Comprehensive Security Integrated Model and Ontology within Cloud Computing

被引:9
|
作者
Liu, Fong-Hao [1 ]
Lo, Hsiang-Fu [2 ]
Chen, Liang-Chu [1 ]
Lee, Wei-Tsong [2 ]
机构
[1] Natl Def Univ, Coll Management, Dept Informat Management, Taipei, Taiwan
[2] Tamkang Univ, Dept Elect Engn, Taipei, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2013年 / 14卷 / 06期
关键词
Cloud computing; Knowledge base; Ontology; Knowledge engineering; Network attack classification; SYSTEM; MANAGEMENT; ATTACKS;
D O I
10.6138/JIT.2013.14.6.08
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that bring up various security threats. They are extreme new, innumerous and mutational. Partial and fragmented network security knowledge is usually provided by traditional computer security systems, including IDS, anti-virus system, etc., and direct knowledge query of web search engines. However, they are unable to provide users with the comprehensive knowledge and rapid reaction solutions. Users are consequently hard to clarify the causes and consequences of network security problems. A Comprehensive Security Integrated (CSI) model with acquisition, storing, reusing and integration of network security knowledge for cloud computing is proposed to help understand and trace the suspicious network attack threats and origins. Also, several knowledge classes (frames) are constructed in the implementation for knowledge query and manipulation. The process of CSI model and how it provides the comprehensive knowledge for problem solving are then explained by demonstration cases. Moreover, the demonstration results indicate that the CSI model and the implementation are more efficient than traditional fragmented knowledge from web search.
引用
收藏
页码:935 / 945
页数:11
相关论文
共 50 条
  • [21] A Review on Security Issue in Security Model of Cloud Computing Environment
    Venkatakotireddy, G.
    Rao, B. Thirumala
    Vurukonda, Naresh
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2017, 2018, 668 : 207 - 212
  • [22] An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain
    Awadallah, Ruba
    Samsudin, Azman
    Teh, Je Sen
    Almazrooie, Mishal
    IEEE ACCESS, 2021, 9 : 69513 - 69526
  • [23] A RISK ASSESSMENT MODEL WITHIN CLOUD COMPUTING
    Neghina, Diana-Elena
    Scarlat, Emil
    INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2012, : 18 - +
  • [24] A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing
    Jangjou, Mehrdad
    Sohrabi, Mohammad Karim
    ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2022, 29 (06) : 3587 - 3608
  • [25] Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review
    Ali, Tarek
    Al-Khalidi, Mohammed
    Al-Zaidi, Rabab
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [26] A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing
    Can, Ozgu
    Thabit, Fursan
    Aljahdali, Asia Othman
    Al-Homdy, Sharaf
    Alkhzaimi, Hoda A.
    CYBERNETICS AND SYSTEMS, 2023,
  • [27] Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature
    Ogwara, Noah Oghenefego
    Petrova, Krassie
    Yang, Mee Loong
    2019 29TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2019,
  • [28] A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing
    Mehrdad Jangjou
    Mohammad Karim Sohrabi
    Archives of Computational Methods in Engineering, 2022, 29 : 3587 - 3608
  • [29] A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
    Kiraz, Mehmet Sabir
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (05) : 731 - 760
  • [30] A New Shared and Comprehensive Tool of Cloud Computing Security Risk Assessment
    Drissi, Saadia
    Benhadou, Siham
    Medromi, Hicham
    ADVANCES IN UBIQUITOUS NETWORKING, 2016, 366 : 155 - 167