchini, E.
    Benussi, D. L.
    Bianco, S.
    Capoccia, C.
    Caponero, M.
    Cardoso, D. S.
    Cavoto, G.
    Ciangottini, D.
    Cortez, A.
    Costa, I. A.
    D'Imperio, G.
    Dane, I. E.
    Dho, G.
    Di Giambattista, F.
    Di Marco, E.
    Duma, C.
    Iacoangeli, F.
    Lima, H. P., Jr.
    Lopes, G. S. P.
    Maccarrone, G.
    Mano, R. D. P.
    Marafini, M.
    Gregorio, R. R. Marcelo
    Marques, D. J. G.
    Mazzitelli, G.
    McLean, A. G.
    Messina, A.
    Monteiro, C. M. B.
    Nobrega, A. R. A.
    Pains, I. F.
    Paoletti, E.
    Passamonti, L.
    Pelosi, S.
    Petrucci, I. F.
    Piacentini, S.
    Piccolo, D.
    Pierluigi, D.
    Pinci, D.
    Prajapati, A.
    Renga, F.
    Rodano, A.
    Roque, R. J. C.
    Rosatelli, F.
    Russo, A.
    Saviano, G.
    Spiga, D.
    Spooner, N. J. C.
    Stanlio, S.
    INTERNATIONAL SYMPOSIUM ON GRIDS & CLOUDS 2022, 2022,
  • [36] Cloud Model-A Bidirectional Cognition Model between Concept's Extension and Intension
    Wang, Guoyin
    Xu, Changlin
    ADVANCED MACHINE LEARNING TECHNOLOGIES AND APPLICATIONS, 2012, 322 : 391 - 400
  • [37] Cloud Fusion Concept
    Sakashita, Yoshitaka
    Takayama, Kuniharu
    Matsuo, Akihiko
    Kurihara, Hidetoshi
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2012, 48 (02): : 143 - 150
  • [38] Developing a Model for Integrating Government Services With use of Cloud Computing Concept
    Harandizadeh, Bahareh
    PROCEEDINGS OF THE 16TH EUROPEAN CONFERENCE ON E-GOVERNMENT (ECEG 2016), 2016, : 84 - 90
  • [39] Detecting selective forwarding attacks on cloud
    Wang, Haozhen
    Wang, Yuhang
    Wu, Yuanming
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 137
  • [40] Detecting Denial of Service Attacks in the Cloud
    Kumar, Raneel
    Lal, Sunil Pranit
    Sharma, Alok
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 309 - 316