Title: Auditing and analysis of network traffic in cloud environment

Authors: Sachin Shetty; Biswajit Biswal; Hellen Maziku

Addresses: Department of Electrical and Computer Engineering, Tennessee State University, Nashville, TN, USA ' Department of Electrical and Computer Engineering, Tennessee State University, Nashville, TN, USA ' Department of Electrical and Computer Engineering, Tennessee State University, Nashville, TN, USA

Abstract: Cloud computing allows users to remotely store their data into the cloud and provides on-demand access to applications and services. The security of the outsourced data in the cloud is dependent on the security of the cloud computing system and network. Though there have been numerous efforts on securing data on the cloud computing system, evaluation of security of cloud networks is still a very challenging task. Specifically, the audit of the cloud computing network will provide insights onto the level of protection provided within and outside data centres. This paper presents key technologies for cloud auditing to assess the security level within and outside cloud data centres: cloud data geolocation and cloud network risk assessment. We evaluate their performance on commercial cloud platforms and our experimental results demonstrate that cloud auditing technologies provide users the ability to assess the security of the cloud network.

Keywords: IP geolocation; cloud auditing; security risk assessment; cloud computing; cloud security auditing.

DOI: 10.1504/IJBPIM.2014.063519

International Journal of Business Process Integration and Management, 2014 Vol.7 No.2, pp.153 - 165

Available online: 16 Jul 2014

Full-text access for editors Access for subscribers Purchase this article Comment on this article