• DocumentCode
    3704044
  • Title

    Inferring User Actions from Provenance Logs

  • Author

    Xin Li;Chaitanya Joshi;Alan Yu Shyang Tan;Ryan Kok Leong Ko

  • Author_Institution
    Dept. of Stat., Univ. of Waikato Hamilton, Hamilton, New Zealand
  • Volume
    1
  • fYear
    2015
  • Firstpage
    742
  • Lastpage
    749
  • Abstract
    Progger, a kernel-spaced cloud data provenance logger which provides fine-grained data activity records, was recently developed to empower cloud stakeholders to trace data life cycles within and across clouds. Progger logs have the potential to allow analysts to infer user actions and create a data-centric behaviour history in a cloud computing environment. However, the Progger logs are complex and noisy and therefore, currently this potential can not be met. This paper proposes a statistical approach to efficiently infer the user actions from the Progger logs. Inferring logs which capture activities at kernel-level granularity is not a straightforward endeavour. This paper overcomes this challenge through an approach which shows a high level of accuracy. The key aspects of this approach are identifying the data preprocessing steps and attribute selection. We then use four standard classification models and identify the model which provides the most accurate inference on user actions. To our best knowledge, this is the first work of its kind. We also discuss a number of possible extensions to this work. Possible future applications include the ability to predict an anomalous security activity before it occurs.
  • Keywords
    "Cloud computing","Data preprocessing","Data security","Data models","Kernel","Training data","Testing"
  • Publisher
    ieee
  • Conference_Titel
    Trustcom/BigDataSE/ISPA, 2015 IEEE
  • Type

    conf

  • DOI
    10.1109/Trustcom.2015.442
  • Filename
    7345350