CDCAS: A Novel Cloud Data Center Security Auditing System

With the increasing acceptance of cloud data center and virtualization technology by enterprises and industries, the security concern becomes the key hindrance to the development and deployment of cloud computing. Security auditing is a good way to deal with the threats faced by a cloud data center. But traditional auditing is no longer suitable for the new cloud environment. In this paper, we design, implement and evaluate the CDCAS, a novel cloud data center auditing system, which matches the demand of the scalability and efficiency of a cloud data center. In this system, we design one distributed and autonomous agent model which can be controlled by a set of rules dynamically generated to fit its use scenario. We then build the log analysis model which uses the signature based method and correlative analysis algorithm to extract security events from collected log with agreeable false positives. We evaluate our system both on real world and simulation to validate its efficiency. And our system is also deployed by the cloud data center of a well-known financial institution, and performs well.

[1]  ZhiHui Lv,et al.  RPPS: A Novel Resource Prediction and Provisioning Scheme in Cloud Data Center , 2012, 2012 IEEE Ninth International Conference on Services Computing.

[2]  Cong Wang,et al.  Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[3]  Hui Xiong,et al.  VMRaS: A Novel Virtual Machine Risk Assessment Scheme in the Cloud Environment , 2013, 2013 IEEE International Conference on Services Computing.

[4]  D. K. Barman,et al.  DESIGN OF INTRUSION DETECTION SYSTEM BASED ON ARTIFICIAL NEURAL NETWORK AND APPLICATION OF ROUGH SET , 2012 .

[5]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[6]  ZhiHui Lv,et al.  PSRPS: A Workload Pattern Sensitive Resource Provisioning Scheme for Cloud Systems , 2013, 2013 IEEE International Conference on Services Computing.

[7]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[8]  Byrav Ramamurthy,et al.  Agent based intrusion detection and response system for wireless LANs , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[9]  Martin Knahl,et al.  Validating Cloud Infrastructure Changes by Cloud Audits , 2012, 2012 IEEE Eighth World Congress on Services.

[10]  P. Mell,et al.  SP 800-145. The NIST Definition of Cloud Computing , 2011 .

[11]  Tak-Chung Fu,et al.  Agent-based network intrusion detection system using data mining approaches , 2005, Third International Conference on Information Technology and Applications (ICITA'05).

[12]  Aarthi,et al.  Towards Secure and Dependable Storage Services in Cloud Computing , 2014 .

[13]  Christopher Krügel,et al.  SPARTA, a Mobile Agent Based Instrusion Detection System , 2001, Network Security.

[14]  ZhiHui Lv,et al.  OPS: Offline Patching Scheme for the Images Management in a Secure Cloud Environment , 2013, 2013 IEEE International Conference on Services Computing.

[15]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[16]  Jungwoo Ryoo,et al.  Cloud Security Auditing: Challenges and Emerging Approaches , 2014, IEEE Security & Privacy.

[17]  ZhiHui Lv,et al.  Implementing a novel load-aware auto scale scheme for private cloud resource management platform , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).

[18]  M. Bhaskar,et al.  Public Auditing For Shared Data With Efficient User Revocation In The Cloud , 2015 .

[19]  Victor A. Skormin,et al.  Cloud Security Auditing Based on Behavioral Modeling , 2013, 2013 IEEE Ninth World Congress on Services.

[20]  M. Phil,et al.  PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .