{"id":"https://openalex.org/W2055204037","doi":"https://doi.org/10.1109/tifs.2013.2259158","title":"Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds","display_name":"Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds","publication_year":2013,"publication_date":"2013-04-19","ids":{"openalex":"https://openalex.org/W2055204037","doi":"https://doi.org/10.1109/tifs.2013.2259158","mag":"2055204037"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2013.2259158","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2013.2259158","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112642588","display_name":"Justin L. Rice","orcid":null},"institutions":[{"id":"https://openalex.org/I919208787","display_name":"Louisiana Tech University","ror":"https://ror.org/04q9esz89","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I919208787"]},{"id":"https://openalex.org/I1306266525","display_name":"Goddard Space Flight Center","ror":"https://ror.org/0171mag52","country_code":"US","type":"facility","lineage":["https://openalex.org/I1306266525","https://openalex.org/I4210124779"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Justin L. Rice","raw_affiliation_strings":["Department of Computer Science, Louisiana Tech University, Ruston, LA, USA","NASA Goddard Space Flight Center, Green belt, MD, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Louisiana Tech University, Ruston, LA, USA","institution_ids":["https://openalex.org/I919208787"]},{"raw_affiliation_string":"NASA Goddard Space Flight Center, Green belt, MD, USA","institution_ids":["https://openalex.org/I1306266525"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071471344","display_name":"Vir V. Phoha","orcid":"https://orcid.org/0000-0002-5390-8253"},"institutions":[{"id":"https://openalex.org/I919208787","display_name":"Louisiana Tech University","ror":"https://ror.org/04q9esz89","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I919208787"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vir V. Phoha","raw_affiliation_strings":["Department of Computer Science, Louisiana Tech University, Ruston, LA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Louisiana Tech University, Ruston, LA, USA","institution_ids":["https://openalex.org/I919208787"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090972494","display_name":"Philip Robinson","orcid":"https://orcid.org/0000-0002-1236-9505"},"institutions":[{"id":"https://openalex.org/I4210133614","display_name":"Systems, Applications & Products in Data Processing (United Kingdom)","ror":"https://ror.org/04k7gd586","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210132444","https://openalex.org/I4210133614"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Philip Robinson","raw_affiliation_strings":["SAP Next Business and Technology, Belfast, UK"],"affiliations":[{"raw_affiliation_string":"SAP Next Business and Technology, Belfast, UK","institution_ids":["https://openalex.org/I4210133614"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112642588"],"corresponding_institution_ids":["https://openalex.org/I1306266525","https://openalex.org/I919208787"],"apc_list":null,"apc_paid":null,"fwci":0.3625,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65788783,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"8","issue":"6","first_page":"963","last_page":"972"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8233754634857178},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8060142993927002},{"id":"https://openalex.org/keywords/workload","display_name":"Workload","score":0.8002356290817261},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.7409234046936035},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6282436847686768},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.5085290670394897},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49943017959594727},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3494948148727417},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.18896344304084778},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09062027931213379}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8233754634857178},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8060142993927002},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.8002356290817261},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.7409234046936035},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6282436847686768},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.5085290670394897},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49943017959594727},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3494948148727417},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.18896344304084778},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09062027931213379}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2013.2259158","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2013.2259158","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1605983281","https://openalex.org/W1681309784","https://openalex.org/W1966668222","https://openalex.org/W1977308631","https://openalex.org/W1978884755","https://openalex.org/W1987631246","https://openalex.org/W1990073900","https://openalex.org/W1995094187","https://openalex.org/W1997601204","https://openalex.org/W2065554061","https://openalex.org/W2114296561","https://openalex.org/W2114500417","https://openalex.org/W2119028650","https://openalex.org/W2121762798","https://openalex.org/W2122589245","https://openalex.org/W2131900781","https://openalex.org/W2134894205","https://openalex.org/W2141329818","https://openalex.org/W2154107289","https://openalex.org/W2266218113","https://openalex.org/W2297395784","https://openalex.org/W2884206483","https://openalex.org/W4298235322","https://openalex.org/W6666976018","https://openalex.org/W6678297540"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":{"Recent":[0],"research":[1],"has":[2,175],"provided":[3],"evidence":[4],"indicating":[5],"how":[6,139],"a":[7,119,156,171],"malicious":[8],"user":[9,53,165],"could":[10],"perform":[11,155],"coresidence":[12,60],"profiling":[13],"and":[14,20,40,55,66,85,109,123,134],"public-to-private":[15,78],"IP":[16,79,96,115],"mapping":[17,112],"to":[18,58,71,113,129,137,159],"target":[19],"exploit":[21,174],"customers":[22],"which":[23,98],"share":[24],"physical":[25,38],"resources.":[26],"The":[27],"attacks":[28],"rely":[29],"on":[30,35,52],"two":[31],"steps:":[32],"resource":[33],"placement":[34],"the":[36,72,77,111,143,147,161],"target's":[37],"machine":[39],"extraction.":[41],"Our":[42,177],"proposed":[43],"solution,":[44],"in":[45,146],"part":[46],"inspired":[47],"by":[48,87,101],"mussel":[49],"self-organization,":[50],"relies":[51],"account":[54,89],"workload":[56,67],"clustering":[57],"mitigate":[59],"profiling.":[61],"Users":[62],"with":[63],"similar":[64],"preferences":[65],"characteristics":[68],"are":[69],"mapped":[70],"same":[73],"cluster.":[74],"To":[75],"obfuscate":[76],"map,":[80],"each":[81],"cluster":[82],"is":[83,99,185],"managed":[84],"accessed":[86],"an":[88,126,163],"proxy.":[90],"Each":[91],"proxy":[92],"uses":[93],"one":[94],"public":[95],"address,":[97],"shared":[100],"all":[102],"clustered":[103],"users":[104],"when":[105],"accessing":[106],"their":[107],"instances,":[108],"maintains":[110],"private":[114],"addresses.":[116],"We":[117,153],"describe":[118],"set":[120],"of":[121],"capabilities":[122],"attack":[124,148],"paths":[125],"attacker":[127],"needs":[128],"execute":[130],"for":[131,150],"targeted":[132],"coresidence,":[133],"present":[135],"arguments":[136],"show":[138],"our":[140],"approach":[141],"disrupts":[142],"critical":[144],"steps":[145],"path":[149],"most":[151],"cases.":[152],"then":[154],"risk":[157],"assessment":[158],"determine":[160],"likelihood":[162],"individual":[164],"will":[166],"be":[167],"victimized,":[168],"given":[169],"that":[170,180],"successful":[172],"nondirected":[173],"occurred.":[176],"results":[178],"suggest":[179],"while":[181],"possible,":[182],"this":[183],"event":[184],"highly":[186],"unlikely.":[187]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
