Refine
Year of publication
Document Type
- Conference Proceeding (36)
- Article (reviewed) (8)
- Part of a Book (4)
- Contribution to a Periodical (4)
- Article (unreviewed) (3)
- Patent (1)
Conference Type
- Konferenzartikel (31)
- Konferenz-Abstract (2)
- Konferenz-Poster (2)
- Sonstiges (1)
Language
- English (56) (remove)
Keywords
- E-Learning (4)
- Couplings (3)
- Design automation (3)
- Finite difference methods (3)
- Mobile Learning (3)
- Virtuelle Realität (3)
- mobile learning (3)
- Algorithmus (2)
- FETs (2)
- Finite-Elemente-Methode (2)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (49)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (11)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (1)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (1)
Open Access
- Open Access (22)
- Closed (19)
- Bronze (10)
- Closed Access (7)
- Gold (1)
Logging information is more precious as it contains the execution of a system; it is produced by millions of events from simple application logins to random system errors. Most of the security related problems in the cloud ecosystem like intruder attacks, data loss, and denial of service, etc. could be avoided if Cloud Service Provider (CSP) or Cloud User (CU) analyses the logging information. In this paper we introduced few challenges, which are place of monitoring, security, and ownership of the logging information between CSP and CU.
Also we proposed a logging architecture to analyze the behaviour of the cloud ecosystem, to avoid data breaches and other security related issues at the CSP space. So that we believe our proposed architecture can provide maximum trust between CU and CSP.