Enhancing Cloud Security and Privacy: The Power and the Weakness of the Audit Trail

Robert Anderson Keith Duncan, Mark Whittington

Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

76 Downloads (Pure)

Abstract

Information security in the cloud presents a serious challenge. We have identified fundamental weaknesses when undertaking cloud audit, namely the misconceptions surrounding the purpose of audit, what comprises a proper audit trail, what should be included, and how it should be achieved and maintained. A properly specified audit trail can provide a powerful tool in the armoury against cyber-crime, yet it is all too easy to throw away the benefits offered by this simple tool through lack of understanding, incompetence, mis-configuration or sheer laziness. Of course, merely having an effective audit trail is not enough — we actually have to examine it regularly to realise the potential benefits it offers.
Original languageEnglish
Title of host publicationCLOUD COMPUTING 2016
Subtitle of host publicationThe Seventh International Conference on Cloud Computing, GRIDs, and Virtualization
EditorsCarlos Becker Westphall, Yong Woo Lee, Stefan Rass
PublisherIARIA
Pages137-142
Number of pages6
ISBN (Print)978-1-61208-460-2
Publication statusPublished - 24 Mar 2016
EventThe Seventh International Conference on Cloud Computing, GRIDs, and Virtualization - H10 ROMA CITTA Via Pietro Blaserna, 101 (Quartiere Marconi) Roma 00146, Rome, Italy
Duration: 20 Mar 201624 Mar 2016
http://www.iaria.org/conferences2016/CLOUDCOMPUTING16.html

Conference

ConferenceThe Seventh International Conference on Cloud Computing, GRIDs, and Virtualization
Abbreviated titleCloudComp 2016
Country/TerritoryItaly
CityRome
Period20/03/1624/03/16
Internet address

Bibliographical note

Winner of best paper award.

Keywords

  • security
  • privacy
  • audit
  • audit trail

Fingerprint

Dive into the research topics of 'Enhancing Cloud Security and Privacy: The Power and the Weakness of the Audit Trail'. Together they form a unique fingerprint.

Cite this