scholarly journals A Comparative Analysis of Honeypots on Different Cloud Platforms

Sensors ◽  
2021 ◽  
Vol 21 (7) ◽  
pp. 2433
Author(s):  
Christopher Kelly ◽  
Nikolaos Pitropakis ◽  
Alexios Mylonas ◽  
Sean McKeown ◽  
William J. Buchanan

In 2019, the majority of companies used at least one cloud computing service and it is expected that by the end of 2021, cloud data centres will process 94% of workloads. The financial and operational advantages of moving IT infrastructure to specialised cloud providers are clearly compelling. However, with such volumes of private and personal data being stored in cloud computing infrastructures, security concerns have risen. Motivated to monitor and analyze adversarial activities, we deploy multiple honeypots on the popular cloud providers, namely Amazon Web Services (AWS), Google Cloud Platform (GCP) and Microsoft Azure, and operate them in multiple regions. Logs were collected over a period of three weeks in May 2020 and then comparatively analysed, evaluated and visualised. Our work revealed heterogeneous attackers’ activity on each cloud provider, both when one considers the volume and origin of attacks, as well as the targeted services and vulnerabilities. Our results highlight the attempt of threat actors to abuse popular services, which were widely used during the COVID-19 pandemic for remote working, such as remote desktop sharing. Furthermore, the attacks seem to exit not only from countries that are commonly found to be the source of attacks, such as China, Russia and the United States, but also from uncommon ones such as Vietnam, India and Venezuela. Our results provide insights on the adversarial activity during our experiments, which can be used to inform the Situational Awareness operations of an organisation.

2020 ◽  
Vol 10 (24) ◽  
pp. 9148
Author(s):  
Germán Moltó ◽  
Diana M. Naranjo ◽  
J. Damian Segrelles

Cloud computing instruction requires hands-on experience with a myriad of distributed computing services from a public cloud provider. Tracking the progress of the students, especially for online courses, requires one to automatically gather evidence and produce learning analytics in order to further determine the behavior and performance of students. With this aim, this paper describes the experience from an online course in cloud computing with Amazon Web Services on the creation of an open-source data processing tool to systematically obtain learning analytics related to the hands-on activities carried out throughout the course. These data, combined with the data obtained from the learning management system, have allowed the better characterization of the behavior of students in the course. Insights from a population of more than 420 online students through three academic years have been assessed, the dataset has been released for increased reproducibility. The results corroborate that course length has an impact on online students dropout. In addition, a gender analysis pointed out that there are no statistically significant differences in the final marks between genders, but women show an increased degree of commitment with the activities planned in the course.


2014 ◽  
Vol 2014 ◽  
pp. 1-16 ◽  
Author(s):  
Md Whaiduzzaman ◽  
Mohammad Nazmul Haque ◽  
Md Rejaul Karim Chowdhury ◽  
Abdullah Gani

Cloud computing is currently emerging as an ever-changing, growing paradigm that models “everything-as-a-service.” Virtualised physical resources, infrastructure, and applications are supplied by service provisioning in the cloud. The evolution in the adoption of cloud computing is driven by clear and distinct promising features for both cloud users and cloud providers. However, the increasing number of cloud providers and the variety of service offerings have made it difficult for the customers to choose the best services. By employing successful service provisioning, the essential services required by customers, such as agility and availability, pricing, security and trust, and user metrics can be guaranteed by service provisioning. Hence, continuous service provisioning that satisfies the user requirements is a mandatory feature for the cloud user and vitally important in cloud computing service offerings. Therefore, we aim to review the state-of-the-art service provisioning objectives, essential services, topologies, user requirements, necessary metrics, and pricing mechanisms. We synthesize and summarize different provision techniques, approaches, and models through a comprehensive literature review. A thematic taxonomy of cloud service provisioning is presented after the systematic review. Finally, future research directions and open research issues are identified.


2021 ◽  
Vol 9 (1) ◽  
pp. 41-50
Author(s):  
Ruhul Amin ◽  
Siddhartha Vadlamudi

Cloud data migration is the process of moving data, localhost applications, services, and data to the distributed cloud processing framework. The success of this data migration measure is relying upon a few viewpoints like planning and impact analysis of existing enterprise systems. Quite possibly the most widely recognized process is moving locally stored data in a public cloud computing environment. Cloud migration comes along with both challenges and advantages, so there are different academic research and technical applications on data migration to the cloud that will be discussed throughout this paper. By breaking down the research achievement and application status, we divide the existing migration techniques into three strategies as indicated by the cloud service models essentially. Various processes should be considered for different migration techniques, and various tasks will be included accordingly. The similarities and differences between the migration strategies are examined, and the challenges and future work about data migration to the cloud are proposed. This paper, through a research survey, recognizes the key benefits and challenges of migrating data into the cloud. There are different cloud migration procedures and models recommended to assess the presentation, identifying security requirements, choosing a cloud provider, calculating the expense, and making any essential organizational changes. The results of this research paper can give a roadmap for data migration and can help decision-makers towards a secure and productive migration to a cloud computing environment.


2020 ◽  
Vol 17 (8) ◽  
pp. 3581-3585
Author(s):  
M. S. Roobini ◽  
Selvasurya Sampathkumar ◽  
Shaik Khadar Basha ◽  
Anitha Ponraj

In the last decade cloud computing transformed the way in which we build applications. The boom in cloud computing helped to develop new software design and architecture. Helping the developers to focus more on the business logic than the infrastructure. FaaS (function as a service) compute model it gave developers to concentrate only on the application code and rest of the factors will be taken care by the cloud provider. Here we present a serverless architecture of a web application built using AWS services and provide detail analysis of lambda function and micro service software design implemented using these AWS services.


Author(s):  
Dhimas Dirgantara ◽  
Is Mardianto

In this era, traditional technologies such as having servers and various kinds of hardware have been abandoned by large companies, which are turning to cloud computing technology. This technology makes it easier for companies to run their business. Of the many cloud computing service providers, Amazon Web Service (AWS) is one of the first and biggest service providers. Problems that occur in the use of cloud computing technology is the provision of access rights in data management. AWS has a service to manage access control for each service, namely Identity and Access Management (IAM). This service seeks to prevent activities that lead to security breaches. The results obtained are in the form of groups that can access AWS services according to the role given. Pada era ini, teknologi tradisional seperti memiliki server dan berbagai macam hardware telah ditinggalkan oleh perusahaan besar, yang beralih pada teknologi cloud computing. Teknologi ini memudahkan perusahaan dalam menjalankan bisnisnya. Dari banyaknya penyedia layanan cloud computing, Amazon Web Service (AWS) adalah salah satu penyedia layanan pertama dan yang terbesar. Masalah-masalah yang terjadi dalam penggunaan teknologi cloud computing adalah pemberian hak akses dalam melakukan manajemen data. AWS memiliki suatu layanan untuk mengatur kendali akses pada setiap layanan yaitu Identity and Access Management (IAM). Layanan ini berupaya mencegah aktivitas yang mengarah pada pelanggaran keamanan. Hasil yang didapatkan berupa group yang dapat mengakses layanan AWS sesuai dengan role yang diberikan.


Axioms ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 309
Author(s):  
Chia-Nan Wang ◽  
Minh-Nhat Nguyen ◽  
Thi-Duong Nguyen ◽  
Hsien-Pin Hsu ◽  
Thi-Hai-Yen Nguyen

Assessing business performance is a critical issue for practicing managers, and business performance has always been of interest to managers and researchers. In recent years, the world has experienced a rapid growth in the cloud computing service sector thanks to its benefits to business organizations and economic development. Therefore, the performance efficiency of this sector has been concerned as one of the keys in today’s economic environment. This study aimed to assess the performance efficiency of cloud computing service providers in the United States of America, one of the biggest global markets in terms of cloud computing, by applying the data envelopment analysis models. The efficiency of cloud computing providers was evaluated based on the assumption of the non-cooperative game among cloud computing providers in which providers selfishly choose the best strategy to maximize their payoff with three stages. In the first stage, the performance of these providers over the past period was measured by a super slack-based measure. In the second stage, the performance in the future period was predicted by the new data envelopment analysis model: the past–present–future model based on resampling. In the last stage, the efficiency improvement was investigated by adopting the Malmquist productivity index. The findings of this study indicated that the percentage of inefficient providers would increase from 10% in the period from 2017 to 2020 to 20% for 2021 and 2024. Moreover, 30% of providers showed a regress in performance efficiency over the research period of 2017 to 2024. The results of this study provide an insight picture to the decision-makers, and this research will fill the gap in the literature as the first study that measures and predicts the performance efficiency of cloud computing service providers, which will provide a helpful reference for future studies.


The resources and the services that the cloud provides are attractive for the users and are distinct from one cloud provider to another. The concerning aspect is how much securely our data stored in cloud is and how the data is protected against attacks. Various encryption algorithms or techniques of cryptography are used to protect data against attacks and also provides authenticity and confidentiality of data I an online and offline environment. Therefore in this paper various cryptographic aspects are covered, predominantly compares different algorithms with suggested solutions and results including cloud data protection. Authentication of data, confidentiality of data and data integrity aspects are the primary factors that have to be addressed in today’s social networking and in the distributed environments. Cryptography and crypto cloud computing plays major role in secure transfer and storage of information.


2019 ◽  
pp. 226-248
Author(s):  
Muthu Ramachandran

Enterprise security is the key to achieve global information security in business and organisations. Enterprise Cloud computing is a new paradigm for that enterprise where businesses need to be secured. However, this new trend needs to be more systematic with respect to Enterprise Cloud security. This chapter has developed a framework for enterprise security to analyze and model Enterprise Cloud organisational security of the Enterprise Cloud and its data. In particular, Enterprise Cloud data & Enterprise Cloud storage technologies (Amazon s3, Drop Box, Google Drive, etc.) have now become a normal practice for almost every computing user's. Therefore, building trust for Enterprise Cloud users should be the one of the main focuses of Enterprise Cloud computing research. This chapter has developed a framework for enterprises which comprises of two models of businesses: Enterprise Cloud provider enterprise model and Enterprise Cloud consumer enterprise model.


2016 ◽  
Vol 24 ◽  
pp. 23
Author(s):  
Liliia Oprysk

Cloud-based services (especially IaaS) are widely used by businesses, including small and medium-sized enterprises. The recently adopted General Data Protection Regulation is going to influence the EU cloud computing market significantly, and SMEs using IaaS to process personal data of their clients face a need to adapt to those changes if they are to remain compliant with the data protection rules. The objective with the paper was to look into the regulation adopted and identify the aspects that significantly influence the relations between a cloud provider and a client, especially if seen from the perspective of SMEs. Further, the paper discusses whether IaaS will be an obvious choice for SMEs seeking to hire computer infrastructure resources for the purpose of processing personal data when the compliance efforts necessary after the General Data Protection Regulation comes into force are taken into account. The findings suggest that forthcoming changes could significantly affect the industry and, in light of the likely increase in transaction costs, that SMEs may want to consider traditional outsourcing services instead. Consequently, the results of the data protection reform would be contradictory to other objectives of the European Commission, especially that of wider adoption of cloud services by SMEs.


Author(s):  
Er. Krishan Kumar ◽  
Shipra

This research revolves around understanding the Cloud Storage Services offered by world's most famous Cloud Provider Amazon Web Services (AWS). We will be covering major Cloud Storage Services like EBS, S3 and EFS. But first let’s understand more about AWS. We should use these end-of-life services as a per-project and keep in mind the key benefits of these end-to-end services. Amazon EBS brings the highest end-to-end prices available with block for level of Amazon Elastic Compute Cloud (EC2) instances. Saves data to file system stored after EC2 status closure. Amazon EFS provides portable file storage, also designed for EC2. It can be used as a standard data source for any application or load that works in most cases. Using the EFS file system, you can configure file system installation settings. The main difference between EBS and EFS is that EBS is only accessible from a single EC2 state in your specific AWS region, while EFS allows you to mount a file system in multiple regions and scenarios.


Sign in / Sign up

Export Citation Format

Share Document