Abstract
Cloud computing has been with us for over a decade now. Cloud based systems present a multiplicity of attack vectors. Cloud users frequently fail to grasp the complexity of cloud ecosystems, and fail to monitor properly what is going on within their cloud ecosystem. Due to the failure to monitor properly, and the frequent time lag between penetration and discovery, cloud forensic trails have usually long been destroyed, leaving no real evidence with which to analyse the event to understand what has gone wrong. Understanding which data records have been accessed, modified or deleted becomes an exceptionally difficult task, which is likely to result in failure to comply with new data governance rules. In addition, cloud simulators are often used to teach students about the dangers of using cloud, yet these very tools have their own vulnerabilities. The aim of this special track is to try to identify some novel approaches to address a number of these problems, with a view to providing a much more robust approach to cloud cyber security. We present some 6 papers which provide some novel ideas for addressing these very real problems in a highly effective way.
Original language | English |
---|---|
Pages | 1-2 |
Number of pages | 2 |
Publication status | Published - 19 Feb 2017 |
Event | The Eighth International Conferences on Cloud Computing, GRIDs, and Virtualization - Athens, Greece Duration: 19 Feb 2017 → 23 Feb 2017 |
Conference
Conference | The Eighth International Conferences on Cloud Computing, GRIDs, and Virtualization |
---|---|
Abbreviated title | CLOUD COMPUTING 2017 |
Country/Territory | Greece |
City | Athens |
Period | 19/02/17 → 23/02/17 |
Keywords
- Cloud Security and Privacy
- immutable database
- forensic trail