2013 International Conference on Cloud Computing and Big Data 2013
DOI: 10.1109/cloudcom-asia.2013.70
|View full text |Cite
|
Sign up to set email alerts
|

Logging Solutions to Mitigate Risks Associated with Threats in Infrastructure as a Service Cloud

Abstract: Cloud computing offers computational resources such as processing, networking, and storage to customers. However, the cloud also brings with it security concerns which affect both cloud consumers and providers. The Cloud Security Alliance (CSA) defines the security concerns as the seven main threats. This paper investigates how threat number one (malicious activities performed in consumers' virtual machines/VMs) can affect the security of both consumers and providers. It proposes logging solutions to mitigate … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Data privacy is still a big concern in other Models like Jerico Formu's Cloud Cube Model [17], Hexagon model [17], Multi-Tenancy Cloud Model [33], Cloud Risk Accumulation Model [34], and the Mapping Model [17], [33]. The logging approach [35] ensures that the log files can mitigate the risks to benefit both sides of accountability, security, performance, and scalability.…”
Section: Discussionmentioning
confidence: 99%
“…Data privacy is still a big concern in other Models like Jerico Formu's Cloud Cube Model [17], Hexagon model [17], Multi-Tenancy Cloud Model [33], Cloud Risk Accumulation Model [34], and the Mapping Model [17], [33]. The logging approach [35] ensures that the log files can mitigate the risks to benefit both sides of accountability, security, performance, and scalability.…”
Section: Discussionmentioning
confidence: 99%
“…Al. in this paper have addressed the number one threat defined by Cloud Security Alliance (CSA) that is the malicious activities that are performed in consumers' virtual machines/VMs which can compromise the security of the cloud consumers as well as the cloud service provides [4]. They have designed and implemented a prototype of a proposed logging solution in an Infrastructure as a Service cloud which records the history of the VM files belonging to the consumers.…”
Section: Eai Endorsed Transactions Onmentioning
confidence: 99%
“…These areas include cloud service performance [10], service cost [7], and security [5]. However, most cloud security models focus on security of Data as a service (DaaS) [2] and cloud storage [4] and overall security [15]. A few have covered the infrastructure level in some aspects such as performance and scalability [12] but not in security especially resource scheduling.…”
Section: Related Workmentioning
confidence: 99%