TrustCloud: A Framework for Accountability and Trust in Cloud Computing

The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by potential customers. While preventive controls for security and privacy are actively researched, there is still little focus on detective controls related to cloud accountability and audit ability. The complexity resulting from large-scale virtualization and data distribution carried out in current clouds has revealed an urgent research agenda for cloud accountability, as has the shift in focus of customer concerns from servers to data. This paper discusses key issues and challenges in achieving a trusted cloud through the use of detective controls, and presents the Trust Cloud framework, which addresses accountability in cloud computing via technical and policy-based approaches.

[1]  G. J. Proudler Concepts of trusted computing , 2005 .

[2]  Alan Calder,et al.  IT Governanace: A Manager's Guide to Data Security and ISO27001/ISO 27002 , 2008 .

[3]  Alan Calder,et al.  Information Security Based on ISO 27001/ISO 17799: A Management Guide , 2006 .

[4]  Siani Pearson,et al.  Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[5]  Xiaohui Liang,et al.  Secure provenance: the essential of bread and butter of data forensics in cloud computing , 2010, ASIACCS '10.

[6]  Mendel Rosenblum,et al.  The design and implementation of a log-structured file system , 1991, SOSP '91.

[7]  Alan Calder,et al.  Implementing Information Security Based on ISO 27001 and ISO 17799: A Management Guide , 2006 .

[8]  Rick Elam,et al.  Continuous Auditing: Building Automated Auditing Capability , 2002 .

[9]  Thomas Erl,et al.  Service-Oriented Architecture: Concepts, Technology, and Design , 2005 .

[10]  Henry Li Introducing Windows Azure , 2009 .

[11]  Val Tannen,et al.  Provenance semirings , 2007, PODS.

[12]  Olaf Hartig Provenance Information in the Web of Data , 2009, LDOW.

[13]  Harry Halpin,et al.  Provenance: The Missing Component of the Semantic Web , 2009, SPOT@ESWC.

[14]  William Yurcik,et al.  Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..

[15]  Andreas Haeberlen,et al.  Accountable Virtual Machines , 2010, OSDI.

[16]  Wang Chiew Tan Provenance in Databases: Past, Current, and Future , 2007, IEEE Data Eng. Bull..

[17]  H. Zimmermann,et al.  OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.

[18]  William Yurcik,et al.  Network Log Anonymization: Application of Crypto-PAn to Cisco Netflows , 2004 .

[19]  Eng Wah Lee,et al.  Business process management (BPM) standards: a survey , 2009, Bus. Process. Manag. J..

[20]  RosenblumMendel,et al.  The design and implementation of a log-structured file system , 1991 .

[21]  Sanjeev Khanna,et al.  Data Provenance: Some Basic Issues , 2000, FSTTCS.

[22]  Stephen E. Hansen,et al.  Automated System Monitoring and Notification with Swatch , 1993, LISA.

[23]  Margo I. Seltzer,et al.  Provenance as first class cloud data , 2010, OPSR.

[24]  Xiaozhou Li,et al.  Efficient querying and maintenance of network provenance at internet-scale , 2010, SIGMOD Conference.

[25]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[26]  Sanjeev Khanna,et al.  Why and Where: A Characterization of Data Provenance , 2001, ICDT.

[27]  Margo I. Seltzer,et al.  Provenance for the Cloud , 2010, FAST.

[28]  A. Meyer The Health Insurance Portability and Accountability Act. , 1997, Tennessee medicine : journal of the Tennessee Medical Association.

[29]  Peng Ning,et al.  Managing security of virtual machine images in a cloud environment , 2009, CCSW '09.

[30]  Simson L. Garfinkel,et al.  An Evaluation of Amazon's Grid Computing Services: EC2, S3, and SQS , 2007 .

[31]  Andrew Charlesworth,et al.  Accountability as a Way Forward for Privacy Protection in the Cloud , 2009, CloudCom.

[32]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[33]  John Zic,et al.  Accountability as a Service for the Cloud , 2010, 2010 IEEE International Conference on Services Computing.

[34]  Andreas Haeberlen,et al.  A case for the accountable cloud , 2010, OPSR.

[35]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[36]  Mladen A. Vouk,et al.  Cloud computing — Issues, research and implementations , 2008, ITI 2008 - 30th International Conference on Information Technology Interfaces.

[37]  Peng Ning,et al.  Always up-to-date: scalable offline patching of VM images in a compute cloud , 2010, ACSAC '10.

[38]  Sanjeev Khanna,et al.  On provenance and privacy , 2010, ICDT '11.

[39]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[40]  Siani Pearson,et al.  Trusted Computing Platforms: TCPA Technology in Context , 2002 .

[41]  John Zic,et al.  Accountability as a Service for the Cloud: From Concept to Implementation with BPEL , 2010, 2010 6th World Congress on Services.

[42]  Merriam-Webster,et al.  The Merriam Webster Dictionary , 1983 .

[43]  Lynda L. McGhie,et al.  THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT , 2004 .

[44]  Siani Pearson,et al.  Enhancing privacy in cloud computing via policy-based obfuscation , 2012, The Journal of Supercomputing.

[45]  Bu-Sung Lee,et al.  Towards Achieving Accountability, Auditability and Trust in Cloud Computing , 2011, ACC.