Network Traffic Auditing and Assessment in Cloud Environment

نویسندگان

  • Mansi Goyal
  • Richa Chhabra
چکیده

Network Traffic Auditing and Assessment in Cloud Environment 1 Mansi Goyal, 2 Richa Chhabra 1 Student, 2 Faculty ITM University, Gurgaon, Haryana, India ________________________________________________________________________________________ Abstract: Cloud computing permits users to remotely store their information into the cloud and provides ondemand applications and services from a shared pool of configurable resources. The protection of the outsourced information within the cloud is dependent on the protection of the cloud computer system and network. Though, there are varied efforts on securing data on the cloud computer system, assessment of information security on the network between cloud supplier and its user’s remains a very difficult task. The audit of the cloud computing system and network can give insights on the protection and performance of virtual machines, the OS on multiple data centres, the intra-cloud network managed by cloud providers and also the wide-area network between the cloud user and cloud supplier. Thus, network traffic assessment for cloud auditing is of vital importance so users will resort to an external audit party to verify the info security on the network between cloud provider and its users. This paper confers the following important technologies needed to research network traffic in the cloud computing domain: IP geolocation of network appliances between cloud supplier and its users, observance the data security of the cloud network path, and on-line mining of gigantic cloud auditing logs produced by cloud network traffic. _______________________________________________________________________________________

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Communication-Aware Traffic Stream Optimization for Virtual Machine Placement in Cloud Datacenters with VL2 Topology

By pervasiveness of cloud computing, a colossal amount of applications from gigantic organizations increasingly tend to rely on cloud services. These demands caused a great number of applications in form of couple of virtual machines (VMs) requests to be executed on data centers’ servers. Some of applications are as big as not possible to be processed upon a single VM. Also, there exists severa...

متن کامل

Urban network risk assessment using Fuzzy-AHP and TOPSIS in GIS environment

Risk assessment of urban network using traffic indicators determines vulnerable links with high danger of traffic incidents. Thus Determination of an appropriate methodology remains a big challenge to achieve this objective. This paper proposed a methodology based on data fusion concept using Fuzzy-AHP and TOPSIS to achieve this aim. The proposed methodology tries to overcome two main problems,...

متن کامل

A Novel Method for VANET Improvement using Cloud Computing

In this paper, we present a novel algorithm for VANET using cloud computing. We accomplish processing, routing and traffic control in a centralized and parallel way by adding one or more server to the network. Each car or node is considered a Client, in such a manner that routing, traffic control, getting information from client and data processing and storing are performed by one or more serve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014