DocumentCode :
3704034
Title :
Trusted Tamper-Evident Data Provenance
Author :
Mohammad M. Bany Taha;Sivadon Chaisiri;Ryan K. L. Ko
Author_Institution :
Cyber Security Lab., Univ. of Waikato, Hamilton, New Zealand
Volume :
1
fYear :
2015
Firstpage :
646
Lastpage :
653
Abstract :
Data provenance, the origin and derivation history of data, is commonly used for security auditing, forensics and data analysis. While provenance loggers provide evidence of data changes, the integrity of the provenance logs is also critical for the integrity of the forensics process. However, to our best knowledge, few solutions are able to fully satisfy this trust requirement. In this paper, we propose a framework to enable tamper-evidence and preserve the confidentiality and integrity of data provenance using the Trusted Platform Module (TPM). Our framework also stores provenance logs in trusted and backup servers to guarantee the availability of data provenance. Tampered provenance logs can be discovered and consequently recovered by retrieving the original logs from the servers. Leveraging on TPM´s technical capability, our framework guarantees data provenance collected to be admissible, complete, and confidential. More importantly, this framework can be applied to capture tampering evidence in large-scale cloud environments at system, network, and application granularities. We applied our framework to provide tamper-evidence for Progger, a cloud-based, kernel-space logger. Our results demonstrate the ability to conduct remote attestation of Progger logs´ integrity, and uphold the completeness, confidential and admissible requirements.
Keywords :
"Cloud computing","Servers","Reliability","Virtual machining","Kernel","Runtime","Generators"
Publisher :
ieee
Conference_Titel :
Trustcom/BigDataSE/ISPA, 2015 IEEE
Type :
conf
DOI :
10.1109/Trustcom.2015.430
Filename :
7345338
Link To Document :
بازگشت