Skip to main content

Research Repository

Advanced Search

Log file's centralization to improve cloud security

Amar, Meryem; Lemoudden, Mouad; El Ouahidi, Bouabid

Authors

Meryem Amar

Bouabid El Ouahidi



Abstract

The usage of cloud-computing architectures and characteristics has been enhanced in recent years. This approach brings the availability of storage and user services as needed. But it also brings many drawbacks that put the privacy and the security of the system at stake. Log file generation has Big Data characteristics that should be considered for upgrade from a manual method to an automatic one based on Big Data solutions. Therefore, this paper proposes a log file centralization and a diagnostic approach based on the misuse and the anomaly detection techniques, which will improve the detection of attacks. The FP-growth algorithm presented will ensure the prevention of consecutive violations.

Presentation Conference Type Conference Paper (Published)
Conference Name 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)
Start Date May 24, 2016
End Date May 26, 2016
Online Publication Date Feb 9, 2017
Publication Date 2016-05
Deposit Date Feb 28, 2023
Publisher Institute of Electrical and Electronics Engineers
Book Title 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)
DOI https://doi.org/10.1109/cloudtech.2016.7847696
Keywords Attack , Cloud-computing , FP-Growth , Log , Security