S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance

@article{Suen2013S2LoggerED,
  title={S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance},
  author={Chun Hui Suen and R. Ko and Y. Tan and Peter Jagadpramana and Bu-Sung Lee},
  journal={2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications},
  year={2013},
  pages={594-602}
}
  • Chun Hui Suen, R. Ko, +2 authors Bu-Sung Lee
  • Published 2013
  • Computer Science
  • 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
The inability to effectively track data in cloud computing environments is becoming one of the top concerns for cloud stakeholders. This inability is due to two main reasons. Firstly, the lack of data tracking tools built for clouds. Secondly, current logging mechanisms are only designed from a system-centric perspective. There is a need for data-centric logging techniques which can trace data activities (e.g. file creation, edition, duplication, transfers, deletions, etc.) within and across… Expand
58 Citations
Provenance for cloud data accountability
Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking
  • R. Ko, M. Will
  • Computer Science
  • 2014 IEEE 7th International Conference on Cloud Computing
  • 2014
  • 63
  • PDF
A Forensic Enabled Data Provenance Model for Public Cloud
  • 3
  • PDF
Towards Embedding Data Provenance in Files
  • Thye Way Phua, Panos Patros, Vimal Kumar
  • Computer Science
  • 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC)
  • 2021
  • PDF
Data provenance assurance in the cloud using blockchain
  • 15
Challenges of Data Provenance for Cloud Forensic Investigations
  • 7
  • Highly Influenced
Inferring User Actions from Provenance Logs
  • 1
  • PDF
Inferring User Actions from Provenance Logs
  • 2
Data Provenance in the Cloud: A Blockchain-Based Approach
  • 14
ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability
  • 353
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 41 REFERENCES
How to Track Your Data: Rule-Based Data Provenance Tracing Algorithms
  • 32
  • PDF
Provenance for the Cloud
  • 191
  • PDF
How to Track Your Data: The Case for Cloud Computing Provenance
  • 64
  • PDF
Document Provenance in the Cloud: Constraints and Challenges
  • 42
  • PDF
Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments
  • 91
  • PDF
Provenance as first class cloud data
  • 97
  • PDF
Why and Where: A Characterization of Data Provenance
  • 915
  • PDF
Layering in Provenance Systems
  • 151
  • PDF
Making a Cloud Provenance-Aware
  • 57
  • PDF
Collecting Provenance via the Xen Hypervisor
  • 51
  • PDF
...
1
2
3
4
5
...