Title :
How to Track Your Data: Rule-Based Data Provenance Tracing Algorithms
Author :
Zhang, Olive Qing ; Ko, Ryan K L ; Kirchberg, Markus ; Suen, Chun Hui ; Jagadpramana, Peter ; Lee, Bu Sung
Author_Institution :
Hewlett-Packard Labs., Singapore, Singapore
Abstract :
As cloud computing and virtualization technologies become mainstream, the need to be able to track data has grown in importance. Having the ability to track data from its creation to its current state or its end state will enable the full transparency and accountability in cloud computing environments. In this paper, we showcase a novel technique for tracking end-to-end data provenance, a meta-data describing the derivation history of data. This breakthrough is crucial as it enhances trust and security for complex computer systems and communication networks. By analyzing and utilizing provenance, it is possible to detect various data leakage threats and alert data administrators and owners; thereby addressing the increasing needs of trust and security for customers´ data. We also present our rule-based data provenance tracing algorithms, which trace data provenance to detect actual operations that have been performed on files, especially those under the threat of leaking customers´ data. We implemented the cloud data provenance algorithms into an existing software with a rule correlation engine, show the performance of the algorithms in detecting various data leakage threats, and discuss technically its capabilities and limitations.
Keywords :
business data processing; cloud computing; consumer protection; meta data; security of data; trusted computing; virtualisation; cloud computing; communication networks; complex computer systems; customer data leakage threat; customer data security; data leakage threat detection; end-to-end data provenance tracing; meta data; rule correlation engine; rule-based data provenance tracing algorithms; security enhancement; trust enhancement; virtualization; Algorithm design and analysis; Atomic layer deposition; Electronic mail; IP networks; Linux; Security; Sensors; Cloud data provenance; Flogger; TrustCloud; accountability; cloud computing security; cloud data leakage; data provenance; data tracing algorithm; transparency; trust;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
DOI :
10.1109/TrustCom.2012.175