Towards Cloud Security Monitoring: A Case Study
Ismail, Umar Mukhtar, Islam, S. and Islam, S. 2016. Towards Cloud Security Monitoring: A Case Study. in: 2016 Cybersecurity and Cyberforensics Conference (CCC) IEEE.
|Authors||Ismail, Umar Mukhtar, Islam, S. and Islam, S.|
Cloud computing has become the norm in the provisioning of computing resources due to its flexible and proven reliability. Businesses perceive cloud services as a trend that presents enormous possibilities both in economic and technical terms. The growth in cloud services have also increased bottlenecks and security risks to business assets. Cloud security monitoring has remained relatively unexplored in security terms, a factor that has led businesses to be oblivious on the metrics to capture and the appropriate techniques to use. In this paper, we explore security monitoring in terms of tracking specific user requirements based on a case study. We identify various security tools that are practically relevant for addressing the requirements, and devise selection criteria for choosing the best tools. We present an evaluation of the tools and present a ranking for the tools that meet the particular requirements of the case study. The effort in this paper broadens the notion of cloud security monitoring and provides a methodical practical approach to solving a security related issue.
|Keywords||Cloud computing; Monitoring; Security monitoring; Hardware; Computer architecture|
|Book title||2016 Cybersecurity and Cyberforensics Conference (CCC)|
|20 Oct 2016|
|Publication process dates|
|Deposited||15 Feb 2017|
|Event||2015 Cybersecurity and Cyberforensics Conference (CCC)|
|Digital Object Identifier (DOI)||https://doi.org/10.1109/CCC.2016.8|
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
|Accepted author manuscript|
2views this month
8downloads this month