Visible to the public Research of Security Situational Awareness and Visualization Approach in Cloud Computing

TitleResearch of Security Situational Awareness and Visualization Approach in Cloud Computing
Publication TypeConference Paper
Year of Publication2018
AuthorsChen, J., Xu, R., Li, C.
Conference Name2018 International Conference on Networking and Network Applications (NaNA)
Keywordscloud computing, cloud computing security, composability, Computational modeling, data visualisation, Data visualization, elastic resource pooling, emergency response methods, high-efficiency advantage, Metrics, Network security, pubcrawl, resilience, Resiliency, resource allocation, secure information, security events, security of data, security situational awareness, Sensors, situational awareness, situational information, standardization, storage resource utilization
AbstractCloud computing is an innovative mechanism to optimize computing and storage resource utilization. Due to its cost-saving, high-efficiency advantage, the technology receives wide adoption from IT industries. However, the frequent emergences of security events become the heaviest obstacle for its advancement. The multi-layer and distributive characteristics of cloud computing make IT admins compulsively collect all necessary situational information at cloud runtime if they want to grasp the panoramic secure state, hereby practice configuration management and emergency response methods when necessary. On the other hand, technologies such as elastic resource pooling, dynamic load balancing and virtual machine real-time migration complicate the difficulty of data gathering, where secure information may come from virtual machine hypervisor, network accounting or host monitor proxies. How to classify, arrange, standardize and visualize these data turns into the most crucial issue for cloud computing security situation awareness and presentation. This dissertation borrows traditional fashion of data visualization to integrate into cloud computing features, proposes a new method for aggregating and displaying secure information which IT admins concern, and expects that by method realization cloud security monitor/management capabilities could be notably enhanced.
DOI10.1109/NANA.2018.8648738
Citation Keychen_research_2018