Provenance Cloud Security Auditing System Based on Log Analysis

Haoyu Chen,Shanshan Tu,Chunye Zhao,Yongfeng Huang
DOI: https://doi.org/10.1109/icoacs.2016.7563069
2016-01-01
Abstract:With the rapid development of cloud computing and distributed system, the security of data stored in cloud server becomes more and more important. In this paper, we analyze the challenges and problems of clouding security, and introduce the cloud security framework, as well as compare the different cloud security controlling methods. Meanwhile, we propose our own trusted cloud framework based on Cloud Accountability Life Cycle. To satisfy the requirements of cloud security, auditing the provenance data in cloud server is the most efficient method, and the log is a type of provenance data, which is relative easy and stable to collect. Therefore, audit based on log data plays a significant role in cloud security framework. In this paper, we also compare different security audit mechanisms, and point out their advantages and disadvantages as well as suggest how to improve these mechanisms.
What problem does this paper attempt to address?