Security Analytics and Benchmarking Log Aggregation in the Cloud

Journal Title: EAI Endorsed Transactions on Cloud Systems - Year 2017, Vol 3, Issue 11

Abstract

With increase in popularity of Cloud computing, most organizations are moving towards the Cloud. The main concern for these organizations when migrating to the Cloud is securing their data in the Cloud. There are security measures that can be deployed to address the risk the organization faces to the security threats posed within the Cloud. This project illustrates how the problem can be solved using data protection techniques and security analytics of the log data within the Cloud deployment. In PaaS implementation of Cloud, the customer and the Cloud vendor has a shared responsibility model and the project will discuss what customer can do for their responsibility in the areas highlighted above. Data is of paramount importance to any organization and protection of data becomes more complex in a Cloud offering as the storage is located off premise. Like any other environment devices, servers and applications in Cloud produce logs that can be aggregated and analyzed to identify security anomalies. Comparison of various log aggregation tools can give a detailed idea about what tool is better. Two log aggregation tools Splunk and the Elastic stack have been compared in this project. A combination of the above described strategies can address and point on various security risks, and help reduce the risk of the organization to a significant degree.

Authors and Affiliations

Purvi Pathak, Kumar Rangasamy, Theophilus Selvaraj

Keywords

Related Articles

A Survey on Cognitive computing using Semantic Technology

The sheer volume of data being generated by the resources is creating a form of cognitive overload for enterprises. The data will be useful to multiple processes in enterprises. Learning and understanding natural languag...

Monitoring as-a-service to drive more efficient future system design

In the services world, the expected benefits are the fastest time to market, lower costs, greater consistency in the application, and increased agility. The reuse and sharing properties of software components are useful...

Multipath Bandwidth Scavenging in the Internet of Things

To meet the infrastructure coverage and capacity needed by future IoT applications, service providers may engage in mutually-beneficial modes of collaboration such as cooperative packet forwarding and gatewaying through...

Overview - Fog Computing and Internet-of-Things (IOT)

The Internet today is getting connected to a very large number of devices or sensors of IOT. It is expected that 50 billion devices will be connected to the Internet by 2020..The IOT driven global economy will have many...

Cloud based Software Defined Wireless Body Area Networks Architecture for Virtual Hospital

Recent developments in wireless communication inflate a new area of research named as Wireless Body Area Networks. WBANs enhance the concept of virtual hospital with the help of cloud computing (CC) technology. Still num...

Download PDF file
  • EP ID EP45601
  • DOI http://dx.doi.org/10.4108/eai.11-4-2018.154464
  • Views 259
  • Downloads 0

How To Cite

Purvi Pathak, Kumar Rangasamy, Theophilus Selvaraj (2017). Security Analytics and Benchmarking Log Aggregation in the Cloud. EAI Endorsed Transactions on Cloud Systems, 3(11), -. https://europub.co.uk./articles/-A-45601