Detecting Suspicious File Migration or Replication in the Cloud

被引:4
|
作者
Bowers, Adam [1 ]
Liao, Cong [2 ]
Steiert, Douglas [1 ]
Lin, Dan [1 ]
Squicciarini, Anna [2 ]
Hurson, Ali [3 ]
机构
[1] Univ Missouri, Dept Elect Engn & Comp Sci, Columbia, MO 65211 USA
[2] Penn State Univ, Informat Sci & Technol, State Coll, PA 16801 USA
[3] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
基金
美国国家科学基金会;
关键词
Cloud computing; Monitoring; Sockets; Load management; Law; File systems; Data privacy; Cloud storage; file transfer; location privacy;
D O I
10.1109/TDSC.2018.2885271
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There has been a prolific rise in the popularity of cloud storage in recent years. While cloud storage offers many advantages such as flexibility and convenience, users are typically unable to tell or control the actual locations of their data. This limitation may affect users' confidence and trust in the storage provider, or even render cloud unsuitable for storing data with strict location requirements. To address this issue, we propose a system called LAST-HDFS which integrates Location-Aware Storage Technique (LAST) into the open source Hadoop Distributed File System (HDFS). The LAST-HDFS system enforces location-aware file allocations and continuously monitors file transfers to detect potentially illegal transfers in the cloud. Illegal transfers here refer to attempts to move sensitive data outside the ("legal") boundaries specified by the file owner and its policies. Our underlying algorithms model file transfers among nodes as a weighted graph, and maximize the probability of storing data items of similar privacy preferences in the same region. We equip each cloud node with a socket monitor that is capable of monitoring the real-time communication among cloud nodes. Based on the real-time data transfer information captured by the socket monitors, our system calculates the probability of a given transfer to be illegal. We have implemented our proposed framework and carried out an extensive experimental evaluation in a large-scale real cloud environment to demonstrate the effectiveness and efficiency of our proposed system.
引用
收藏
页码:296 / 309
页数:14
相关论文
共 50 条
  • [21] Size Estimation of Cloud Migration Projects with Cloud Migration Point (CMP)
    Tran, Van T. K.
    Lee, Kevin
    Fekete, Alan
    Liu, Anna
    Keung, Jacky
    2011 FIFTH INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM 2011), 2011, : 265 - 274
  • [22] Classic Replication Techniques on the Cloud
    Arrieta-Salinas, Itziar
    Enrique Armendariz-Inigo, Jose
    Navarro, Joan
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 268 - 273
  • [23] Intelligent file transfer for smart handheld devices based on mobile cloud computing
    Chen, Lien-Wu
    Ho, Yu-Fan
    Kuo, Wei-Ting
    Tsai, Ming-Fong
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [24] Text Mining for Suspicious Contents in Mobile Cloud Computing Environment
    Alami, Salim
    Elbeqqali, Omar
    ADVANCES IN UBIQUITOUS NETWORKING, 2016, 366 : 117 - 128
  • [25] Safe Haven in the Cloud: Secure Access Controlled File Encryption (SAFE) System
    Shahzad, Farrukh
    2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1329 - 1334
  • [26] An Extensible Architecture for Detecting Violations of a Cloud Environment's Constraints During Legacy Software System Migration
    Frey, Seoren
    Hasselbring, Wilhelm
    2011 15TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING (CSMR), 2011, : 269 - 278
  • [27] Ensuring Security in On-demand File Replication System
    Bajpai, Durgesh
    Vardhan, Manu
    Kushwaha, Dharmender Singh
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGY (ICCCT), 2012, : 315 - 320
  • [28] Detecting Computer Worms in the Cloud
    Biedermann, Sebastian
    Katzenbeisser, Stefan
    OPEN PROBLEMS IN NETWORK SECURITY, 2012, 7039 : 43 - 54
  • [29] RRSD: A file replication method for ensuring data reliability and reducing storage consumption in a dynamic Cloud-P2P environment
    Sun, ShengYao
    Yao, WenBin
    Qiao, BaoJun
    Zong, Ming
    He, Xin
    Li, XiaoYong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 844 - 858
  • [30] Fractional social optimization-based migration and replica management algorithm for load balancing in distributed file system for cloud computing
    Hulagappa Nebagiri, Manjula
    Pillappa Hnumanthappa, Latha
    NETWORK-COMPUTATION IN NEURAL SYSTEMS, 2024,