Seclogmon : Security In Cloud Computing Using Activity Log For Consumer Data Protection

被引:0
|
作者
Sridhar, T. [1 ]
Vivek, V. [2 ]
Shekhar, R. [2 ]
机构
[1] Alliance Univ, ECE, Bangalore, Karnataka, India
[2] Alliance Univ, CSE, Bangalore, Karnataka, India
关键词
Cloud Computing; Cloud security; OpenStack; Server node log; logging and monitoring; MANAGEMENT;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud security encompass under its umbrella very extensive set of service level agreements (SLA's), methodologies which are used to secure user data, applications and resources that are connected via cloud. But, still the clients are handicapped with very little support and knowledge about what actually happens to their data after they have pushed it on to the cloud. Data ownership is important issue, especially while dealing with an enormous amount of data. This allows cloud provides to create their own terms and conditions, which at times may seem arbitrary. We proposed a novel approach which will maintain logging and monitoring for helping cloud consumers to identify any abnormal activity and resolve the problems accordingly. But, logging has a wide application too, therefore it depends on the user how and what he logs and monitors. To aid the consumers all cloud service providers maintain logs and generate a huge amount of information, much of which is redundant, awkwardly formatted, but there are hidden clues that can help the consumer to understand that they are having, or more importantly, about to have a problem. Using these logs the work creates a tool which parses these logs and provides user the apt amount of information and allows them to understand their activities and job behavior on cloud. It helps them to report any anomaly in the use of their cloud job and infrastructure effectively.
引用
收藏
页码:1458 / 1462
页数:5
相关论文
共 50 条
  • [21] Research on Key Technologies of Multimedia Data Security Protection Based on Cloud Computing
    Yang, Tingting
    Jia, Shuwen
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON MODELING, SIMULATION AND OPTIMIZATION TECHNOLOGIES AND APPLICATIONS (MSOTA2016), 2016, 58 : 323 - 325
  • [22] DATA SECURITY IN CLOUD COMPUTING USING CRAMER - SHOUP CRYPTOSYSTEM
    Raju, S.
    Sirajudeen, Y. Mohamed
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 343 - 346
  • [23] Data Storage Security in Cloud Computing Using Container Clustering
    Gupta, Rohan Raj
    Mishra, Gaurav
    Katara, Subham
    Agarwal, Arpit
    Sarkar, Mrinal Kanti
    Das, Rupayan
    Kumar, Sanjay
    [J]. 2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [24] DATA LOSS PROTECTION AND DATA SECURITY USING AGENTS FOR CLOUD ENVIRONMENT
    Carolin, S. Petcy
    Somasundaram, M.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGIES AND INTELLIGENT DATA ENGINEERING (ICCTIDE'16), 2016,
  • [25] Data Security in the World of Cloud Computing
    Kaufman, Lori M.
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (04) : 61 - 64
  • [26] Data Security Policy In The Cloud Computing
    Ran Shuanglin
    [J]. PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 222 - 225
  • [27] ANALYSIS OF DATA SECURITY IN CLOUD COMPUTING
    Iyer, K. B. Priya
    Manisha, R.
    Subhashree, R.
    Vedhavalli, K.
    [J]. PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 540 - 543
  • [28] Data Security Model for Cloud Computing
    Dai Yuefa
    Wu Bo
    Gu Yaqiang
    Zhang Quan
    Tang Chaojing
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 141 - 144
  • [29] Data Security: the Challenges of Cloud Computing
    Hu Shuijing
    [J]. 2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 203 - 206
  • [30] An Architecture for Data Security in Cloud Computing
    Sugumaran, M.
    BalaMurugan, B.
    Kamalraj, D.
    [J]. 2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 252 - +