Detecting Suspicious File Migration or Replication in the Cloud

被引:4
|
作者
Bowers, Adam [1 ]
Liao, Cong [2 ]
Steiert, Douglas [1 ]
Lin, Dan [1 ]
Squicciarini, Anna [2 ]
Hurson, Ali [3 ]
机构
[1] Univ Missouri, Dept Elect Engn & Comp Sci, Columbia, MO 65211 USA
[2] Penn State Univ, Informat Sci & Technol, State Coll, PA 16801 USA
[3] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
基金
美国国家科学基金会;
关键词
Cloud computing; Monitoring; Sockets; Load management; Law; File systems; Data privacy; Cloud storage; file transfer; location privacy;
D O I
10.1109/TDSC.2018.2885271
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There has been a prolific rise in the popularity of cloud storage in recent years. While cloud storage offers many advantages such as flexibility and convenience, users are typically unable to tell or control the actual locations of their data. This limitation may affect users' confidence and trust in the storage provider, or even render cloud unsuitable for storing data with strict location requirements. To address this issue, we propose a system called LAST-HDFS which integrates Location-Aware Storage Technique (LAST) into the open source Hadoop Distributed File System (HDFS). The LAST-HDFS system enforces location-aware file allocations and continuously monitors file transfers to detect potentially illegal transfers in the cloud. Illegal transfers here refer to attempts to move sensitive data outside the ("legal") boundaries specified by the file owner and its policies. Our underlying algorithms model file transfers among nodes as a weighted graph, and maximize the probability of storing data items of similar privacy preferences in the same region. We equip each cloud node with a socket monitor that is capable of monitoring the real-time communication among cloud nodes. Based on the real-time data transfer information captured by the socket monitors, our system calculates the probability of a given transfer to be illegal. We have implemented our proposed framework and carried out an extensive experimental evaluation in a large-scale real cloud environment to demonstrate the effectiveness and efficiency of our proposed system.
引用
收藏
页码:296 / 309
页数:14
相关论文
共 50 条
  • [31] RockFS: Cloud-backed File System Resilience to Client-Side Attacks
    Matos, David R.
    Pardal, Miguel L.
    Carle, Georg
    Correia, Miguel
    MIDDLEWARE'18: PROCEEDINGS OF THE 2018 ACM/IFIP/USENIX MIDDLEWARE CONFERENCE, 2018, : 107 - 119
  • [32] ACAFD: Secure and Scalable Access Control with Assured File Deletion for Outsourced Data in Cloud
    Senthilkumar, Sudha
    Viswanatham, Madhu
    JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2014, 8 (01) : 18 - 30
  • [33] Secure File Access Solution for Public Cloud Storage
    Bharathi, P.
    Rajashree, S.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [34] Secure File Sharing Using Cryptographic Techniques in Cloud
    Malarvizhi, M.
    Sujana, J. Angela Jennifa
    Revathi, T.
    2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [35] Cloud Storage Cost Modeling for Cryptographic File Systems
    Storch, Mauro
    De Rose, Cesar A. F.
    2017 25TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2017), 2017, : 9 - 14
  • [36] Enhancing Cloud Performance Using File Format Classifications
    Junaid, Muhammad
    Sohail, Adnan
    Alkinani, Monagi H.
    Ahmed, Adeel
    Ahmed, Mehmood
    Rehman, Faisal
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02): : 3985 - 4007
  • [37] File Encryption Transmission Method Based on Cloud Computing
    Hu, Xiangyi
    Du, Liping
    Xu, Guanning
    PROCEEDINGS OF THE 2013 THE INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY AND INFORMATION SYSTEM (ICETIS 2013), 2013, 65 : 740 - 746
  • [38] A Remote File Possession Checking Protocol in a Cloud Storage
    Deng, Zuojie
    Tan, Xiaolan
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (06): : 115 - 121
  • [39] Cloud storage caching strategy based on file correlation
    Xiao F.
    Zhou K.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2019, 47 (04): : 1 - 6
  • [40] Log File's Centralization to Improve Cloud Security
    Amar, Meryem
    Lemoudden, Mouad
    El Ouahidi, Bouabid
    2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 178 - 183