Original scientific paper
https://doi.org/10.31534/engmod.2019.2-4.ri.01d
Towards Provenance Cloud Security Auditing Based on Association Rule Mining
Shanshan Tu
; Faculty of Information Technology, Beijing University of Technology, Beijing, CHINA
Xinyi Huang
; Faculty of Information Technology, Beijing University of Technology, Beijing, CHINA
Abstract
Cloud storage provides external data storage services by combining and coordinating different types of devices in a network to work collectively. However, there is always a trust relationship between users and service providers, therefore, an effective security auditing of cloud data and operational processes is necessary. We propose a trusted cloud framework based on a Cloud Accountability Life Cycle (CALC). We suggest that auditing provenance data in cloud servers is a practical and efficient method to log data, being relatively stable and easy to collect type of provenance data. Furthermore, we suggest a scheme based on user behaviour (UB) by analysing the log data from cloud servers. We present a description of rules for a UB operating system log, and put forward an association rule mining algorithm based on the Long Sequence Frequent Pattern (LSFP) to extract the UB. Finally, the results of our experiment prove that our solution can be implemented to track and forensically inspect the data leakage in an efficient manner for cloud security auditing.
Keywords
cloud security auditing; provenance data; log analysis; user behaviour; association rule mining algorithm
Hrčak ID:
234623
URI
Publication date:
21.2.2020.
Visits: 1.324 *