Title :
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance
Author :
Chun Hui Suen ; Ko, Ryan K. L. ; Yu Shyang Tan ; Jagadpramana, Peter ; Bu Sung Lee
Author_Institution :
Dept. of Comput. Sci., Univ. of Waikato, Hamilton, New Zealand
Abstract :
The inability to effectively track data in cloud computing environments is becoming one of the top concerns for cloud stakeholders. This inability is due to two main reasons. Firstly, the lack of data tracking tools built for clouds. Secondly, current logging mechanisms are only designed from a system-centric perspective. There is a need for data-centric logging techniques which can trace data activities (e.g. file creation, edition, duplication, transfers, deletions, etc.) within and across all cloud servers. This will effectively enable full transparency and accountability for data movements in the cloud. In this paper, we introduce S2Logger, a data event logging mechanism which captures, analyses and visualizes data events in the cloud from the data point of view. By linking together atomic data events captured at both file and block level, the resulting sequence of data events depicts the cloud data provenance records throughout the data lifecycle. With this information, we can then detect critical data-related cloud security problems such as malicious actions, data leakages and data policy violations by analysing the data provenance. S2Logger also enables us to address the gaps and inadequacies of existing system-centric security tools.
Keywords :
cloud computing; data analysis; data loggers; data protection; security of data; system monitoring; S2Logger; atomic data events; cloud computing environments; cloud data provenance; cloud data provenance records; cloud servers; cloud stakeholders; critical data-related cloud security problems; data activities; data event analysis; data event capturing; data event logging mechanism; data event visualization; data leakages; data lifecycle; data movement accountability; data movement transparency; data policy violations; data tracking tools; data-centric logging techniques; end-to-end data tracking mechanism; file creation; file deletions; file duplication; file edition; file transfers; logging mechanisms; malicious actions; system-centric security tools; Cloud computing; Distributed databases; Kernel; Linux; Monitoring; Security; Virtual machine monitors; Cloud Computing; Cloud data provenance; S2Logger; accountability in cloud computing; cloud computing security; cloud computing transparency; data tracing; data tracking; file tracking;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
DOI :
10.1109/TrustCom.2013.73