Maintaining Secure Cloud by Continuous Auditing
Journal: International Journal of Trend in Scientific Research and Development (Vol.2, No. 3)Publication Date: 2018-08-02
Authors : M. Kanimozhi A. Aishwarya S. Triumal;
Page : 515-519
Keywords : trust in cloud computing; cloud service providers (CSPs); logging; auditability; accountability; data provenance; continuous auditing and monitoring; governance;
Abstract
Increases in cloud computing capacity, as well as decreases in the cost of processing, are moving at a fast pace. These patterns make it incumbent upon organizations to keep pace with changes in technology that significantly influence security. Cloud security auditing depends upon the environment, and the rapid growth of cloud computing is an important new context in world economics. The small price of entry, bandwidth, and processing power capability means that individuals and organizations of all sizes have more capacity and agility to exercise shifts in computation and to disrupt industry in cyberspace than more traditional domains of business economics worldwide. An analysis of prevalent cloud security issues and the utilization of cloud audit methods can mitigate security concerns. This verification methodology indicates how to use frameworks to review cloud service providers (CSPs). The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by potential customers. While preventive controls for security and privacy are actively researched, there is still little focus on detective controls related to cloud accountability and auditability. The complexity resulting from large-scale virtualization and data distribution carried out in current clouds has revealed an urgent research agenda for cloud accountability, as has the shift in focus of customer concerns from servers to data. M. Kanimozhi | A. Aishwarya | S. Triumal"Maintaining Secure Cloud by Continuous Auditing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10829.pdf http://www.ijtsrd.com/engineering/computer-engineering/10829/maintaining-secure-cloud-by-continuous-auditing/m-kanimozhi
Other Latest Articles
- Vehicle Density Based Traffic Control System
- The method of calculation of vertical drain performance when using siphon drains for infiltration water intake
- Optimization of insecticidal potency of composites of aqueous, acetone, and ethanol extracts of Piper guineense seed on Callosobruchus maculatus by the simplex-lattice mixture experimental design
- Evaluation of the Effectiveness of Fungi (Candida Tropicalis and Aspergillus Clavatus) in Bioremediation of used Engine Oil Contaminated Soil using Bioaugmentation Technique
- Effect of Compost Made from Decomposing Cocoa Pod and Animal Dung on the Yield of Maize Crop
Last modified: 2018-08-02 20:36:55