Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments

@article{Ko2011FloggerAF,
  title={Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments},
  author={Ryan Kok Leong Ko and Peter Jagadpramana and Bu-Sung Lee},
  journal={2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications},
  year={2011},
  pages={765-771}
}
  • R. KoPeter JagadpramanaBu-Sung Lee
  • Published 18 August 2011
  • Computer Science
  • 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
Trust is one of the main obstacles to widespread Cloud adoption. In order to increase trust in Cloud computing, we need to increase transparency and accountability of data in the Cloud for both enterprises and end-users. However, current system tools are unable to log file accesses and transfers effectively within a Cloud environment. In this paper, we present Flogger, a novel file-centric logger suitable for both private and public Cloud environments. Flogger records file-centric access and… 

Figures and Tables from this paper

A Resource-Efficient Integrity Monitoring and Response Approach for Cloud Computing Environment

A centralized cum distributed approach for file monitoring of VMs on a host in cloud and the initial outcomes of its execution are presented, which eventually results in increased computational and storage efficiency.

A light weight centralized file monitoring approach for securing files in Cloud environment

The designed and successfully developed tool solves the issue of tampering with important files from VM users even if the user is intelligent enough to exploit operating system specific vulnerabilities for getting elevated privileges to perform such operations.

STRATUS: Towards Returning Data Control to Cloud Users

This paper proposes a user-centric approach which returns data control to the data owners --- empowering users with data provenance, transparency and auditability, homomorphic encryption, situation awareness, revocation, attribution and data resilience.

Seclogmon : Security in cloud computing using activity log for consumer data protection

  • T. SridharV. VivekR. Shekhar
  • Computer Science
    2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)
  • 2017
This work proposed a novel approach which will maintain logging and monitoring for helping cloud consumers to identify any abnormal activity and resolve the problems accordingly and creates a tool which parses these logs and provides user the apt amount of information and allows them to understand their activities and job behavior on cloud.

Active data-centric framework for data protection in cloud environment

This work proposes a novel active data-centric framework which packages the raw data with active properties that enforce data usage with active defending and protection capability and employs the zero-knowledge proof scheme to verify the request’s identification without revealing any vital information.

An Applicative Approach for Collecting and Fortifying History of Data in Cloud Environment

A mechanism to generate the log files, ensure security to log files and making the log file interoperable to the Cloud Service Provider (CSP) is developed.

Time synchronization: pivotal element in cloud forensics

This paper investigates the impact that the CC model has on the trustworthiness of one of the main CF sources of information, the log-files, and provides a list of guidelines toward a CF aware timekeeping system.

AntiqueData: A Proxy to Maintain Computational Transparency in Cloud

The risks associated with lack of transparency in cloud are identified and a middleware service that eliminates these risks is proposed that is suitable for on-demand cloud computing.

A secure and lightweight approach for critical data security in cloud

The novelty of the approach lies in the fact that the file is the compressed encrypted hash of the data stored in the file that can't be reverse engineered by an attacker easily and the tool is lightweight and initial results dictate that it is scalable and efficient.

Developing trustworthy Cloud with the Help of TTP

A Framework Which Achieves Accountability By Generating Logs For Every User Activity is proposed and a Kernel Level Encryption Mechanism For Encrypting Log and TTP For Storing and Accessing the Logs is suggested.
...

References

SHOWING 1-10 OF 30 REFERENCES

A Survey of Large Scale Data Management Approaches in Cloud Environments

This paper gives a comprehensive survey of numerous approaches and mechanisms of deploying data-intensive applications in the cloud and analyzes the various design decisions of each approach and its suitability to support certain classes of applications and end-users.

Towards Achieving Accountability, Auditability and Trust in Cloud Computing

This position paper considers related research challenges and lays a foundation towards addressing these via three main abstraction layers of cloud accountability and a Cloud Accountability Life Cycle.

TrustCloud: A Framework for Accountability and Trust in Cloud Computing

Key issues and challenges in achieving a trusted cloud through the use of detective controls are discussed, and the Trust Cloud framework is presented, which addresses accountability in cloud computing via technical and policy-based approaches.

Automated System Monitoring and Notification with Swatch

An easily configurable log file filter/monitor, called swatch, is developed that acts to filter out unwanted data and take one or more user specified actions based upon patterns in the log.

SEA: A Scalable Encryption Algorithm for Small Embedded Applications

The proposed design is parametric in the text, key and processor size, allows efficient combination of encryption/decryption, “on-the-fly” key derivation and its security against a number of recent cryptanalytic techniques is discussed.

Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices

The experimental results show that after a system initialization phase Hummingbird can achieve up to 147 and 4.7 times faster throughput for a size-optimized and a speed- Optimized implementations, respectively, when compared to the state-of-the-art ultra-lightweight block cipher PRESENT on the similar platforms.

Snort: Lightweight Intrusion Detection for Networks

Snort provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected.

KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers

A new family of very efficient hardware oriented block ciphers divided into two flavors, which is more compact in hardware, as the key is burnt into the device (and cannot be changed), and achieves encryption speed of 12.5 KBit/sec.

New Lightweight DES Variants

A new block cipher, DESL (DES Lightweight), which is based on the classical DES (Data Encryption Standard) design, but unlike DES it uses a single S-box repeated eight times, which is well suited for ultra-constrained devices such as RFID tags.

The Hummingbird-2 Lightweight Authenticated Encryption Algorithm

The Hummingbird-2 algorithm, its design and security arguments, performance analysis on both software and hardware platforms, and timing analysis in relation to the ISO 18000-6C protocol are presented.