Provenance Cloud Security Auditing System Based on Log Analysis

被引:0
|
作者
Chen, Haoyu [1 ]
Tu, Shanshan [2 ,3 ]
Zhao, Chunye [2 ]
Huang, Yongfeng [2 ]
机构
[1] Beijing Univ Post & Telecommun, Int Sch, Beijing 100876, Peoples R China
[2] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
[3] Univ Int Relat, Sch Informat Sci & Technol, Beijing 100091, Peoples R China
关键词
Cloud security Auditing; Provenance data; Trusted cloud framework; Log analysis; ACCESS-CONTROL SYSTEM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of cloud computing and distributed system, the security of data stored in cloud server becomes more and more important. In this paper, we analyze the challenges and problems of clouding security, and introduce the cloud security framework, as well as compare the different cloud security controlling methods. Meanwhile, we propose our own trusted cloud framework based on Cloud Accountability Life Cycle. To satisfy the requirements of cloud security, auditing the provenance data in cloud server is the most efficient method, and the log is a type of provenance data, which is relative easy and stable to collect. Therefore, audit based on log data plays a significant role in cloud security framework. In this paper, we also compare different security audit mechanisms, and point out their advantages and disadvantages as well as suggest how to improve these mechanisms.
引用
收藏
页码:155 / 159
页数:5
相关论文
共 50 条
  • [1] Towards provenance cloud security auditing based on association rule mining
    Tu S.
    Huang X.
    International Journal for Engineering Modelling, 2019, 32 (01) : 1 - 16
  • [2] A Provenance Auditing Framework for Cloud Computing Systems
    Meera, G.
    Geethakumari, G.
    2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, INFORMATICS, COMMUNICATION AND ENERGY SYSTEMS (SPICES), 2015,
  • [3] A security evaluation framework for cloud security auditing
    Rizvi, Syed
    Ryoo, Jungwoo
    Kissell, John
    Aiken, William
    Liu, Yuhong
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (11): : 5774 - 5796
  • [4] A security evaluation framework for cloud security auditing
    Syed Rizvi
    Jungwoo Ryoo
    John Kissell
    William Aiken
    Yuhong Liu
    The Journal of Supercomputing, 2018, 74 : 5774 - 5796
  • [5] CDCAS: A Novel Cloud Data Center Security Auditing System
    Wang, Xueying
    Zhang, Jun
    Wang, Mingbo
    Zu, Lijun
    Lu, Zhihui
    Wu, Jie
    2014 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2014), 2014, : 605 - 612
  • [6] Comments on a lightweight cloud auditing scheme: Security analysis and improvement
    Rabaninejad, Reyhaneh
    Attari, Mahmoud Ahmadian
    Asaar, Maryam Rajabzadeh
    Aref, Mohammad Reza
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 139 : 49 - 56
  • [7] Mutual Auditing Framework for Service Level Security Auditing in Cloud
    Sasmal, Soumitra
    Pan, Indrajit
    2017 THIRD IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), 2017, : 297 - 302
  • [8] Anomaly Detection for Soft Security in Cloud based Auditing of Accounting Systems
    Neovius, Mats
    Duncan, Bob
    CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 471 - 478
  • [9] Cloud Security Issues and Log-based Proactive Strategy
    Mejri, Oumayma
    Yang, Dana
    Doh, Inshil
    2021 23RD INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT 2021): ON-LINE SECURITY IN PANDEMIC ERA, 2021, : 392 - 397
  • [10] Cloud Security Issues and Log-based Proactive Strategy
    Mejri, Oumayma
    Yang, Dana
    Doh, Inshil
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 392 - +