Title
A Multi-layer Hierarchical Inter-cloud Connectivity Model for Sequential Packet Inspection of Tenant Sessions Accessing BI as a Service
Abstract
Business Intelligence (BI) has gained a new lease of life through Cloud computing as its demand for unlimited hardware and platform resources expandability is fulfilled by the Cloud elasticity features. BI can be seamlessly deployed on the Cloud given that its multilayered model coincides with the Cloud models. It is considered by many Cloud service providers as one of the prominent applications services on public, outsourced private and outsourced community Clouds. However, in the shared domains of Cloud computing, BI is exposed to security and privacy threats by virtue of exploits, eavesdropping, distributed attacks, malware attacks, and such other known challenges on Cloud computing. Given the multi-layered model of BI and Cloud computing, its protection on Cloud computing needs to be ensured through multilayered controls. This paper proposed a multi-layered hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service on cloud computing through an algorithm for ensuring multi-level session inspections, and ensuring maximum security controls at all the seven layers, and prevent an attack from occurring. The simulations present the effects of distributed attacks on the BI systems by attackers posing as genuine Cloud tenants. The results reflect how the attackers are blocked by the multilayered security and privacy controls deployed for protecting the BI servers and databases.
Year
DOI
Venue
2014
10.1109/HPCC.2014.83
High Performance Computing and Communications, 2014 IEEE 6th Intl Symp Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf Embedded Software and Syst
Keywords
Field
DocType
cloud computing,competitive intelligence,data privacy,invasive software,BI as a service,BI server protection,applications services,business intelligence,cloud computing,cloud elasticity features,databases,distributed attacks,malware attacks,multilayer hierarchical Intercloud connectivity model,multilayered controls,multilayered hierarchical intercloud connectivity model,multilayered model,multilayered security,multilevel session inspections,privacy controls,privacy threats,security threats,sequential packet inspection,tenant sessions,Antimalware,BI as a service,Business intelligence,Cloud computing,Cloud tenants metadata,Intrusion prevention,Multi-layer controls,Securit_as_service,tenants vaults
Deep packet inspection,Security controls,Authentication,Computer science,Computer security,Server,Computer network,Cloud computing security,Business intelligence,Cloud testing,Cloud computing,Distributed computing
Conference
Citations 
PageRank 
References 
2
0.36
9
Authors
4
Name
Order
Citations
PageRank
Hussain Al-Aqrabi1425.62
Lu Liu213425.39
Richard Hill37717.96
Nick Antonopoulos453148.72