Auditing Cloud Administrators Using Information Flow Tracking
نویسندگان
چکیده
In the last few years, cloud computing has evolved from being a promising business concept to one of the fastest growing segments of the IT industry. However, one impediment to widespread adoption by enterprise customers is the threat of attack by a malicious cloud administrator. To address this security and privacy challenge, we propose H-one, a new auditing mechanism for cloud. H-one uses information flow tracking techniques to implement complete, efficient and privacy-preserving logs that will enable the auditing of the administrators of the cloud infrastructure, thus increasing the customer’s trust in cloud services.
منابع مشابه
CloudFence: Enabling Users to Audit the Use of their Cloud-Resident Data
One of the primary concerns of users of cloud-based services and applications is the risk of unauthorized access to their private information. For the common setting in which the infrastructure provider and the online service provider are different, end users have to trust their data to both parties, although they interact solely with the service provider. This paper presents CloudFence, a fram...
متن کاملSpyglass: Demand-Provisioned Linux Containers for Private Network Access
System administrators are required to access the privileged, or “super-user,” interfaces of computing, networking, and storage resources they support. This low-level infrastructure underpins most of the security tools and features common today and is assumed to be secure. A malicious system administrator or malware on the system administrator’s client system can silently subvert this computing ...
متن کاملDemand-Provisioned Linux Containers for Private Network Access
System administrators are required to access the privileged, or “super-user,” interfaces of computing, networking, and storage resources they support. This low-level infrastructure underpins most of the security tools and features common today and is assumed to be secure. A malicious system administrator or malware on the system administrator’s client system can silently subvert this computing ...
متن کاملAuditing the Structural Reliability of the Clouds
Large scale systems, common in cloud computing, rely on redundancy for reliability and availability. Modern clouds have become ever-increasingly complex and diverse creating large messes that experience long outages when failures occur. While there exist significant effort in resolving faults after they occur, we propose a novel approach to untangling this mess before it occurs by auditing the ...
متن کامل