Security Analytics and Benchmarking Log Aggregation in the Cloud

Journal Title: EAI Endorsed Transactions on Cloud Systems - Year 2017, Vol 3, Issue 11

Abstract

With increase in popularity of Cloud computing, most organizations are moving towards the Cloud. The main concern for these organizations when migrating to the Cloud is securing their data in the Cloud. There are security measures that can be deployed to address the risk the organization faces to the security threats posed within the Cloud. This project illustrates how the problem can be solved using data protection techniques and security analytics of the log data within the Cloud deployment. In PaaS implementation of Cloud, the customer and the Cloud vendor has a shared responsibility model and the project will discuss what customer can do for their responsibility in the areas highlighted above. Data is of paramount importance to any organization and protection of data becomes more complex in a Cloud offering as the storage is located off premise. Like any other environment devices, servers and applications in Cloud produce logs that can be aggregated and analyzed to identify security anomalies. Comparison of various log aggregation tools can give a detailed idea about what tool is better. Two log aggregation tools Splunk and the Elastic stack have been compared in this project. A combination of the above described strategies can address and point on various security risks, and help reduce the risk of the organization to a significant degree.

Authors and Affiliations

Purvi Pathak, Kumar Rangasamy, Theophilus Selvaraj

Keywords

Related Articles

Authenticated Mobile Groups To Secure The Backhaul: A New Paradigm And Challenges

In this paper, it is proposed to use group communication cryptographic protocols as a new security paradigm. This new paradigm aims at redesigning the security of small cell communications over an insecure mobile backhau...

On the Performance of General Cache Networks

The performance evaluation of cache networks has gain a huge attention due to content-oriented delivery technologies. If general network topologies are more realistic than hierarchical networks widely studied in the lite...

Necessary & Sufficient Conditions for Consistency of Haar Wavelet Expressions to their resizable Hadoop Cluster Channels and Complexity

Abstract—We develop a novel technique for resizable Hadoop cluster’s lower bounds, the bipartite matching rectangular array of Haar Wavelet expressions. Specifically, fix an arbitrary hybrid kernel function 𝒇 ∶ {𝟎, 𝟏}𝒏 →...

Specifying and Monitoring Properties of Stochastic Spatio-Temporal Systems in Signal Temporal Logic

We present an extension of the linear time, time-bounded, Signal Temporal Logic to describe spatio-temporal properties. We consider a discrete location/ patch-based representation of space, with a population of interacti...

Palladio Optimization Suite: QoS optimization for component-based Cloud applications

One important issue in software engineering is to find an effective way to deal with the increasing complexity of software computing system. Modern software applications have evolved in terms of size and scope. Specific...

Download PDF file
  • EP ID EP45601
  • DOI http://dx.doi.org/10.4108/eai.11-4-2018.154464
  • Views 264
  • Downloads 0

How To Cite

Purvi Pathak, Kumar Rangasamy, Theophilus Selvaraj (2017). Security Analytics and Benchmarking Log Aggregation in the Cloud. EAI Endorsed Transactions on Cloud Systems, 3(11), -. https://europub.co.uk/articles/-A-45601