• Login
    View Item 
    •   KABU Repository Home
    • Conference, Seminars, Workshop and trainings.
    • Conference Papers
    • 8th Annual Conference Kabarak University 2018
    • View Item
    •   KABU Repository Home
    • Conference, Seminars, Workshop and trainings.
    • Conference Papers
    • 8th Annual Conference Kabarak University 2018
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    An Architecture for Detecting Information Technology Infrastructure Policy Violations in a Cloud Environment

    Thumbnail
    View/Open
    Conference Proceedings (121.0Kb)
    Date
    2018-10-14
    Author
    Oginga, Ruth Anyango
    Musau, Felix
    Maghanga, Christopher
    Metadata
    Show full item record
    Abstract
    Organizations are increasingly becoming aware of the business value that cloud computing brings and are taking steps towards transition to the cloud. Just like any other technology it brings new security threats and challenges. A smooth transition entails a thorough understanding of the benefits as well as challenges involved. Privacy is a concern that has risen as obstacle to widespread adoption of clouds by users. Many organizations consider the deployment of different types of protection systems to curb the various malicious activities. The systems can offer sophisticated monitoring and reporting capabilities to identify attacks against cloud environment, while stopping multiple classes of attacks before they are successful against a network. Despite the use of protection systems to detect any malicious activities, some users still find ways to violate some of the laid down IT infrastructure Acceptable Use Policies. While many cloud security research focus on enforcing standard access control policies typical of centralized systems, such policies have often proved inadequate. For this reason, an architecture has been developed to automatically detect IT infrastructure policy violation in a cloud environment The implication of this research is that institutions would regain their trust in this paradigm and consider implementing policies in their clouds. Since policy violation is one of the major hindrances to the implementation of cloud computing, the policy violation detection architecture could be employed by institutions to ensure data security in cloud environment. The architecture uses software agents as its core components to collect evidence across cloud environment. The architecture captures any policy violation in the cloud environment when using any IT infrastructure. Therefore we discuss the policy violation detection architecture and present our findings in this paper.
    URI
    http://10.1.130.140:8080/xmlui/handle/123456789/431
    Collections
    • 8th Annual Conference Kabarak University 2018 [57]

    Copyright © 2022 
    Kabarak University Libraries
    | Repository Policy | Send Feedback
     

    Browse

    All of KABU RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Copyright © 2022 
    Kabarak University Libraries
    | Repository Policy | Send Feedback