Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments

@article{Ko2011FloggerAF,
  title={Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments},
  author={R. Ko and Peter Jagadpramana and Bu-Sung Lee},
  journal={2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications},
  year={2011},
  pages={765-771}
}
Trust is one of the main obstacles to widespread Cloud adoption. In order to increase trust in Cloud computing, we need to increase transparency and accountability of data in the Cloud for both enterprises and end-users. However, current system tools are unable to log file accesses and transfers effectively within a Cloud environment. In this paper, we present Flogger, a novel file-centric logger suitable for both private and public Cloud environments. Flogger records file-centric access and… Expand
91 Citations
A light weight centralized file monitoring approach for securing files in Cloud environment
  • 15
STRATUS: Towards Returning Data Control to Cloud Users
  • 6
  • PDF
Seclogmon : Security in cloud computing using activity log for consumer data protection
  • T. Sridhar, V. Vivek, R. Shekhar
  • Computer Science
  • 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)
  • 2017
  • 2
Time synchronization: pivotal element in cloud forensics
  • 5
  • PDF
AntiqueData: A Proxy to Maintain Computational Transparency in Cloud
  • 3
A secure and lightweight approach for critical data security in cloud
  • 15
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 32 REFERENCES
A Survey of Large Scale Data Management Approaches in Cloud Environments
  • 408
  • PDF
Towards Achieving Accountability, Auditability and Trust in Cloud Computing
  • 115
TrustCloud: A Framework for Accountability and Trust in Cloud Computing
  • 466
  • PDF
Automated System Monitoring and Notification with Swatch
  • 140
  • PDF
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices
  • 129
  • PDF
Snort: Lightweight Intrusion Detection for Networks
  • 3,431
  • PDF
The Fourth Paradigm: Data-Intensive Scientific Discovery
  • 1,983
  • PDF
New Lightweight DES Variants
  • 260
  • PDF
...
1
2
3
4
...