Logging Solutions to Mitigate Risks Associated With Threats in Infrastructure as a Service Cloud

被引:6
作者
Wongthai, Winai [1 ]
Rocha, Francisco [1 ]
van Moorsel, Aad [1 ]
机构
[1] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
来源
2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA) | 2013年
基金
英国工程与自然科学研究理事会;
关键词
cloud monitoring; logging system; accountability;
D O I
10.1109/CLOUDCOM-ASIA.2013.70
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing offers computational resources such as processing, networking, and storage to customers. However, the cloud also brings with it security concerns which affect both cloud consumers and providers. The Cloud Security Alliance (CSA) define the security concerns as the seven main threats. This paper investigates how threat number one (malicious activities performed in consumers' virtual machines/VMs) can affect the security of both consumers and providers. It proposes logging solutions to mitigate risks associated with this threat. We systematically design and implement a prototype of the proposed logging solutions in an IaaS to record the history of customer VM's files. The proposed system can be modified in order to record VMs' process behaviour log files. These log files can assist in identifying malicious activities (spamming) performed in the VMs as an example of how the proposed solutions benefits the provider side. The proposed system can record the log files while having a smaller trusted computing base compared to previous work. Thus, the logging solutions in this paper can assist in mitigating risks associated with the CSA threats to benefit consumers and providers.
引用
收藏
页码:163 / 170
页数:8
相关论文
共 40 条
[1]  
Aceto A. Botta, 2012, CLOUD MONITORING DEF
[2]  
[Anonymous], P 2012 ACM WORKSH CL
[3]  
[Anonymous], 2010, Top threats to cloud computing v1.0
[4]  
[Anonymous], 2013, J SUPERCOMPUTING
[5]  
[Anonymous], 2009, P 2009 ACM WORKSH CL
[6]  
[Anonymous], SEC GUID CRIT AR FOC
[7]  
[Anonymous], THESIS
[8]  
[Anonymous], AM EL COMP CLOUD AM
[9]  
Armbrust M., 2010, Communications of the ACM
[10]  
Bisong A., 2011, INT J NETWORK SECURI