2012 IEEE Fifth International Conference on Cloud Computing 2012
DOI: 10.1109/cloud.2012.144
|View full text |Cite
|
Sign up to set email alerts
|

A Tiered Strategy for Auditing in the Cloud

Abstract: Abstract-In this paper, we outline a tiered approach to auditing information in the cloud. The approach provides perspectives on auditable events that may include compositions of independently formed audit trails. Filtering and reasoning over the audit trails can manifest potential security vulnerabilities and performance attributes as desired by stakeholders.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…Xie and Gamble [13] deploy an auditable event capture mechanism on service chains to detect message based attacks. This detection mechanism has been built on a tiered strategy for security auditing where each tier logs data on a specific level such as the service tier and the service chain tier.…”
Section: A Logging and Monitoring Techniques In The Cloudmentioning
confidence: 99%
See 2 more Smart Citations
“…Xie and Gamble [13] deploy an auditable event capture mechanism on service chains to detect message based attacks. This detection mechanism has been built on a tiered strategy for security auditing where each tier logs data on a specific level such as the service tier and the service chain tier.…”
Section: A Logging and Monitoring Techniques In The Cloudmentioning
confidence: 99%
“…The Session Manager also retains a basic history of the configuration, indicating services involved in particular session, and the session status, i.e. success or failure [13]. Additionally, the Session Manager requires the issuing of a token or ID to provide identity management for the session using an authority, such as a Security Token Service (STS).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The use of the Session Manager is derived from segregating cloud architecture components for better manageability [27]. Its purpose in this case study is to establish the session and the communication channels needed for improved and deliberate information sharing.…”
Section: Case Studymentioning
confidence: 99%
“…Such a service provides warning about various types of attacks, often involving multiple organizations. Figure 1 shows a multi tier architecture of the cloud adopted from [30]. Various types of auditing may take place in the cloud.…”
Section: Example Applicationmentioning
confidence: 99%