A Multi-layer Hierarchical Inter-Cloud Connectivity Model for Sequential Packet Inspection of Tenant Sessions Accessing BI as a Service

被引:4
作者
Al-Aqrabi, Hussain [1 ]
Liu, Lu [1 ]
Hill, Richard [1 ]
Antonopoulos, Nick [1 ]
机构
[1] Univ Derby, Sch Comp & Math, Distributed & Intelligent Syst Res Grp, Derby DE22 1GB, Derby, England
来源
2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS) | 2014年
关键词
component; Business intelligence; Cloud computing; Securit_as_service; BI as a service; Multi-layer controls; tenants vaults; Cloud tenants metadata; Intrusion prevention; Antimalware;
D O I
10.1109/HPCC.2014.83
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business Intelligence (BI) has gained a new lease of life through Cloud computing as its demand for unlimited hardware and platform resources expandability is fulfilled by the Cloud elasticity features. BI can be seamlessly deployed on the Cloud given that its multilayered model coincides with the Cloud multilayer models. It is considered by many Cloud service providers as one of the prominent applications services on public, outsourced private and outsourced community Clouds. However, in the shared domains of Cloud computing, BI is exposed to security and privacy threats by virtue of exploits, eavesdropping, distributed attacks, malware attacks, and such other known challenges on Cloud computing. Given the multi-layered model of BI and Cloud computing, its protection on Cloud computing needs to be ensured through multilayered controls. This paper proposed a multi-layered hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service on cloud computing through an algorithm for ensuring multi-level session inspections, and ensuring maximum security controls at all the seven layers, and prevent an attack from occurring. The simulations present the effects of distributed attacks on the BI systems by attackers posing as genuine Cloud tenants. The results reflect how the attackers are blocked by the multilayered security and privacy controls deployed for protecting the BI servers and databases.
引用
收藏
页码:498 / 505
页数:8
相关论文
共 20 条
[1]  
Al-Aqrabi H., P 14 INT S HIGH PERF, P953
[2]  
Al-Aqrabi H., P 15 IEEE INT S OBJ, P124
[3]   Business Intelligence Security on the Clouds: Challenges, Solutions and Future Directions [J].
Al-Aqrabi, Hussain ;
Liu, Lu ;
Hill, Richard ;
Ding, Zhijun ;
Antonopoulos, Nick .
2013 IEEE SEVENTH INTERNATIONAL SYMPOSIUM ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2013), 2013, :137-144
[4]  
[Anonymous], MIS Q
[5]  
[Anonymous], IEEE 1 INT WORKSH EN
[6]  
[Anonymous], 2011, 2011 IBM TECH TRENDS
[7]  
Carvalho M., 2011, ISSA Journal, P20
[8]   A privacy preserving authorisation system for the cloud [J].
Chadwick, David W. ;
Fatema, Kaniz .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (05) :1359-1373
[9]  
Demchenko Y., BOOK PRIVACY SECURIT, P167
[10]  
Demchenko Y., 2012, P 4 INT S CLOUD COMP, P2