Secure Cloud Computing: Continuous Anomaly Detection Approach in Legal Metrology

被引:0
|
作者
Oppermann, Alexander [1 ]
Toro, Federico Grasso [1 ]
Thiel, Florian [1 ]
Seifert, Jean-Pierre [2 ]
机构
[1] Physikal Tech Bundesanstalt PTB, Dept Metrol IT 85, Berlin, Germany
[2] Tech Univ Berlin, Secur Telecommunicat, Berlin, Germany
关键词
Anomaly Detection; Continuous Monitoring; Secure Cloud Computing; Anomaly Detection as a Service; Distributed Computing; Legal Metrology;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the field of Legal Metrology, it shall be assured that all measurements are carried out by a trusted computer system. Securing Computer Systems, especially in a distributed environment can be a challenging task to comply, since, in such an environment, a measurement instrument cannot be simply disconnected to guarantee its security. Following the approach of continuous monitoring to derive a normal system behavior can ensure continuous anomaly detection to satisfy the needed demands of Legal Metrology. The proposed Anomaly Detection approach measures the severity of the detected incident and places it into three different categories: green, yellow and red. The presented module can detect attacks against distributed applications in a cloud computing environment, using pattern recognition techniques for clustering, as well as statistical approaches. Both, inexperienced and experienced attacks have been tested and results are presented.
引用
收藏
页码:1831 / 1836
页数:6
相关论文
共 50 条
  • [31] Towards a Stakeholder-Oriented Taxonomical Approach for Secure Cloud Computing
    Abuhussein, Abdullah
    Bedi, Harkeerat
    Shiva, Sajjan
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 958 - 959
  • [32] Secure torage of Data in Cloud Computing
    Fu, Zhangjie
    Cao, Xinyue
    Wang, Jin
    Sun, Xingming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 783 - 786
  • [33] A hybrid algorithm for secure cloud computing
    Das D.
    International Journal of Wireless and Mobile Computing, 2020, 18 (02) : 116 - 122
  • [34] Secure storage of data in cloud computing
    20150500466883
    (1) School of Computer and Software and Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing; 210044, China, 1600, IEEE Tainan Section; International Society of Management Engineers; JSPS/NSFC/NRF A3 Foresight Program Ultra-Realistic Acoustic Interactive Communication on Next-Generation Internet; Tainan Chapter of IEEE Signal Processing Society; Waseda University (Institute of Electrical and Electronics Engineers Inc.):
  • [35] Cryptographic Protocols for Secure Cloud Computing
    Alhumrani, S. A.
    Kar, Jayaprakash
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 301 - 310
  • [36] Secure Document Service for Cloud Computing
    Xu, Jin-Song
    Huang, Ru-Cheng
    Huang, Wan-Ming
    Yang, Geng
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 541 - +
  • [37] A Secure Cloud Computing Scaling Model
    Lei, Mingyue
    Huang, Zheng
    Wen, Qiaoyan
    Hu, Chunye
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 60 - 66
  • [38] Secure User Authentication in Cloud Computing
    Javaid, Zeeshan
    Ijaz, Imran
    PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [39] A Cryptographic Scheme for Secure Cloud Computing
    Llamas, Alejandro
    Ernesto Gonzalez, Raul
    2013 10TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE), 2013, : 221 - 226
  • [40] Secure Sharing of Data in Cloud Computing
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 24 - 35