Learning Rich Features from Software-as-a-Service Cloud Computing for Detecting Trust Violations

We are witnessing a transition era of cloud security, as cloud computing paradigm is shifting its focus from provider to the consumer. Cloud service trust manipulation detection is different from traditional on-site service trust detection because cloud performs data operations at diverse geographically remote data centers; thus diminishing consumer control over the kind of service to be utilized. When the Cloud user submits a particular job to cloud, user has to rely upon the good behavior of the cloud to perform the task without violating the user trust in services utilized. However, due to lack of transparency in cloud, consumers find it hard to evaluate trust. Inspired by the recent progress of Spatial Rich Models (SRM) in image forensics domain, we propose to employ SRM and Machine learning approach to verify the trusted behavior of cloud by analyzing the rich features of the output produced by cloud service. We investigated noise distributions in data for violation detection. The approach is based on the hypothesis that every data processing task leaves certain distinct traces on the data. We identify those digital footprints to analyze whether cloud service provider has utilized the legitimate software-as-a-service for processing consumer requests. The inconsistency between authentic and obtained output acts as a proof-of-work for trust violation detection. The experimental results for the standard image dataset demonstrate that noise distributions in spatial domain can be successfully utilized to detect Cloud service trust violations.

[1]  Elizabeth Chang,et al.  TRUST-EVALUATION METRIC FOR CLOUD APPLICATIONS , 2011 .

[2]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Davide Cozzolino,et al.  Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection , 2017, IH&MMSec.

[4]  Shuai Ding,et al.  Trust-Enhanced Cloud Service Selection Model Based on QoS Analysis , 2015, PloS one.

[5]  Davide Cozzolino,et al.  Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[6]  Jiangqun Ni,et al.  A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[7]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[8]  Paolo Massa,et al.  Trustlet, Open Research on Trust Metrics , 2001, BIS.

[9]  Larry S. Davis,et al.  Two-Stream Neural Networks for Tampered Face Detection , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[10]  Xiong Xiong,et al.  Statistical Properties and Pre-Hit Dynamics of Price Limit Hits in the Chinese Stock Markets , 2015, PloS one.

[11]  Tuva Selstad Dybedokken Trust Management in Fog Computing , 2017 .