Open Access Open Access  Restricted Access Subscription or Fee Access

Handling of Cloud Computing Audit Logs using Data Mining Techniques

S. Revathi

Abstract


Cloud computing has now extended as a new paradigm for delivering services over the Internet. It is attractive to business owners, since it reduces the upfront investments. However, despite the fact that cloud computing offers potential opportunities to the IT industry, it has many issues and challenges still to be addressed. Eventually the business owners could not seek the physical location of their application or data, which reduces the confidentiality on cloud computing. Audit logs are used as one of the possible ways to secure the data and it allows forensic analysis when any security incidents that occurs. This paper present the data mining techniques used in audit logs.


Keywords


Cloud Computing, Data Mining, Audit Logs

Full Text:

PDF

References


nist.gov: NIST SP800-53: security and privacy controls for federal information systems and organizations.

Zhao G, Liu J, Tang Y, Sun W, Zhang F, Ye X, Tang N (2009) Cloud Computing: A Statistics Aspect of Users. In: First International Conference on Cloud Computing (CloudCom), Beijing, China. Springer Berlin, Heidelberg,pp 347–358

http://www.cloudsecurityalliance.org

Zhang S, Zhang S, Chen X, Huo X (2010) Cloud Computing Research and Development Trend. In: Second International Conference on Future Networks (ICFN’10), Sanya, Hainan, China. IEEE Computer Society, Washington, DC, USA, pp 93–97

Cloud Security Alliance (2011) Security guidance for critical areas of focus inCloud Computing V3.0

Khalid A (2010) Cloud Computing: applying issues in Small Business. In:International Conference on Signal Acquisition and Processing (ICSAP’10),pp 278–281

Kitchenham B (2004) Procedures for performing systematic review, software engineering group,University of Keele, United Kingdom and Empirical Software Engineering, Australia.

Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering. University of Keele, Department of Computer Science, UK

Zissis, Dimitrios, and DimitriosLekkas. "Addressing cloud computing security issues." Future Generation Computer Systems 28.3 (2012): 583-592.

Bhadauria, Rohit, and SugataSanyal. "Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques." International Journal of computer applications, (2012).

Harnik, Danny, et al. "Secure access mechanism for cloud storage." Scalable Computing: Practice and Experience (2011).

Pappas, Vasilis, et al. "CloudFence: Data Flow Tracking as a Cloud Service". Research in Attacks, Intrusions, and Defenses. Springer Berlin Heidelberg, 2013. 411-431.

Seccombe, A., et al. "Security guidance for critical areas of focus in cloud computing". Cloud Security Alliance (2009).

Petre, Ruxandra-Stefania. "Data mining in cloud computing." Database Systems Journal 3.3 (2012): 67-71.

Xie, Rui, Rose Gamble, and Norman Ahmed, "Diagnosing Vulnerability Patterns in Cloud Audit Logs", High Performance Cloud Auditing and Applications, Springer New York, 2014, 119-146.

http://www.datamation.com/columns/articlecphp/3578916/The-Importance-of-Audit-Logs.htm


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.