Security Analytics and Benchmarking Log Aggregation in the Cloud
Journal Title: EAI Endorsed Transactions on Cloud Systems - Year 2017, Vol 3, Issue 11
Abstract
With increase in popularity of Cloud computing, most organizations are moving towards the Cloud. The main concern for these organizations when migrating to the Cloud is securing their data in the Cloud. There are security measures that can be deployed to address the risk the organization faces to the security threats posed within the Cloud. This project illustrates how the problem can be solved using data protection techniques and security analytics of the log data within the Cloud deployment. In PaaS implementation of Cloud, the customer and the Cloud vendor has a shared responsibility model and the project will discuss what customer can do for their responsibility in the areas highlighted above. Data is of paramount importance to any organization and protection of data becomes more complex in a Cloud offering as the storage is located off premise. Like any other environment devices, servers and applications in Cloud produce logs that can be aggregated and analyzed to identify security anomalies. Comparison of various log aggregation tools can give a detailed idea about what tool is better. Two log aggregation tools Splunk and the Elastic stack have been compared in this project. A combination of the above described strategies can address and point on various security risks, and help reduce the risk of the organization to a significant degree.
Authors and Affiliations
Purvi Pathak, Kumar Rangasamy, Theophilus Selvaraj
A Survey on Security of Web Services and its Implementations
Web Services are software snippets that can be integrated in HTTP and XML based messages based on web technology. Security plays a crucial role in web services. Web services provide a basis for system integration without...
Security Analytics and Benchmarking Log Aggregation in the Cloud
With increase in popularity of Cloud computing, most organizations are moving towards the Cloud. The main concern for these organizations when migrating to the Cloud is securing their data in the Cloud. There are securit...
Fighting packet storms in mobile networks with information-centrism
Mobile application development for smartphones is a trend in the telecommunications industry. However, their deployment is not seamless since many applications are not mobile network-friendly. A key problem that frequent...
Accessible Wayfinding Testbed: Infrastructure and Components
Despite considerable recent interest in research related to wayfinding and navigation of pedestrians, the needs and preferences of people with disabilities (PWDs) are not yet fully addressed. Some of still unaddressed is...
Large Scale Cross-media Data Retrieval based on Hadoop
With the rapid development of the Internet and speedy increase of the data size, there are more and more data intensive applications which often involve hundreds of megabytes of data. It is important and necessary to obt...