Security Analytics and Benchmarking Log Aggregation in the Cloud
Journal Title: EAI Endorsed Transactions on Cloud Systems - Year 2017, Vol 3, Issue 11
Abstract
With increase in popularity of Cloud computing, most organizations are moving towards the Cloud. The main concern for these organizations when migrating to the Cloud is securing their data in the Cloud. There are security measures that can be deployed to address the risk the organization faces to the security threats posed within the Cloud. This project illustrates how the problem can be solved using data protection techniques and security analytics of the log data within the Cloud deployment. In PaaS implementation of Cloud, the customer and the Cloud vendor has a shared responsibility model and the project will discuss what customer can do for their responsibility in the areas highlighted above. Data is of paramount importance to any organization and protection of data becomes more complex in a Cloud offering as the storage is located off premise. Like any other environment devices, servers and applications in Cloud produce logs that can be aggregated and analyzed to identify security anomalies. Comparison of various log aggregation tools can give a detailed idea about what tool is better. Two log aggregation tools Splunk and the Elastic stack have been compared in this project. A combination of the above described strategies can address and point on various security risks, and help reduce the risk of the organization to a significant degree.
Authors and Affiliations
Purvi Pathak, Kumar Rangasamy, Theophilus Selvaraj
Service Co-evolution in the Internet of Things
The envisioned Internet of Things (IoT) foresees a future Internet incorporating smart physical objects that offer hosted functionality as IoT services. This service-based integration of IoT will be smarter, easier to co...
A Counterfeit Solution for Pharma Supply Chain
This paper provides a detailed overview of the blockchain technology and how it can be used to build a foolproof system in eliminating counterfeit products in pharmaceutical industries. Study by various reports indicate...
Overview - Fog Computing and Internet-of-Things (IOT)
The Internet today is getting connected to a very large number of devices or sensors of IOT. It is expected that 50 billion devices will be connected to the Internet by 2020..The IOT driven global economy will have many...
Specification of REST API Services for Modbus Protocol using Formal technique
With the advancements in technologies, there has been a growing trend to move from desktop applications towards web and mobile applications. This move was made possible through introduction of the RESTful Web Services. T...
A Permission-Based Distributed Mutual Exclusion Algorithm allowing Quality of Service (PBDMEAQoS)
The main purpose of mutual exclusion in a distributed environment is to control access to a shared resource. Large-scale distributed systems such as clouds or grids provide shared informatics resources to its clients. In...