Abstract-Monitoring systems are commonly used by many organizations to collect information about their system and network operations. Typically, SNMP, IDS, or software agents generate log data and store them in a centralized monitoring system for analysis. However, malicious employees, attackers, or even organizations themselves can modify such data to hide malicious activities or to avoid expensive non-compliance fines. This paper proposes a cloud-based framework for verifying the trustworthiness of the logs based on a small amount of evidence data. A simple Cloud Security Monitoring (CSM) API, made available on the cloud services, allows organizations operating on the cloud to collect additional "evidence" about their systems. S...
Small companies need help to detect and to respond to increasing security related threats. This pape...
Cloud storage provides external data storage services by combining and coordinating different types ...
This paper exposes and explore the practical issues with the usability of log artefacts for digital ...
Abstract-Monitoring systems are commonly used by many organizations to collect information about the...
Effective activity and event monitoring is an essential aspect of digital forensic readiness. Techni...
In last years, the security appliance is becoming a more important and critical challenge considerin...
We propose the Cloud Log Assuring Soundness and Secrecy (CLASS) process as an elective plan for the ...
AbstractCloud computing is a technology that provides network based services on demand. Cloud comput...
Cloud services promise numerous advantages for companies over traditional in-house data processing i...
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They ...
Due to a lack of transparency in cloud based services well-defined security levels cannot be assured...
Abstract—Today’s cloud computing infrastructures usually require customers who transfer data into th...
Abstract—Today’s cloud computing infrastructures usually require customers who transfer data into th...
Cloud computing has grown largely over the past three years and is widely popular amongst today's IT...
The protection of sensitive information is of utmost importance for organizations. The complexity an...
Small companies need help to detect and to respond to increasing security related threats. This pape...
Cloud storage provides external data storage services by combining and coordinating different types ...
This paper exposes and explore the practical issues with the usability of log artefacts for digital ...
Abstract-Monitoring systems are commonly used by many organizations to collect information about the...
Effective activity and event monitoring is an essential aspect of digital forensic readiness. Techni...
In last years, the security appliance is becoming a more important and critical challenge considerin...
We propose the Cloud Log Assuring Soundness and Secrecy (CLASS) process as an elective plan for the ...
AbstractCloud computing is a technology that provides network based services on demand. Cloud comput...
Cloud services promise numerous advantages for companies over traditional in-house data processing i...
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They ...
Due to a lack of transparency in cloud based services well-defined security levels cannot be assured...
Abstract—Today’s cloud computing infrastructures usually require customers who transfer data into th...
Abstract—Today’s cloud computing infrastructures usually require customers who transfer data into th...
Cloud computing has grown largely over the past three years and is widely popular amongst today's IT...
The protection of sensitive information is of utmost importance for organizations. The complexity an...
Small companies need help to detect and to respond to increasing security related threats. This pape...
Cloud storage provides external data storage services by combining and coordinating different types ...
This paper exposes and explore the practical issues with the usability of log artefacts for digital ...