FAST-CCS: Finding a Solution to Cloud Cyber Security

Bob Duncan

Research output: Contribution to conferenceOtherpeer-review

Abstract

Cloud computing has been with us for over a decade now. Cloud based systems present a multiplicity of attack vectors. Cloud users frequently fail to grasp the complexity of cloud ecosystems, and fail to monitor properly what is going on within their cloud ecosystem. Due to the failure to monitor properly, and the frequent time lag between penetration and discovery, cloud forensic trails have usually long been destroyed, leaving no real evidence with which to analyse the event to understand what has gone wrong. Understanding which data records have been accessed, modified or deleted becomes an exceptionally difficult task, which is likely to result in failure to comply with new data governance rules. In addition, cloud simulators are often used to teach students about the dangers of using cloud, yet these very tools have their own vulnerabilities. The aim of this special track is to try to identify some novel approaches to address a number of these problems, with a view to providing a much more robust approach to cloud cyber security. We present some 6 papers which provide some novel ideas for addressing these very real problems in a highly effective way.
Original languageEnglish
Pages1-2
Number of pages2
Publication statusPublished - 19 Feb 2017
EventThe Eighth International Conferences on Cloud Computing, GRIDs, and Virtualization - Athens, Greece
Duration: 19 Feb 201723 Feb 2017

Conference

ConferenceThe Eighth International Conferences on Cloud Computing, GRIDs, and Virtualization
Abbreviated titleCLOUD COMPUTING 2017
Country/TerritoryGreece
CityAthens
Period19/02/1723/02/17

Keywords

  • Cloud Security and Privacy
  • immutable database
  • forensic trail

Fingerprint

Dive into the research topics of 'FAST-CCS: Finding a Solution to Cloud Cyber Security'. Together they form a unique fingerprint.

Cite this