Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking

@article{Ko2014ProggerAE,
  title={Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking},
  author={R. Ko and M. Will},
  journal={2014 IEEE 7th International Conference on Cloud Computing},
  year={2014},
  pages={881-889}
}
  • R. Ko, M. Will
  • Published 2014
  • Computer Science
  • 2014 IEEE 7th International Conference on Cloud Computing
Cloud data provenance, or "what has happened to my data in the cloud", is a critical data security component which addresses pressing data accountability and data governance issues in cloud computing systems. In this paper, we present Progger (Provenance Logger), a kernel-space logger which potentially empowers all cloud stakeholders to trace their data. Logging from the kernel space empowers security analysts to collect provenance from the lowest possible atomic data actions, and enables… Expand
63 Citations
Trusted Tamper-Evident Data Provenance
  • 6
Trusted Tamper-Evident Data Provenance
  • 3
Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System
  • PDF
Provenance for cloud data accountability
Inferring User Actions from Provenance Logs
  • 1
  • Highly Influenced
  • PDF
Inferring User Actions from Provenance Logs
  • 2
Towards Embedding Data Provenance in Files
  • Thye Way Phua, Panos Patros, Vimal Kumar
  • Computer Science
  • 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC)
  • 2021
  • PDF
ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability
  • 357
  • PDF
Data provenance assurance in the cloud using blockchain
  • 15
Data Provenance in the Cloud: A Blockchain-Based Approach
  • 14
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 27 REFERENCES
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance
  • 58
How to Track Your Data: The Case for Cloud Computing Provenance
  • 64
  • PDF
Layering in Provenance Systems
  • 151
  • PDF
Finding the Evidence in Tamper-Evident Logs
  • 10
  • PDF
Security and Data Accountability in Distributed Systems: A Provenance Survey
  • Y. Tan, R. Ko, G. Holmes
  • Computer Science
  • 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing
  • 2013
  • 40
  • PDF
Why and Where: A Characterization of Data Provenance
  • 916
  • PDF
A Security Model for Provenance
  • 34
  • PDF
Provenance-Aware Storage Systems
  • 612
  • PDF
From system-centric to data-centric logging - Accountability, trust & security in cloud computing
  • 54
...
1
2
3
...