Secure Cloud Computing: Continuous Anomaly Detection Approach in Legal Metrology

被引:0
|
作者
Oppermann, Alexander [1 ]
Toro, Federico Grasso [1 ]
Thiel, Florian [1 ]
Seifert, Jean-Pierre [2 ]
机构
[1] Physikal Tech Bundesanstalt PTB, Dept Metrol IT 85, Berlin, Germany
[2] Tech Univ Berlin, Secur Telecommunicat, Berlin, Germany
关键词
Anomaly Detection; Continuous Monitoring; Secure Cloud Computing; Anomaly Detection as a Service; Distributed Computing; Legal Metrology;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the field of Legal Metrology, it shall be assured that all measurements are carried out by a trusted computer system. Securing Computer Systems, especially in a distributed environment can be a challenging task to comply, since, in such an environment, a measurement instrument cannot be simply disconnected to guarantee its security. Following the approach of continuous monitoring to derive a normal system behavior can ensure continuous anomaly detection to satisfy the needed demands of Legal Metrology. The proposed Anomaly Detection approach measures the severity of the detected incident and places it into three different categories: green, yellow and red. The presented module can detect attacks against distributed applications in a cloud computing environment, using pattern recognition techniques for clustering, as well as statistical approaches. Both, inexperienced and experienced attacks have been tested and results are presented.
引用
收藏
页码:1831 / 1836
页数:6
相关论文
共 50 条
  • [41] A Framework for Secure Mobile Cloud Computing
    Ramavathu, Lakshmananaik
    Bairam, Manjula
    Manchala, Sadanandam
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 353 - 363
  • [42] Variational secure cloud quantum computing
    Shingu, Yuta
    Takeuchi, Yuki
    Endo, Suguru
    Kawabata, Shiro
    Watabe, Shohei
    Nikuni, Tetsuro
    Hakoshima, Hideaki
    Matsuzaki, Yuichiro
    PHYSICAL REVIEW A, 2022, 105 (02)
  • [43] Secure and Efficient Cloud Computing Framework
    Tawalbeh, Lo'ai
    Al-Qassas, Raad S.
    Darwazeh, Nour S.
    Jararweh, Yaser
    AlDosari, Fahd
    2015 INTERNATIONAL CONFERENCE ON CLOUD AND AUTONOMIC COMPUTING (ICCAC), 2015, : 291 - 295
  • [44] Telekine: Secure Computing with Cloud GPUs
    Hunt, Tyler
    Jia, Zhipeng
    Miller, Vance
    Szekely, Arid
    Hu, Yigc
    Rossbach, Christopher J.
    Witchel, Emmett
    PROCEEDINGS OF THE 17TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, 2020, : 817 - 833
  • [45] Secure multiparty computation in cloud computing
    Jiang H.
    Xu Q.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2152 - 2162
  • [46] A Secure Framework for Mobile Cloud Computing
    Al-Omary, Alauddin
    2019 INTERNATIONAL CONFERENCE ON INNOVATION AND INTELLIGENCE FOR INFORMATICS, COMPUTING, AND TECHNOLOGIES (3ICT), 2019,
  • [47] Secure cloud computing for genomic data
    Datta, Somalee
    Bettinger, Keith
    Snyder, Michael
    NATURE BIOTECHNOLOGY, 2016, 34 (06) : 588 - 591
  • [48] Secure Video Transcoding in Cloud Computing
    Baharon, Mohd Rizuan
    Shi, Qi
    Llewellyn-Jones, David
    Merabti, Madjid
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 18 - 26
  • [49] Secure cloud computing for genomic data
    Somalee Datta
    Keith Bettinger
    Michael Snyder
    Nature Biotechnology, 2016, 34 : 588 - 591
  • [50] Secure sharing with cryptography in cloud computing
    Chachapara, Kajal
    Bhadlawala, Sunny
    2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,