Toggle Main Menu Toggle Search

Open Access padlockePrints

Logging Solutions to Mitigate Risks Associated With Threats in Infrastructure as a Service Cloud

Lookup NU author(s): Win Wongthai, Professor Aad van Moorsel



Cloud computing offers computational resources such as processing, networking, and storage to customers. However, the cloud also brings with it security concerns which affect both cloud consumers and providers. The Cloud Security Alliance (CSA) defines the security concerns as the seven main threats. This paper investigates how threat number one (malicious activities performed in consumers' virtual machines/VMs) can affect the security of both consumers and providers. It proposes logging solutions to mitigate risks associated with this threat. We systematically design and implement a prototype of the proposed logging solutions in an IaaS to record the history of customer VM’s files. The proposed system can be modified in order to record VMs' process behaviour log files. These log files can assist in identifying malicious activities (spamming) performed in the VMs as an example of how the proposed solutions benefits the provider side. The proposed system can record the log files while having a smaller trusted computing base compared to previous work. Thus, the logging solutions in this paper can assist in mitigating risks associated with the CSA threats to benefit consumers and providers.

Publication metadata

Author(s): Wongthai W, Rocha F, van Moorsel A

Publication type: Report

Publication status: Published

Series Title: School of Computing Science Technical Report Series

Year: 2013

Pages: 8

Print publication date: 01/12/2013

Source Publication Date: December 2013

Report Number: 1403

Institution: School of Computing Science, University of Newcastle upon Tyne

Place Published: Newcastle upon Tyne