Publication Type : Journal Article
Publisher : International Journal of Control Theory and Applications
Source : International Journal of Control Theory and Applications, 2016
Campus : Chennai
School : School of Engineering
Department : Computer Science and Engineering
Year : 2016
Abstract : Paradigm shift always meant the reason for latest trending technologies with certain gaps. Cloud computing is one such domain where the security is being majorly handled by Big data analytical methodologies. But majority of the security systems which perform the monitoring and evaluating security and privacy of the cloud, uses the heterogeneous data generated based on client's data. Less touched gap is, using cloud network's flowdata as heterogeneous data and evaluate the security measure, specifically, to restrict inside attackers and compromised service provisions. Though SLAs bring in certain rigidity for being flawless in cloud networks, but not sufficient enough to meet the needs and control the intentional deviation of services initiated by a compromised network administrator. And, always there is extensible space for the improvising the SLAs implementation as there is no pre-defined framework for arriving on a SLA. Here, we discuss about the security supplement on cloud middleware, where heterogeneous network flowdata is used to identify the deviation in the agreed services provision, exhibiting some resiliency
Cite this Research Publication : Sangapu, Sreenivasa Chakravarthi & Ramanathan, Sakkaravarthi. (2016). Monitoring Cloud Services Exploitation using Heterogeneous Network Flowdata AnalysisMonitoring Cloud Services Exploitation using Heterogeneous Network Flowdata Analysis. International Journal of Control Theory and Applications. 9. 299-309.