The full text of this article
Auditing and analysis of network traffic in cloud environment
by Sachin Shetty; Biswajit Biswal; Hellen Maziku
International Journal of Business Process Integration and Management (IJBPIM), Vol. 7, No. 2, 2014
Abstract: Cloud computing allows users to remotely store their data into the cloud and provides on-demand access to applications and services. The security of the outsourced data in the cloud is dependent on the security of the cloud computing system and network. Though there have been numerous efforts on securing data on the cloud computing system, evaluation of security of cloud networks is still a very challenging task. Specifically, the audit of the cloud computing network will provide insights onto the level of protection provided within and outside data centres. This paper presents key technologies for cloud auditing to assess the security level within and outside cloud data centres: cloud data geolocation and cloud network risk assessment. We evaluate their performance on commercial cloud platforms and our experimental results demonstrate that cloud auditing technologies provide users the ability to assess the security of the cloud network.
Online publication date: Wed, 16-Jul-2014
is only available to individual subscribers or to users at subscribing institutions.
Go to Inderscience Online Journals to access the Full Text of this article.
Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.
Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Business Process Integration and Management (IJBPIM):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable).
See our Orders page to subscribe.
If you still need assistance, please email email@example.com