S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance

@article{Suen2013S2LoggerED,
  title={S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance},
  author={Chun Hui Suen and Ryan Kok Leong Ko and Yu Shyang Tan and Peter Jagadpramana and Bu-Sung Lee},
  journal={2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications},
  year={2013},
  pages={594-602}
}
  • Chun Hui SuenR. Ko Bu-Sung Lee
  • Published 16 July 2013
  • Computer Science
  • 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
The inability to effectively track data in cloud computing environments is becoming one of the top concerns for cloud stakeholders. This inability is due to two main reasons. Firstly, the lack of data tracking tools built for clouds. Secondly, current logging mechanisms are only designed from a system-centric perspective. There is a need for data-centric logging techniques which can trace data activities (e.g. file creation, edition, duplication, transfers, deletions, etc.) within and across… 

Figures and Tables from this paper

Provenance for cloud data accountability

Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking

  • R. KoM. Will
  • Computer Science
    2014 IEEE 7th International Conference on Cloud Computing
  • 2014
Progger (Provenance Logger), a kernel-space logger which potentially empowers all cloud stakeholders to trace their data, is presented, which provides high assurance of data security and data activity audit.

A Forensic Enabled Data Provenance Model for Public Cloud

The challenges of cloud architecture are identified, how this affects the existing forensic analysis and provenance techniques is discussed, and a model for efficient provenance collection and forensic analysis is proposed.

Towards Embedding Data Provenance in Files

This work proposes that provenance be separated into system, data-specific and file-metadata provenance, and shows that with the use of delta-encoding, provenance-per-change is viable, asserting the proposed architecture to be effectively realizable.

Data provenance assurance in the cloud using blockchain

This paper presents a cloud based data provenance framework using block chain which traces data record operations and generates provenance data, and anchorprovenance data records into block chain transactions, which provide validation on provenanceData and preserve user privacy at the same time.

Challenges of Data Provenance for Cloud Forensic Investigations

An overview of currentprovenance challenges in cloud computing is provided and limitations of current provenance collection mechanisms are identified.

Inferring User Actions from Provenance Logs

This paper proposes a statistical approach to efficiently infer the user actions from the Progger logs through an approach which shows a high level of accuracy and is believed to be the first work of its kind.

Data Provenance in the Cloud: A Blockchain-Based Approach

This article proposes BlockCloud, a blockchain-empowered data provenance architecture for the cloud computing platform, and presents a proof- of-stake (PoS) consensus mechanism for BlockCloud to alleviate the overhead of computational requirements that the traditional proof-of-work (PoW) consensus needs.

ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability

This paper designs and implements ProvChain, an architecture to collect and verify cloud data provenance by embedding the provenance data into blockchain transactions, and demonstrates that ProvChain provides security features including tamper-proof provenance, user privacy and reliability with low overhead for the cloud storage applications.

Trusted Tamper-Evident Data Provenance

A framework to enable tamper-evidence and preserve the confidentiality and integrity of data provenance using the Trusted Platform Module (TPM), which can be applied to capture tampering evidence in large-scale cloud environments at system, network, and application granularities.
...

References

SHOWING 1-10 OF 41 REFERENCES

How to Track Your Data: Rule-Based Data Provenance Tracing Algorithms

A novel technique for tracking end-to-end data provenance, a meta-data describing the derivation history of data, is presented, which is possible to detect various data leakage threats and alert data administrators and owners; thereby addressing the increasing needs of trust and security for customers' data.

Provenance for the Cloud

The case is made that provenance is crucial for data stored on the cloud and identify the properties of provenance that enable its utility and the case for incorporating provenance as a core cloud feature, discussing the issues in doing so.

How to Track Your Data: The Case for Cloud Computing Provenance

This paper surveys current mechanisms that support provenance for cloud computing, classify provenance according to its granularities encapsulating the various sets of provenance data for different use cases, and summarizes the challenges and requirements for collecting provenance in a cloud, based on which the gap between current approaches to requirements is shown.

Document Provenance in the Cloud: Constraints and Challenges

Managing information provenance in the cloud is a more challenging task due to specific problems related to the cloud added to the traditional ones.

Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments

Fogger records file-centric access and transfer information from within the kernel spaces of both virtual machines (VMs) and physical machines (PMs) in the Cloud, thus giving full transparency of the entire data landscape in the cloud.

Provenance as first class cloud data

This work provides motivation for providers to treat provenance as first class data in the cloud and based on the experience with provenance in a local storage system, suggests a set of requirements that make provenance feasible and attractive.

Why and Where: A Characterization of Data Provenance

An approach to computing provenance when the data of interest has been created by a database query is described, adopting a syntactic approach and present results for a general data model that applies to relational databases as well as to hierarchical data such as XML.

Layering in Provenance Systems

A provenance collection structure facilitating the integration of provenance across multiple levels of abstraction is designed, including a workflow engine, a web browser, and an initial runtime Python provenance tracking wrapper that sits atop provenance-aware network storage that builds upon a Provenance-Aware Storage System (PASS).

Making a Cloud Provenance-Aware

This paper presents desirable properties for distributed provenance storage systems and present design alternatives for storing data and provenance on Amazon's popular Web Services platform (AWS).

Collecting Provenance via the Xen Hypervisor

This paper describes an approach to collecting system-level provenance from virtual guest machines running under the Xen hypervisor and makes the case that this approach alleviates the aforementioned difficulties and promotes adoption of provenance collection within cloud computing platforms.