A Multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service

02/10/2020
by   Hussain Al-Aqrabi, et al.
0

Business Intelligence (BI) has gained a new lease of life through Cloud computing as its demand for unlimited hardware and platform resources expandability is fulfilled by the Cloud elasticity features. BI can be seamlessly deployed on the Cloud given that its multilayered model coincides with the Cloud multilayer models. It is considered by many Cloud service providers as one of the prominent applications services on public, outsourced private and outsourced community Clouds. However, in the shared domains of Cloud computing, BI is exposed to security and privacy threats by virtue of exploits, eavesdropping, distributed attacks, malware attacks, and such other known challenges on Cloud computing. Given the multi-layered model of BI and Cloud computing, its protection on Cloud computing needs to be ensured through multilayered controls. In this paper, a multi-layered security and privacy model of BI as a service on Cloud computing is proposed through an algorithm for ensuring multi-level session inspections, and ensuring maximum security controls at all the seven layers, and prevent an attack from occurring. This will not only reduce the risk of security breaches, but allow an organisation time to detect, and respond to an attack. The simulations present the effects of distributed attacks on the BI systems by attackers posing as genuine Cloud tenants. The results reflect how the attackers are blocked by the multilayered security and privacy controls deployed for protecting the BI servers and databases

READ FULL TEXT

page 2

page 3

page 4

page 5

research
12/05/2017

A Slow Read attack Using Cloud

Cloud computing relies on sharing computing resources rather than having...
research
01/23/2019

Cloud BI: Future of Business Intelligence in the Cloud

Cloud computing is gradually gaining popularity among businesses due to ...
research
06/14/2020

Launching Stealth Attacks using Cloud

Cloud computing offers users scalable platforms and low resource cost. A...
research
05/25/2023

FIDS: Fuzzy Intrusion Detection System for simultaneous detection of DoS/DDoS attacks in Cloud computing

In recent times, I've encountered a principle known as cloud computing, ...
research
09/29/2022

ThreatPro: Multi-Layer Threat Analysis in the Cloud

Many effective Threat Analysis (TA) techniques exist that focus on analy...
research
03/19/2019

Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services

Defending against distributed denial of service (DDoS) attacks in the In...
research
05/12/2018

Towards Distributed Clouds

This review focuses on the evolution of cloud computing and distributed ...

Please sign up or login with your details

Forgot password? Click here to reset