Title :
Watchword-oriented and time-stamped algorithms for tamper-proof cloud provenance cognition
Author :
Imran, Ali ; Nahar, Nazmun ; Sakib, Kazi
Author_Institution :
Inst. of Inf. Technol., Univ. of Dhaka, Dhaka, Bangladesh
Abstract :
Provenance is derivative journal information about the origin and activities of system data and processes. For a highly dynamic system like the cloud, provenance can be accurately detected and securely used in cloud digital forensic investigation activities. This paper proposes watchword oriented provenance cognition algorithm for the cloud environment. Additionally time-stamp based buffer verifying algorithm is proposed for securing the access to the detected cloud provenance. Performance analysis of the novel algorithms proposed here yields a desirable detection rate of 89.33% and miss rate of 8.66%. The securing algorithm successfully rejects 64% of malicious requests, yielding a cumulative frequency of 21.43 for MR.
Keywords :
cloud computing; digital forensics; formal verification; software performance evaluation; cloud digital forensic investigation activities; cloud security; derivative journal information; detection rate; miss rate; performance analysis; system data; system processes; tamper-proof cloud provenance cognition; time-stamp based buffer verifying algorithm; watchword oriented provenance cognition algorithm; Cloud computing; Cognition; Encryption; Informatics; Software as a service; Cloud computing; cloud security; empirical evaluation; provenance detection;
Conference_Titel :
Informatics, Electronics & Vision (ICIEV), 2014 International Conference on
Conference_Location :
Dhaka
Print_ISBN :
978-1-4799-5179-6
DOI :
10.1109/ICIEV.2014.6850747