FAST-CCS: Finding a Solution to Cloud Cyber Security

Bob Duncan

Research output: Contribution to conferenceOther

Abstract

Cloud computing has been with us for over a decade now. Cloud based systems present a multiplicity of attack vectors. Cloud users frequently fail to grasp the complexity of cloud ecosystems, and fail to monitor properly what is going on within their cloud ecosystem. Due to the failure to monitor properly, and the frequent time lag between penetration and discovery, cloud forensic trails have usually long been destroyed, leaving no real evidence with which to analyse the event to understand what has gone wrong. Understanding which data records have been accessed, modified or deleted becomes an exceptionally difficult task, which is likely to result in failure to comply with new data governance rules. In addition, cloud simulators are often used to teach students about the dangers of using cloud, yet these very tools have their own vulnerabilities. The aim of this special track is to try to identify some novel approaches to address a number of these problems, with a view to providing a much more robust approach to cloud cyber security. We present some 6 papers which provide some novel ideas for addressing these very real problems in a highly effective way.
Original languageEnglish
Pages1-2
Number of pages2
Publication statusPublished - 19 Feb 2017
EventThe Eighth International Conferences on Cloud Computing, GRIDs, and Virtualization - Athens, Greece
Duration: 19 Feb 201723 Feb 2017

Conference

ConferenceThe Eighth International Conferences on Cloud Computing, GRIDs, and Virtualization
Abbreviated titleCLOUD COMPUTING 2017
CountryGreece
CityAthens
Period19/02/1723/02/17

Fingerprint

ecosystem
simulator
vulnerability
penetration
student

Keywords

  • Cloud Security and Privacy
  • immutable database
  • forensic trail

Cite this

Duncan, B. (2017). FAST-CCS: Finding a Solution to Cloud Cyber Security. 1-2. The Eighth International Conferences on Cloud Computing, GRIDs, and Virtualization, Athens, Greece.

FAST-CCS : Finding a Solution to Cloud Cyber Security. / Duncan, Bob.

2017. 1-2 The Eighth International Conferences on Cloud Computing, GRIDs, and Virtualization, Athens, Greece.

Research output: Contribution to conferenceOther

Duncan, B 2017, 'FAST-CCS: Finding a Solution to Cloud Cyber Security' The Eighth International Conferences on Cloud Computing, GRIDs, and Virtualization, Athens, Greece, 19/02/17 - 23/02/17, pp. 1-2.
Duncan B. FAST-CCS: Finding a Solution to Cloud Cyber Security. 2017. The Eighth International Conferences on Cloud Computing, GRIDs, and Virtualization, Athens, Greece.
Duncan, Bob. / FAST-CCS : Finding a Solution to Cloud Cyber Security. The Eighth International Conferences on Cloud Computing, GRIDs, and Virtualization, Athens, Greece.2 p.
@conference{29cf60d167fc481a8856450443a30bc1,
title = "FAST-CCS: Finding a Solution to Cloud Cyber Security",
abstract = "Cloud computing has been with us for over a decade now. Cloud based systems present a multiplicity of attack vectors. Cloud users frequently fail to grasp the complexity of cloud ecosystems, and fail to monitor properly what is going on within their cloud ecosystem. Due to the failure to monitor properly, and the frequent time lag between penetration and discovery, cloud forensic trails have usually long been destroyed, leaving no real evidence with which to analyse the event to understand what has gone wrong. Understanding which data records have been accessed, modified or deleted becomes an exceptionally difficult task, which is likely to result in failure to comply with new data governance rules. In addition, cloud simulators are often used to teach students about the dangers of using cloud, yet these very tools have their own vulnerabilities. The aim of this special track is to try to identify some novel approaches to address a number of these problems, with a view to providing a much more robust approach to cloud cyber security. We present some 6 papers which provide some novel ideas for addressing these very real problems in a highly effective way.",
keywords = "Cloud Security and Privacy, immutable database, forensic trail",
author = "Bob Duncan",
year = "2017",
month = "2",
day = "19",
language = "English",
pages = "1--2",
note = "The Eighth International Conferences on Cloud Computing, GRIDs, and Virtualization, CLOUD COMPUTING 2017 ; Conference date: 19-02-2017 Through 23-02-2017",

}

TY - CONF

T1 - FAST-CCS

T2 - Finding a Solution to Cloud Cyber Security

AU - Duncan, Bob

PY - 2017/2/19

Y1 - 2017/2/19

N2 - Cloud computing has been with us for over a decade now. Cloud based systems present a multiplicity of attack vectors. Cloud users frequently fail to grasp the complexity of cloud ecosystems, and fail to monitor properly what is going on within their cloud ecosystem. Due to the failure to monitor properly, and the frequent time lag between penetration and discovery, cloud forensic trails have usually long been destroyed, leaving no real evidence with which to analyse the event to understand what has gone wrong. Understanding which data records have been accessed, modified or deleted becomes an exceptionally difficult task, which is likely to result in failure to comply with new data governance rules. In addition, cloud simulators are often used to teach students about the dangers of using cloud, yet these very tools have their own vulnerabilities. The aim of this special track is to try to identify some novel approaches to address a number of these problems, with a view to providing a much more robust approach to cloud cyber security. We present some 6 papers which provide some novel ideas for addressing these very real problems in a highly effective way.

AB - Cloud computing has been with us for over a decade now. Cloud based systems present a multiplicity of attack vectors. Cloud users frequently fail to grasp the complexity of cloud ecosystems, and fail to monitor properly what is going on within their cloud ecosystem. Due to the failure to monitor properly, and the frequent time lag between penetration and discovery, cloud forensic trails have usually long been destroyed, leaving no real evidence with which to analyse the event to understand what has gone wrong. Understanding which data records have been accessed, modified or deleted becomes an exceptionally difficult task, which is likely to result in failure to comply with new data governance rules. In addition, cloud simulators are often used to teach students about the dangers of using cloud, yet these very tools have their own vulnerabilities. The aim of this special track is to try to identify some novel approaches to address a number of these problems, with a view to providing a much more robust approach to cloud cyber security. We present some 6 papers which provide some novel ideas for addressing these very real problems in a highly effective way.

KW - Cloud Security and Privacy

KW - immutable database

KW - forensic trail

M3 - Other

SP - 1

EP - 2

ER -