Cloud Security Issues and Log-based Proactive Strategy

被引:0
|
作者
Mejri, Oumayma [1 ]
Yang, Dana [2 ]
Doh, Inshil [1 ]
机构
[1] Ewha Womans Univ, Dept Cyber Secur, Seoul, South Korea
[2] Ewha Womans Univ, Dept Comp Sci & Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Cloud; Cloud computing; cloud security; Log management;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, given the current situation the world is undergoing with the COVID-19 pandemic, a lot of companies encourage remote working from home. As a result, the use of the cloud has increased, but as a consequence, cyberattacks on the cloud systems have escalated. However, organizations and companies still have concerns about the use of the cloud as most of them remain unaware of the security threats against cloud system. This work researches through major concerns of the organizations and companies for cloud security and tries to explain why it is important for the organization to be aware of the threats that the cloud is facing. It also proposes a three-step strategy to help companies and organizations to secure their cloud system.
引用
下载
收藏
页码:392 / 397
页数:6
相关论文
共 50 条
  • [1] Cloud Security Issues and Log-based Proactive Strategy
    Mejri, Oumayma
    Yang, Dana
    Doh, Inshil
    [J]. 2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 392 - +
  • [2] Log-based Service Diagnosis Method in Cloud
    Jia, Zhichun
    Xing, Xing
    [J]. 2014 INTERNATIONAL CONFERENCE ON MECHATRONICS AND CONTROL (ICMC), 2014, : 1299 - 1303
  • [3] Log-Based Cloud Monitoring System for OpenStack
    Agrawal, Vaibhav
    Kotia, Devanjal
    Moshirian, Kamelia
    Kim, Mihui
    [J]. 2018 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2018), 2018, : 276 - 281
  • [4] Log-Based Cloud Forensic Techniques: A Comparative Study
    Santra, Palash
    Roy, Asmita
    Midya, Sadip
    Majumder, Koushik
    Phadikar, Santanu
    [J]. NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 2, 2018, 4 : 49 - 59
  • [5] Discussion on Log-based Computer Network Security Control
    Ni, Min
    [J]. 2013 THE FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND EDUCATION APPLICATION (ICEA 2013), PT 1, 2013, 30 : 25 - 29
  • [6] Literature Survey on Log-Based Anomaly Detection Framework in Cloud
    Meenakshi
    Ramachandra, A. C.
    Bhattacharya, Subhrajit
    [J]. COMPUTATIONAL INTELLIGENCE IN PATTERN RECOGNITION, CIPR 2020, 2020, 1120 : 143 - 153
  • [7] Log-based Network Security Audit System Research and Design
    Qing, Xia
    [J]. MATERIALS AND MANUFACTURING TECHNOLOGY, PTS 1 AND 2, 2010, 129-131 : 1426 - 1431
  • [8] Log-Based Testing
    Elyasov, Alexander
    [J]. 2012 34TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2012, : 1591 - 1594
  • [9] LOGAN: Problem Diagnosis in the Cloud Using Log-based Reference Models
    Tak, Byung Chul
    Tao, Shu
    Yang, Lin
    Zhu, Chao
    Ruan, Yaoping
    [J]. PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2016, : 62 - 67
  • [10] ELT: Efficient Log-based Troubleshooting System for Cloud Computing Infrastructures
    Kc, Kamal
    Gu, Xiaohui
    [J]. 2011 30TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2011, : 11 - 20