Loading

An Attentive Security Mechanism to OpenStack Cloud Environment Using Enhanced Log Analysis
Sreekanth D1, Gladston Raj S2

1Sreekanth D, Research Scholar, Barathiar University, Coimbatore (TamilNadu), India.

2Gladston Raj S, Head, Department of Computer Science, Govt. College, Nedumangad, Trivandrum, Kerala, India.

Manuscript received on 04 April 2019 | Revised Manuscript received on 11 April 2019 | Manuscript Published on 26 April 2019 | PP: 343-345 | Volume-8 Issue-6S April 2019 | Retrieval Number: F61260486S19/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The security threat is a significant problem to the cloud environment in the current era. Providing security to the cloud without compromising the unique features of cloud computing such as high availability, scalability, etc. are needing to address whenever propose a security solution to the cloud environment. The authentication mechanisms and deployment of various cryptanalytical algorithms are one of the effective ways to prevent data leakage. Even though the security mechanisms can provide security to the data environment, there are different performance issues which will severely affect the unique features of cloud computing. This work has implemented with a method of deploying security to the cloud environment using the analysis of various cloud system logs collected from the OpenStack cloud.

Keywords: Open Stack, RSYS Log, Exploratory Analytics.
Scope of the Article: Computer Science and Its Applications