A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality

With increasing number of cloud data leakage accidents exposed, outsourced data control becomes a more and more serious concern of their owner. To relieve the concern of these cloud users, reliable logging schemes are widely used to generate proof for data confidentiality auditing. However, high frequency operation and fine operation granularity on cloud data both result in a considerably large volume of operation logs, which burdens communication and computation in log auditing. This paper proposes a multi-grained log auditing scheme to make logs volume smaller and log auditing more efficient. We design a logging mechanism to support multi-grained data access with Merkle Hash Tree structure. Based on multi-grained log, we present a log auditing approach to achieve data confidentiality auditing and leakage investigation by making an Access List. Experiments results indicate that our scheme obtains about 54% log volume and 60% auditing time of fine-grained log auditing scheme in our scenario.

[1]  Chin-Chen Chang,et al.  Enabling public auditability for operation behaviors in cloud storage , 2016, Soft Computing.

[2]  V. Sheng,et al.  An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment , 2018 .

[3]  Helen J. Wang,et al.  Enabling Security in Cloud Storage SLAs with CloudProof , 2011, USENIX ATC.

[4]  Ragib Hasan,et al.  Trustworthy Digital Forensics in the Cloud , 2016, Computer.

[5]  Panayiotis Kotzanikolaou,et al.  A Framework for Secure and Verifiable Logging in Public Communication Networks , 2006, CRITIS.

[6]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[7]  Peng Ning,et al.  Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging , 2012, Financial Cryptography.

[8]  Chin-Chen Chang,et al.  Public audit for operation behavior logs with error locating in cloud storage , 2019, Soft Comput..

[9]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[10]  Ainuddin Wahid Abdul Wahab,et al.  CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics , 2018, IEEE Transactions on Sustainable Computing.

[11]  Lei Liu,et al.  Can an element form a two-dimensional nanosheet of type 15 pentagons? , 2018, Computational Materials Science.

[12]  Cong Wang,et al.  Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[13]  Yonghong Chen,et al.  Secure Logging and Public Audit for Operation Behavior in Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[14]  Gene Tsudik,et al.  A new approach to secure logging , 2008, TOS.

[15]  Zhen Yang,et al.  Ensuring reliable logging for data accountability in untrusted cloud storage , 2017, 2017 IEEE International Conference on Communications (ICC).

[16]  Dan Lin,et al.  Promoting Distributed Accountability in the Cloud , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[17]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[18]  Dan Lin,et al.  Ensuring Distributed Accountability for Data Sharing in the Cloud , 2012, IEEE Transactions on Dependable and Secure Computing.

[19]  Anthony Skjellum,et al.  OCF: An Open Cloud Forensics Model for Reliable Digital Forensics , 2015, 2015 IEEE 8th International Conference on Cloud Computing.

[20]  Ke Zhou,et al.  Using Blockchain for Data Auditing in Cloud Storage , 2018, ICCCS.

[21]  Jie Wang,et al.  Verifiable Diversity Ranking Search Over Encrypted Outsourced Data , 2018 .

[22]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.