Log-based analysis on users′ behavior in cloud security auditing

Chunye ZHAO,Shanshan TU,Haoyu CHEN,Yongfeng HUANG
DOI: https://doi.org/10.16652/j.issn.1004-373x.2017.02.001
2017-01-01
Abstract:Cloud Storage provides data storage service for external by combing and coordinating different types of storage devices in the network,so that they can collectively work together. However it always exists a trust game relationship between users and service providers,therefore it is important to build a healthy,fair and secure cloud data service environment for the security auditing on the state of cloud data and operation processes. A cloud security?auditing scheme based on analysis of user behavior(UB)log data from cloud servers is proposed in this paper. The system log information analysis based on UB is realized functionally by description rules of UB. And the existing association rule mining algorithm is improved simultaneously,which is proposed for dealing with the Long Sequence Frequent Pattern(LSFP)to extract UB. The experiment result indicates that the so?lution can implement the tracking and evidence taking of data leakage efficiently for the cloud security auditing.
What problem does this paper attempt to address?