Provenance Cloud Security Auditing System Based on Log Analysis

被引:0
|
作者
Chen, Haoyu [1 ]
Tu, Shanshan [2 ,3 ]
Zhao, Chunye [2 ]
Huang, Yongfeng [2 ]
机构
[1] Beijing Univ Post & Telecommun, Int Sch, Beijing 100876, Peoples R China
[2] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
[3] Univ Int Relat, Sch Informat Sci & Technol, Beijing 100091, Peoples R China
关键词
Cloud security Auditing; Provenance data; Trusted cloud framework; Log analysis; ACCESS-CONTROL SYSTEM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of cloud computing and distributed system, the security of data stored in cloud server becomes more and more important. In this paper, we analyze the challenges and problems of clouding security, and introduce the cloud security framework, as well as compare the different cloud security controlling methods. Meanwhile, we propose our own trusted cloud framework based on Cloud Accountability Life Cycle. To satisfy the requirements of cloud security, auditing the provenance data in cloud server is the most efficient method, and the log is a type of provenance data, which is relative easy and stable to collect. Therefore, audit based on log data plays a significant role in cloud security framework. In this paper, we also compare different security audit mechanisms, and point out their advantages and disadvantages as well as suggest how to improve these mechanisms.
引用
收藏
页码:155 / 159
页数:5
相关论文
共 50 条
  • [31] Log-Based Cloud Monitoring System for OpenStack
    Agrawal, Vaibhav
    Kotia, Devanjal
    Moshirian, Kamelia
    Kim, Mihui
    2018 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2018), 2018, : 276 - 281
  • [32] Rule-Based Auditing System for Software Security Assurance
    Jang, Changbok
    Kim, Jeongseok
    Jang, Hyokyung
    Park, Sundo
    Jang, Bokman
    Kim, Bonghoi
    Choi, Euiin
    2009 FIRST INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2009, : 198 - +
  • [33] A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality
    Zhen Yang
    Wenyu Wang
    Yongfeng Huang
    Xing Li
    Mobile Networks and Applications, 2021, 26 : 842 - 850
  • [34] A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality
    Yang, Zhen
    Wang, Wenyu
    Huang, Yongfeng
    Li, Xing
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (02): : 842 - 850
  • [35] Security data auditing based on multifunction digital watermark for multimedia file in cloud storage
    Ren, Yongjun, 1600, Science and Engineering Research Support Society (09):
  • [36] Efficient Association Rule Mining Algorithm Based on User Behavior for Cloud Security Auditing
    Zhao, Chunye
    Tu, Shanshan
    Chen, Haoyu
    Huang, Yongfeng
    2016 IEEE INTERNATIONAL CONFERENCE OF ONLINE ANALYSIS AND COMPUTING SCIENCE (ICOACS), 2016, : 145 - 149
  • [37] MASS -: Model for an Auditing Security System
    Liebenberg, A
    Eloff, JHP
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 141 - 150
  • [38] On Service Security Analysis for Event Log of IoT System Based on Data Petri Net
    Bin Ahmadon, Mohd Anuaruddin
    Yamaguchi, Shingo
    Saon, Sharifah
    Mahamad, Abd Kadir
    2017 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS (ISCE), 2017, : 4 - 8
  • [39] Enhanced Security Framework for Data Integrity Using Third-party Auditing in the Cloud System
    Balusamy, Balamurugan
    Venkatakrishna, P.
    Vaidhyanathan, Abinaya
    Ravikumar, Meenakshi
    Munisamy, Nirmala Devi
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 2, 2015, 325 : 25 - 31
  • [40] A Security Framework for Database Auditing System
    Wang Huijie
    2017 10TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL. 1, 2017, : 350 - 353