Provenance Cloud Security Auditing System Based on Log Analysis

被引:0
|
作者
Chen, Haoyu [1 ]
Tu, Shanshan [2 ,3 ]
Zhao, Chunye [2 ]
Huang, Yongfeng [2 ]
机构
[1] Beijing Univ Post & Telecommun, Int Sch, Beijing 100876, Peoples R China
[2] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
[3] Univ Int Relat, Sch Informat Sci & Technol, Beijing 100091, Peoples R China
关键词
Cloud security Auditing; Provenance data; Trusted cloud framework; Log analysis; ACCESS-CONTROL SYSTEM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of cloud computing and distributed system, the security of data stored in cloud server becomes more and more important. In this paper, we analyze the challenges and problems of clouding security, and introduce the cloud security framework, as well as compare the different cloud security controlling methods. Meanwhile, we propose our own trusted cloud framework based on Cloud Accountability Life Cycle. To satisfy the requirements of cloud security, auditing the provenance data in cloud server is the most efficient method, and the log is a type of provenance data, which is relative easy and stable to collect. Therefore, audit based on log data plays a significant role in cloud security framework. In this paper, we also compare different security audit mechanisms, and point out their advantages and disadvantages as well as suggest how to improve these mechanisms.
引用
收藏
页码:155 / 159
页数:5
相关论文
共 50 条
  • [41] Improved Public Auditing System of Cloud Storage Based on BLS Signature
    Li, Ruifeng
    Yang, Haibin
    Wang, Xu An
    Yi, Zhengge
    Niu, Ke
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [42] Public Auditing Scheme for Data Storage Security in Cloud Computing
    Subha, T.
    Jayashri, S.
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 773 - 787
  • [43] Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack
    Madi, Taous
    Majumdar, Suryadipta
    Wang, Yushun
    Jarraya, Yosr
    Pourzandi, Makan
    Wang, Lingyu
    CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 195 - 206
  • [44] A Stakeholder-Oriented Assessment Index for Cloud Security Auditing
    Rizvi, Syed
    Ryoo, Jungwoo
    Kissell, John
    Aiken, Bill
    ACM IMCOM 2015, PROCEEDINGS, 2015,
  • [45] Public auditing of log integrity for shared cloud storage systems via blockchain
    Tian, Hui
    Wang, Jia
    Chang, Chin-Chen
    Quan, Hanyu
    WIRELESS NETWORKS, 2024, 30 (07) : 6249 - 6264
  • [46] Multi-agent based security auditing system of broadband MAN
    Gou, XT
    Jin, WD
    Zhang, GX
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON INTELLIGENT MECHATRONICS AND AUTOMATION, 2004, : 939 - 944
  • [47] Blockchain-Based Log Verification System for Cloud Forensics
    AGBEDANU Promise Ricardo
    王鹏伟
    雷颖慧
    NORTEY Richard N
    RASOOL Abdul
    ODARTEY Lamptey K
    JournalofDonghuaUniversity(EnglishEdition), 2021, 38 (05) : 449 - 458
  • [48] Public Auditing of Log Integrity for Shared Cloud Storage Systems via Blockchain
    Tian, Hui
    Wang, Jia
    Chang, Chin-Chen
    Quan, Hanyu
    MOBILE NETWORKS & APPLICATIONS, 2023,
  • [49] Performance of ELK Stack and Commercial System in Security Log Analysis
    Son, Sung Jun
    Kwon, Youngmi
    2017 IEEE 13TH MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS (MICC), 2017, : 187 - 190
  • [50] Log File's Centralization to Improve Cloud Security
    Amar, Meryem
    Lemoudden, Mouad
    El Ouahidi, Bouabid
    2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 178 - 183