Int. J. of Business Process Integration and Management   »   2014 Vol.7, No.2

 

 

Title: Auditing and analysis of network traffic in cloud environment

 

Authors: Sachin Shetty; Biswajit Biswal; Hellen Maziku

 

Addresses:
Department of Electrical and Computer Engineering, Tennessee State University, Nashville, TN, USA
Department of Electrical and Computer Engineering, Tennessee State University, Nashville, TN, USA
Department of Electrical and Computer Engineering, Tennessee State University, Nashville, TN, USA

 

Abstract: Cloud computing allows users to remotely store their data into the cloud and provides on-demand access to applications and services. The security of the outsourced data in the cloud is dependent on the security of the cloud computing system and network. Though there have been numerous efforts on securing data on the cloud computing system, evaluation of security of cloud networks is still a very challenging task. Specifically, the audit of the cloud computing network will provide insights onto the level of protection provided within and outside data centres. This paper presents key technologies for cloud auditing to assess the security level within and outside cloud data centres: cloud data geolocation and cloud network risk assessment. We evaluate their performance on commercial cloud platforms and our experimental results demonstrate that cloud auditing technologies provide users the ability to assess the security of the cloud network.

 

Keywords: IP geolocation; cloud auditing; security risk assessment; cloud computing; cloud security auditing.

 

DOI: 10.1504/IJBPIM.2014.063519

 

Int. J. of Business Process Integration and Management, 2014 Vol.7, No.2, pp.153 - 165

 

Available online: 16 Jul 2014

 

 

Editors Full text accessAccess for SubscribersPurchase this articleComment on this article