Community Cloud: Concept, Model, Attacks and Solution

In this paper, we propose a new model of community cloud (ComC) interaction that is based on the demand of tenants and propose an intrusion detection mechanism for the proposed model. ComC is a solution that is more secure than the public cloud, and less costly than the private cloud. We argue that our proposed model of the ComC will be more beneficial to consumers as well as providers. Our evaluation shows the efficiency of the proposed model from cost and operation point of views. In addition, our analysis shows that our proposed IDS can make the ComC a safe environment and can guarantee the security and privacy of the customers.

[1]  Thomas Erl,et al.  SOA Principles of Service Design , 2007 .

[2]  Elisa Bertino,et al.  Privacy Preserving Policy-Based Content Sharing in Public Clouds , 2013, IEEE Transactions on Knowledge and Data Engineering.

[3]  Zhifeng Xiao,et al.  Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[4]  Michael Devetsikiotis,et al.  Enhancing Computing Power by Exploiting Underutilized Resources in the Community Cloud , 2011, 2011 IEEE International Conference on Communications (ICC).

[5]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[6]  Christoph Meinel,et al.  Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[7]  Gerard Garlick Improving Resilience with Community Cloud Computing , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[8]  P. Mell,et al.  What's Special about Cloud Security? , 2012, IT Professional.

[9]  Nir Kshetri,et al.  Cloud Computing and EU Data Privacy Regulations , 2013, Computer.

[10]  Rubén S. Montero,et al.  Key Challenges in Cloud Computing: Enabling the Future Internet of Services , 2013, IEEE Internet Computing.

[11]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[12]  Victor C. M. Leung,et al.  Context-Aware Mobility Management in Heterogeneous Network Environments , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[13]  Andrew P. Martin,et al.  myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment , 2011, CloudCom.

[14]  Ahmed Patel,et al.  An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..

[15]  Salve Bhagyashri Salve Bhagyashri,et al.  Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .

[16]  Daniele Sgandurra,et al.  Securing a Community Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.

[17]  Pg Scholar,et al.  Privacy Preserving Delegated Access Control in Public Clouds , 2014 .