Comprehensive Security Integrated Model and Ontology within Cloud Computing

被引:9
|
作者
Liu, Fong-Hao [1 ]
Lo, Hsiang-Fu [2 ]
Chen, Liang-Chu [1 ]
Lee, Wei-Tsong [2 ]
机构
[1] Natl Def Univ, Coll Management, Dept Informat Management, Taipei, Taiwan
[2] Tamkang Univ, Dept Elect Engn, Taipei, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2013年 / 14卷 / 06期
关键词
Cloud computing; Knowledge base; Ontology; Knowledge engineering; Network attack classification; SYSTEM; MANAGEMENT; ATTACKS;
D O I
10.6138/JIT.2013.14.6.08
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that bring up various security threats. They are extreme new, innumerous and mutational. Partial and fragmented network security knowledge is usually provided by traditional computer security systems, including IDS, anti-virus system, etc., and direct knowledge query of web search engines. However, they are unable to provide users with the comprehensive knowledge and rapid reaction solutions. Users are consequently hard to clarify the causes and consequences of network security problems. A Comprehensive Security Integrated (CSI) model with acquisition, storing, reusing and integration of network security knowledge for cloud computing is proposed to help understand and trace the suspicious network attack threats and origins. Also, several knowledge classes (frames) are constructed in the implementation for knowledge query and manipulation. The process of CSI model and how it provides the comprehensive knowledge for problem solving are then explained by demonstration cases. Moreover, the demonstration results indicate that the CSI model and the implementation are more efficient than traditional fragmented knowledge from web search.
引用
收藏
页码:935 / 945
页数:11
相关论文
共 50 条
  • [31] A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
    Mehmet Sabır Kiraz
    Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 731 - 760
  • [32] HOW SECURE IS YOUR CLOUD: CLASSIFICATION OF SECURITY THREATS AND COUNTERMEASURES WITHIN CLOUD COMPUTING?
    Almotiri, Sultan H.
    Al Ghamdi, Mohammed A.
    Saeed, Atif
    Shahid, Muhammad
    Masood, Khalid
    Nagra, Arfan Ali
    Asif, Muhammad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (08): : 228 - 241
  • [33] On Cloud Computing Security
    Bai, Yun
    Policarpio, Sean
    RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2011, 162 : 388 - 396
  • [34] Cloud Computing Security
    Carlin, Sean
    Curran, Kevin
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2011, 3 (01) : 14 - 19
  • [35] Cloud Computing Virtualization: A Comprehensive Survey
    Rista, Amarildo
    Ajdari, Jaumin
    Zenuni, Xhemal
    2020 43RD INTERNATIONAL CONVENTION ON INFORMATION, COMMUNICATION AND ELECTRONIC TECHNOLOGY (MIPRO 2020), 2020, : 462 - 472
  • [36] Security in Cloud Computing
    Rishitha
    Reshmi, T. R.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 14 - 20
  • [37] A Security Threats Measurement Model for Reducing Cloud Computing Security Risk
    Lai, Sen-Tarng
    Leu, Fang-Yie
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 414 - 419
  • [38] Research on the security mechanism of cloud computing service model
    Zhang Y.
    Automatic Control and Computer Sciences, 2016, 50 (2) : 98 - 106
  • [39] Evaluation and Analysis on Security Framework Model of Cloud Computing
    Li, Zhao
    PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING (ICCMCEE 2015), 2015, 37 : 572 - 578
  • [40] Security as a Service Model for Virtualization Vulnerabilities in Cloud Computing
    Paikrao, Rahul L.
    Patil, Varsha H.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 559 - 562