Security Analytics and Benchmarking Log Aggregation in the Cloud
Journal Title: EAI Endorsed Transactions on Cloud Systems - Year 2017, Vol 3, Issue 11
Abstract
With increase in popularity of Cloud computing, most organizations are moving towards the Cloud. The main concern for these organizations when migrating to the Cloud is securing their data in the Cloud. There are security measures that can be deployed to address the risk the organization faces to the security threats posed within the Cloud. This project illustrates how the problem can be solved using data protection techniques and security analytics of the log data within the Cloud deployment. In PaaS implementation of Cloud, the customer and the Cloud vendor has a shared responsibility model and the project will discuss what customer can do for their responsibility in the areas highlighted above. Data is of paramount importance to any organization and protection of data becomes more complex in a Cloud offering as the storage is located off premise. Like any other environment devices, servers and applications in Cloud produce logs that can be aggregated and analyzed to identify security anomalies. Comparison of various log aggregation tools can give a detailed idea about what tool is better. Two log aggregation tools Splunk and the Elastic stack have been compared in this project. A combination of the above described strategies can address and point on various security risks, and help reduce the risk of the organization to a significant degree.
Authors and Affiliations
Purvi Pathak, Kumar Rangasamy, Theophilus Selvaraj
Towards an Interactive Experiment Framework: DynamiQ
Interactive network experiments are useful for finding solutions to network problems, for teaching and for training purposes. In this demonstration we shall present an interactive experiment framework that allows users t...
PETFEN: A Performance Evaluation Tool for Flow-Level Network Modeling of Ethernet Networks
We present in this paper PETFEN, a Performance Evaluation Tool for Flow-level network modeling of Ethernet Networks. Flow-level network models are a useful tool to dimension and predict various performances of networks w...
A Permission-Based Distributed Mutual Exclusion Algorithm allowing Quality of Service (PBDMEAQoS)
The main purpose of mutual exclusion in a distributed environment is to control access to a shared resource. Large-scale distributed systems such as clouds or grids provide shared informatics resources to its clients. In...
QoE Aware Resource Allocation for Video Communications over LTE Based Mobile Networks
As the limits of video compression and usable wireless radio resources are exhausted, providing increased protection to critical data is regarded as a way forward to increase the effective capacity for delivering video d...
Optimal Routing and Resource Allocation for Multimedia Cloud Computing
Routing and resource allocation are two major research directions for cloud computing, especially for improving the response time in multimedia cloud computing. In this paper, we propose network model for the transmissio...