Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking

@article{Ko2014ProggerAE,
  title={Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking},
  author={Ryan Kok Leong Ko and Mark A. Will},
  journal={2014 IEEE 7th International Conference on Cloud Computing},
  year={2014},
  pages={881-889}
}
  • R. KoM. Will
  • Published 27 June 2014
  • Computer Science
  • 2014 IEEE 7th International Conference on Cloud Computing
Cloud data provenance, or "what has happened to my data in the cloud", is a critical data security component which addresses pressing data accountability and data governance issues in cloud computing systems. In this paper, we present Progger (Provenance Logger), a kernel-space logger which potentially empowers all cloud stakeholders to trace their data. Logging from the kernel space empowers security analysts to collect provenance from the lowest possible atomic data actions, and enables… 

Figures from this paper

Trusted Tamper-Evident Data Provenance

A framework to enable tamper-evidence and preserve the confidentiality and integrity of data provenance using the Trusted Platform Module (TPM), which can be applied to capture tampering evidence in large-scale cloud environments at system, network, and application granularities.

Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System

Prov-Trust is proposed, a decentralized and auditable SGX-based data provenance system relying on highly distributed ledgers that allows anchored data to have public witness, providing tamper-proof provenance data, enabling the transparency of data accountability, and enhancing the secrecy and availability of theprovenance data.

Provenance for cloud data accountability

Inferring User Actions from Provenance Logs

This paper proposes a statistical approach to efficiently infer the user actions from the Progger logs through an approach which shows a high level of accuracy and is believed to be the first work of its kind.

Towards Embedding Data Provenance in Files

This work proposes that provenance be separated into system, data-specific and file-metadata provenance, and shows that with the use of delta-encoding, provenance-per-change is viable, asserting the proposed architecture to be effectively realizable.

ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability

This paper designs and implements ProvChain, an architecture to collect and verify cloud data provenance by embedding the provenance data into blockchain transactions, and demonstrates that ProvChain provides security features including tamper-proof provenance, user privacy and reliability with low overhead for the cloud storage applications.

Data provenance assurance in the cloud using blockchain

This paper presents a cloud based data provenance framework using block chain which traces data record operations and generates provenance data, and anchorprovenance data records into block chain transactions, which provide validation on provenanceData and preserve user privacy at the same time.

Data Provenance in the Cloud: A Blockchain-Based Approach

This article proposes BlockCloud, a blockchain-empowered data provenance architecture for the cloud computing platform, and presents a proof- of-stake (PoS) consensus mechanism for BlockCloud to alleviate the overhead of computational requirements that the traditional proof-of-work (PoW) consensus needs.

Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes

Towards Secure Provenance in the Cloud: A Survey

This paper surveys the existing cloud provenance management schemes and proposed security solutions, investigates the current related security challenges resulting from the nature of the provenance model and the characteristics of the cloud and identifies potential research directions which should be covered in order to build a secure cloudprovenance for the next generation.
...

References

SHOWING 1-10 OF 27 REFERENCES

S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance

S2Logger is introduced, a data event logging mechanism which captures, analyses and visualizes data events in the cloud from the data point of view, and can detect critical data-related cloud security problems such as malicious actions, data leakages and data policy violations by analysing the data provenance.

How to Track Your Data: The Case for Cloud Computing Provenance

This paper surveys current mechanisms that support provenance for cloud computing, classify provenance according to its granularities encapsulating the various sets of provenance data for different use cases, and summarizes the challenges and requirements for collecting provenance in a cloud, based on which the gap between current approaches to requirements is shown.

Layering in Provenance Systems

A provenance collection structure facilitating the integration of provenance across multiple levels of abstraction is designed, including a workflow engine, a web browser, and an initial runtime Python provenance tracking wrapper that sits atop provenance-aware network storage that builds upon a Provenance-Aware Storage System (PASS).

Finding the Evidence in Tamper-Evident Logs

Querifier rules are written in a flexible pattern-matching language that adapts to arbitrary log structures; given a set of rules and available log data, Querifier presents evidence of correctness and offers counterexamples if desired.

Security and Data Accountability in Distributed Systems: A Provenance Survey

  • Yu Shyang TanR. KoG. Holmes
  • Computer Science
    2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing
  • 2013
This paper surveys provenance solutions proposed to address the problems of system security and data accountability in distributed systems and derives a set of minimum requirements that are necessary for a provenance system to be effective in addressing the two problems.

Why and Where: A Characterization of Data Provenance

An approach to computing provenance when the data of interest has been created by a database query is described, adopting a syntactic approach and present results for a general data model that applies to relational databases as well as to hierarchical data such as XML.

A Security Model for Provenance

A security model for provenance metadata is designed that meets the users’ requirements and protects the structure or work-flow — namely which ancestors and descendants are accessible to which users.

Provenance-Aware Storage Systems

It is shown that with reasonable overhead, a Provenance-Aware Storage System can provide useful functionality not available in today's file systems or provenance management systems.

Exploring Provenance in a Distributed Job Execution System

The conclusion is that it is possible to capture important provenance information in a distributed job execution system with relatively little intrusion on the user or the system.

From system-centric to data-centric logging - Accountability, trust & security in cloud computing

This paper proposes a data-centric, detective approach to increase trust and security of data in the cloud, and contains a suite of techniques that address cloud security, trust and accountability from a detective approach at all levels of granularity.