Comprehensive Security Integrated Model and Ontology within Cloud Computing

被引:9
|
作者
Liu, Fong-Hao [1 ]
Lo, Hsiang-Fu [2 ]
Chen, Liang-Chu [1 ]
Lee, Wei-Tsong [2 ]
机构
[1] Natl Def Univ, Coll Management, Dept Informat Management, Taipei, Taiwan
[2] Tamkang Univ, Dept Elect Engn, Taipei, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2013年 / 14卷 / 06期
关键词
Cloud computing; Knowledge base; Ontology; Knowledge engineering; Network attack classification; SYSTEM; MANAGEMENT; ATTACKS;
D O I
10.6138/JIT.2013.14.6.08
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that bring up various security threats. They are extreme new, innumerous and mutational. Partial and fragmented network security knowledge is usually provided by traditional computer security systems, including IDS, anti-virus system, etc., and direct knowledge query of web search engines. However, they are unable to provide users with the comprehensive knowledge and rapid reaction solutions. Users are consequently hard to clarify the causes and consequences of network security problems. A Comprehensive Security Integrated (CSI) model with acquisition, storing, reusing and integration of network security knowledge for cloud computing is proposed to help understand and trace the suspicious network attack threats and origins. Also, several knowledge classes (frames) are constructed in the implementation for knowledge query and manipulation. The process of CSI model and how it provides the comprehensive knowledge for problem solving are then explained by demonstration cases. Moreover, the demonstration results indicate that the CSI model and the implementation are more efficient than traditional fragmented knowledge from web search.
引用
收藏
页码:935 / 945
页数:11
相关论文
共 50 条
  • [1] A Comprehensive Survey on Security in Cloud Computing
    Ramachandra, Gururaj
    Iftikhar, Mohsin
    Khan, Farrukh Aslam
    14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS, 2017, 110 : 465 - 472
  • [2] A COMPREHENSIVE REVIEW ON CLOUD COMPUTING SECURITY
    Shanmugasundaram, G.
    Aswini, V.
    Suganya, G.
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [3] Enterprise Architecture Modeling Based on Cloud Computing Security Ontology as a Reference Model
    Janulevicius, Justinas
    Marozas, Leonardas
    Cenys, Antanas
    Goranin, Nikolaj
    Ramanauskaite, Simona
    2017 OPEN CONFERENCE OF ELECTRICAL, ELECTRONIC AND INFORMATION SCIENCES (ESTREAM), 2017,
  • [4] Ontology-based access control model for security policy reasoning in cloud computing
    Choi, Chang
    Choi, Junho
    Kim, Pankoo
    JOURNAL OF SUPERCOMPUTING, 2014, 67 (03): : 711 - 722
  • [5] Ontology-based access control model for security policy reasoning in cloud computing
    Chang Choi
    Junho Choi
    Pankoo Kim
    The Journal of Supercomputing, 2014, 67 : 711 - 722
  • [6] Data Security Model for Cloud Computing
    Dai Yuefa
    Wu Bo
    Gu Yaqiang
    Zhang Quan
    Tang Chaojing
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 141 - 144
  • [7] Trust Model for Computing Security of Cloud
    Rathi, Snehal R.
    Kolekar, Vikas K.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [8] A Distributed Security Model for Cloud Computing
    Ahmed, Monjur
    Litchfield, Alan T.
    Sharma, Chandan
    AMCIS 2016 PROCEEDINGS, 2016,
  • [9] Better Security and Encryption Within Cloud Computing Systems
    Williams, K. Y. B.
    Griffin, Jimmy A. G.
    INTERNATIONAL JOURNAL OF PUBLIC ADMINISTRATION IN THE DIGITAL AGE, 2018, 5 (02) : 1 - 11
  • [10] A New Integrated Model of Cloud Computing
    Guo, Ping
    Li, Tao
    Dan, Guangxiang
    2014 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND AUTOMATION (ICMEA), 2014, : 395 - 399