Seclogmon : Security In Cloud Computing Using Activity Log For Consumer Data Protection

被引:0
|
作者
Sridhar, T. [1 ]
Vivek, V. [2 ]
Shekhar, R. [2 ]
机构
[1] Alliance Univ, ECE, Bangalore, Karnataka, India
[2] Alliance Univ, CSE, Bangalore, Karnataka, India
关键词
Cloud Computing; Cloud security; OpenStack; Server node log; logging and monitoring; MANAGEMENT;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud security encompass under its umbrella very extensive set of service level agreements (SLA's), methodologies which are used to secure user data, applications and resources that are connected via cloud. But, still the clients are handicapped with very little support and knowledge about what actually happens to their data after they have pushed it on to the cloud. Data ownership is important issue, especially while dealing with an enormous amount of data. This allows cloud provides to create their own terms and conditions, which at times may seem arbitrary. We proposed a novel approach which will maintain logging and monitoring for helping cloud consumers to identify any abnormal activity and resolve the problems accordingly. But, logging has a wide application too, therefore it depends on the user how and what he logs and monitors. To aid the consumers all cloud service providers maintain logs and generate a huge amount of information, much of which is redundant, awkwardly formatted, but there are hidden clues that can help the consumer to understand that they are having, or more importantly, about to have a problem. Using these logs the work creates a tool which parses these logs and provides user the apt amount of information and allows them to understand their activities and job behavior on cloud. It helps them to report any anomaly in the use of their cloud job and infrastructure effectively.
引用
收藏
页码:1458 / 1462
页数:5
相关论文
共 50 条
  • [1] Security Techniques for Data Protection in Cloud Computing
    Jakimoski, Kire
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (01): : 49 - 56
  • [2] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [3] A Survey of Data Security and Privacy Protection in Cloud Computing
    Yuan, Zhongbing
    Liu, Xiaojun
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 647 - 651
  • [4] Cloud Computing USING DATA IN THE CLOUD—WHAT IT MEANS FOR DATA SECURITY
    Ward, Stuart
    [J]. Lab Manager, 2019, 14 (09): : 24 - 27
  • [5] A Security Protection Framework for Cloud Computing
    Zhu, Wenzheng
    Lee, Changhoon
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2016, 12 (03): : 538 - 547
  • [6] Research on the key technology of data security protection based on cloud computing
    Guo, Juan
    [J]. PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 66 - 69
  • [7] Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions
    Sun, Pan Jun
    [J]. IEEE ACCESS, 2019, 7 : 147420 - 147452
  • [8] Development of a Security Education Model System for Cloud Computing and Data Security and Privacy Protection
    Jia, Rui
    Ni, Xiaoli
    Shao, Xiaoyi
    Zhang, Ting
    Qi, Qunkun
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023,
  • [9] Research on cloud computing data security protection technology satisfying differential
    Yang, Hui
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 101 - 101
  • [10] Data Security in Cloud Computing
    Sathyanarayana, T. V.
    Sheela, L. Mary Immaculate
    [J]. 2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 822 - 827