INFORMATION CHANGE THE WORLD

International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.14, No.3, Jun. 2022

Ontologies as Building Blocks of Cloud Security

Full Text (PDF, 909KB), PP.52-61


Views:1   Downloads:0

Author(s)

Naila Samad Shaikh, Affan Yasin, Rubia Fatima

Index Terms

Cloud Computing;Web Semantics;Ontologies;Cloud Security;Cyber Security;Information Security

Abstract

Much like other processing domains, cloud computing is not surely safe. Security of cloud processing needs the same attention as any other aspect of cloud processing requires. Cyber world is shifting toward ontological technique and web 3.0 or web semantics for security. Cloud hosts servers demand more attention in context of security as number of resources and their access increases. Security measures have to be more extensive in cloud. Semantic web is usually new revolution inside the web science, which usually works upon base of ontologies. Ontologies are receiving great attention in the domain of computing and hence in the domain of security. This review paper examines different proposed “ontology centered techniques” and also provides a comprehensive analysis on these tactics. This research paper gives critical analysis of different models presented by different authors and researchers for ensuring security of a cloud based environment. This analysis helps different vendors of cloud technology to adapt one or all of these models to practically implement in their cloud machines whether they are offering IaaS, PaaS or SaaS.  Any new security model using ontologies can also be proposed based on this study, as this paper gives a comprehensive comparison of the previously proposed ontologies for monitoring security state of cloud environment as safe or malicious.

Cite This Paper

Naila Samad Shaikh, Affan Yasin, Rubia Fatima, "Ontologies as Building Blocks of Cloud Security", International Journal of Information Technology and Computer Science(IJITCS), Vol.14, No.3, pp.52-61, 2022. DOI: 10.5815/ijitcs.2022.03.05

Reference

[1]P. Bhandari, M. S. Gujral, "Ontology Based Approach for Perception of Network Security State" Proceedings of 2014 RAECS UIET Panjab University Chandigarh, 06 – 08 March, 2014 978-1-4799-2291-8/14/$31.00 ©2014 IEEE

[2]K. Bernsmed, A. Undheim, P. Hakon Meland, M. G. Jaatun, “Towards an Ontology for Cloud Security Obligations”, 2013 International Conference on Availability, Reliability and Security

[3]N. F. Noy, McGuinness, D. L., “Ontology development 101: “A guide to creating your first ontology". Stanford University, Stanford, CA, 94305, 2001

[4]K. Popović, Ž. Hocenski, "Cloud computing security issues and challenges", MIPRO 2010, May 24-28, 2010, Opatija, Croatia

[5]H. Tianfield, "Security Issues In Cloud Computing", 2012 IEEE International Conference on Systems, Man, and Cybernetics October 14-17, 2012, COEX, Seoul, Korea

[6]S. Hansman, "A taxonomy of network and computer attack methodologies". Supervisor: Ray Hunt, Department of Computer Science and Software Engineering, University of Cantebury, Christchurch, New Zealand, November 2003.

[7]Trend Micro Inc, "Trend Micro's 2012 Global Cloud Security Survey," 2012, http://cloudsecurity.trendmicro.com/ cloud-content/us/pdfs/about/2012 global cloud security survey executive summary.pdf.

[8]G. Hogben and M. Dekker, "Procure Secure: A guide to monitoring of security service levels in cloud contracts," Tech. Rep., 2012, http://www.enisa.europa. eu/activities/Resilience-and-CIIP/cloud-computing/. [Online]. Available: \url{http://www.enisa.europa.eu/activities/ Resilience-and-CIIP/cloud-computing/}

[9]P. Mell, T. Grance, "The NIST Definition of Cloud Computing" NIST Special Publication 800-145

[10]"The FedRAMP Security Controls Baseline, version 1.0." 2012, http://www.gsa.gov/portal/category/102371.

[11]Cloud Security Alliance, "CSA Cloud Controls Matrix," Tech. Rep., 2012, https://cloudsecurityalliance.org/research/ccm/.[Online].Available: \url{https://cloudsecurityalliance. org/research/ccm/}

[12]WebCohort, Inc. "Only 10% of Web applications are secured against common hacking techniques", http:/ /2004-feb02.html, 2004.

[13]G. Hulme. "New software may improve application security". http://www.Information week.com, 2001

[14]International Data Corporation, http://blogs.idc.com/ie/wpcontent/uploads/2009/12/idc_cloud_challenges_2009.jpg, 2009

[15]Information Technology Infrastructure Library, http://www.itil-officialsite.com/home/home.asp  

[16]International Organization for Standardization, http://www.iso.org/iso/home.htm

[17]Kamta Nath Mishra, "A Proficient Mechanism for Cloud Security Supervision in Distributive Computing Environment", International Journal of Computer Network and Information Security(IJCNIS), Vol.12, No.6, pp.57-77, 2020. DOI: 10.5815/ijcnis.2020.06.05

[18]Nagesh Shenoy H, K. R. Anil Kumar, Suchitra N Shenoy, Abhishek S. Rao, Rajgopal K T, "Exploring Deep Learning Techniques in Cloud Computing to Detect Malicious Network Traffic: A Sustainable Computing Approach", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.11, No.5, pp. 9-17, 2021.DOI: 10.5815/ijwmt.2021.05.02

[19]Manpreet kaur, Hardeep Singh,"A Review of Cloud Computing Security Issues", International Journal of Education and Management Engineering(IJEME), Vol.5, No.5, pp.32-41, 2015.DOI: 10.5815/ijeme.2015.05.04