{"title":"Log file's centralization to improve cloud security","authors":"M. Amar, M. Lemoudden, B. El Ouahidi","doi":"10.1109/CLOUDTECH.2016.7847696","DOIUrl":null,"url":null,"abstract":"The usage of cloud-computing architectures and characteristics has been enhanced in recent years. This approach brings the availability of storage and user services as needed. But it also brings many drawbacks that put the privacy and the security of the system at stake. Log file generation has Big Data characteristics that should be considered for upgrade from a manual method to an automatic one based on Big Data solutions. Therefore, this paper proposes a log file centralization and a diagnostic approach based on the misuse and the anomaly detection techniques, which will improve the detection of attacks. The FP-growth algorithm presented will ensure the prevention of consecutive violations.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CLOUDTECH.2016.7847696","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
The usage of cloud-computing architectures and characteristics has been enhanced in recent years. This approach brings the availability of storage and user services as needed. But it also brings many drawbacks that put the privacy and the security of the system at stake. Log file generation has Big Data characteristics that should be considered for upgrade from a manual method to an automatic one based on Big Data solutions. Therefore, this paper proposes a log file centralization and a diagnostic approach based on the misuse and the anomaly detection techniques, which will improve the detection of attacks. The FP-growth algorithm presented will ensure the prevention of consecutive violations.