{"title":"Auditing and Analysis of Network Traffic in Cloud Environment","authors":"S. Shetty","doi":"10.1109/SERVICES.2013.42","DOIUrl":null,"url":null,"abstract":"Cloud computing allows users to remotely store their data into the cloud and provides on-demand applications and services from a shared pool of configurable computing resources. The security of the outsourced data in the cloud is dependent on the security of the cloud computing system and network. Though, there have been numerous efforts on securing data on the cloud computing system, evaluation of data security on the network between cloud provider and its users is still a very challenging task. The audit of the cloud computing system and network will provide insights on the security and performance of VMs and the operating system on multiple data centers and the intra-cloud network managed by cloud providers and the wide-area network between the cloud user and cloud provider. Thus, network traffic analysis for cloud auditing is of critical importance so that users can resort to an external audit party to verify the data security on the network between cloud provider and its users. This paper presents the following key technologies required to analyze network traffic in the cloud computing environment: IP geolocation of network devices between cloud provider and its users, monitoring the data security of the cloud network path, and online mining of massive cloud auditing logs generated by cloud network traffic.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Ninth World Congress on Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SERVICES.2013.42","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
Cloud computing allows users to remotely store their data into the cloud and provides on-demand applications and services from a shared pool of configurable computing resources. The security of the outsourced data in the cloud is dependent on the security of the cloud computing system and network. Though, there have been numerous efforts on securing data on the cloud computing system, evaluation of data security on the network between cloud provider and its users is still a very challenging task. The audit of the cloud computing system and network will provide insights on the security and performance of VMs and the operating system on multiple data centers and the intra-cloud network managed by cloud providers and the wide-area network between the cloud user and cloud provider. Thus, network traffic analysis for cloud auditing is of critical importance so that users can resort to an external audit party to verify the data security on the network between cloud provider and its users. This paper presents the following key technologies required to analyze network traffic in the cloud computing environment: IP geolocation of network devices between cloud provider and its users, monitoring the data security of the cloud network path, and online mining of massive cloud auditing logs generated by cloud network traffic.