Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2459976.2459981acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

An architecture for cross-cloud auditing

Published: 08 January 2013 Publication History

Abstract

Auditing message exchange in a cloud involves logging interactions between services that are dynamically composed to satisfy a client's request to the cloud. Additional cloud management services are needed to facilitate audit record capture of events occurring within the end-to-end round trip messaging of the composition and to analyze the resulting audit assets for security anomalies. When an external cloud, possibly in a federation, has a service needed for the task, audit assets must be conveyed back to the originating cloud for disclosure of communications and resource accesses. Otherwise, the external cloud may hide any potential vulnerabilities related to information tainting, message attacks, and resource misuse since these security risks cannot be directly assessed. In this paper, we underscore the importance of designing cross-cloud communications to retain security audit information to assess message and resource vulnerabilities and maintain federation trust. We present an architecture and a message schema for management, communication, and analysis.

References

[1]
Bell, M. 2008. Introduction to Service-Oriented Modeling. Service-Oriented Modeling: Service Analysis, Design, and Architecture. Wiley & Sons.
[2]
Jureta, I. J., et al. 2007. Dynamic Web Service Composition within a Service-Oriented Architecture. IEEE ICWS, pp.304--311.
[3]
Lin, C., et al. 2010. A Web Services Status Monitoring Technology for Distributed System Management in the Cloud. Int'l Conf. on Cyber-Enabled Dist. Comp. & KD, pp.502--505.
[4]
Xie, R., and Gamble, R. 2012. A Tiered Strategy for Auditing in the Cloud. IEEE CLOUD, pp. 945--946.
[5]
Ion, M., et al. 2009. Dynamic Resources Allocation in Grid Environments. 11th Int'l Symp. Symbolic and Numeric Algorithms for Scientific Computing, pp. 213--220.
[6]
Paraiso, F., Haderer, N., Merle, P., Rouvoy, R., and Seinturier, L. 2012. A Federated Multi-Cloud PaaS Infrastructure. IEEE CLOUD, pp. 392--399.
[7]
Bernstein, D., et al. 2010. Intercloud Directory and Exchange Protocol Detail using XMPP and RDF. 6th IEEE World Congress on Services, pp. 431--438.
[8]
Hale, M., and Gamble, R. 2012. SecAgreement: Advancing Security Risk Calculations in Cloud Services. 8th IEEE World Congress on Services, pp. 133--140.
[9]
GICTF. Intercloud Interface Specification Draft. 2012; http://www.gictf.jp/doc/GICTF_CloudIF_ResourceDataModel_WhitePaper_e_20120515.pdf.
[10]
Andrekanic, A., and Gamble, R. 2012. Architecting Web Service Attack Detection Handlers. IEEE ICWS, pp. 130--137.
[11]
Sundareswaran, S., et al. 2011. Promoting Distributed Accountability in the Cloud. IEEE CLOUD, pp. 113--120.

Cited By

View all
  • (2019)Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standardsRequirements Engineering10.1007/s00766-017-0287-524:3(365-402)Online publication date: 1-Sep-2019
  • (2013)A Design and Verification Framework for Service Composition in the CloudProceedings of the 2013 IEEE Ninth World Congress on Services10.1109/SERVICES.2013.46(317-324)Online publication date: 28-Jun-2013
  • (2013)Diagnosing Vulnerability Patterns in Cloud Audit LogsHigh Performance Cloud Auditing and Applications10.1007/978-1-4614-3296-8_5(119-146)Online publication date: 1-Aug-2013

Index Terms

  1. An architecture for cross-cloud auditing

    Recommendations

    Reviews

    Zeeshan Ali Shah

    Cloud computing enables on-demand, self-provisioned elastic computing. In addition to public cloud offerings, the private cloud has emerged on a wider scale and has been adopted by both the enterprise and public sectors. Several open-source middleware products have appeared for use with private cloud deployments. One challenge with these various cloud products is connectivity between different organizations. The idea of federated cloud services is new, and various research papers and projects are addressing it. There can be various levels of federation, such as authentication, accounting, and virtual machine sharing. This paper addresses the issue of how to enable federation of logging and audit records. In this scenario, a user from an organization might launch a cloud instance in a different organization. During this cross-organizational process, the user's audit records have to be maintained and transmitted back to the initiating organization for auditing. This paper deals with this problem and proposes a solution. The authors' approach is novel and the solution presented advances the field. This detailed paper will benefit cloud system administrators. Online Computing Reviews Service

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
    January 2013
    282 pages
    ISBN:9781450316873
    DOI:10.1145/2459976

    Sponsors

    • Los Alamos National Labs: Los Alamos National Labs
    • Sandia National Labs: Sandia National Laboratories
    • DOE: Department of Energy
    • Oak Ridge National Laboratory
    • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
    • BERKELEYLAB: Lawrence National Berkeley Laboratory
    • Argonne Natl Lab: Argonne National Lab
    • Idaho National Lab.: Idaho National Laboratory
    • Pacific Northwest National Laboratory
    • Nevada National Security Site: Nevada National Security Site

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 January 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. architecture
    2. audit
    3. cloud
    4. security

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CSIIRW '13
    Sponsor:
    • Los Alamos National Labs
    • Sandia National Labs
    • DOE
    • Lawrence Livermore National Lab.
    • BERKELEYLAB
    • Argonne Natl Lab
    • Idaho National Lab.
    • Nevada National Security Site
    CSIIRW '13: Cyber Security and Information Intelligence
    January 8 - 10, 2013
    Tennessee, Oak Ridge, USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 20 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standardsRequirements Engineering10.1007/s00766-017-0287-524:3(365-402)Online publication date: 1-Sep-2019
    • (2013)A Design and Verification Framework for Service Composition in the CloudProceedings of the 2013 IEEE Ninth World Congress on Services10.1109/SERVICES.2013.46(317-324)Online publication date: 28-Jun-2013
    • (2013)Diagnosing Vulnerability Patterns in Cloud Audit LogsHigh Performance Cloud Auditing and Applications10.1007/978-1-4614-3296-8_5(119-146)Online publication date: 1-Aug-2013

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media