Towards a Data-Centric Approach to Attribution in the Cloud

作者: Wenchao Zhou

DOI: 10.1007/978-1-4614-9278-8_13

关键词:

摘要: With an increasing number of applications being mirgrated to cloud, it becomes evident that faults in these or the underlying cloud platform can be costly. In cases where a system fault occurs, administrators often find themselves needing answer attribution questions, perform variety managerial tasks including debugging, accountability enforcement, and attack analysis. this chapter, we propose Secure Time-Aware Provenance (STAP), data-centric approach provides fundamental functionality required such questions—the capability “explain” existence (or change) certain distributed state at given time potentially adversarial environment.

参考文章(89)
Zachary G Ives, Yun Mao, Boon Thau Loo, Jonathan M Smith, MOSAIC: Unified Platform for Dynamic Overlay Selection and Composition ,(2008)
Susan B. Davidson, Juliana Freire, Shawn Bowers, Bertram Ludäscher, Anat Eyal, Manish Kumar Anand, Timothy M. McPhillips, Sarah Cohen Boulakia, Provenance in Scientific Workflow Systems IEEE Data(base) Engineering Bulletin. ,vol. 30, pp. 44- 50 ,(2007)
Dominic G. Lucchetti, Peter M. Chen, Zhuoqing Morley Mao, Samuel T. King, Enriching Intrusion Alerts Through Multi-Host Causality. network and distributed system security symposium. ,(2005)
Jennifer Widom, Hyunjung Park, Robert Ikeda, Provenance for Generalized Map and Reduce Workflows conference on innovative data systems research. pp. 273- 283 ,(2011)
Margo I Seltzer, Keith Bostic, Marshall K McKusick, Carl Staelin, None, An implementation of a log-structured file system for UNIX USENIX'93 Proceedings of the USENIX Winter 1993 Conference Proceedings on USENIX Winter 1993 Conference Proceedings. pp. 3- 3 ,(1993)
Natalia Kwasnikowska, Tommy Ellkvist, Jan Van den Bussche, Yogesh Simmhan, Beth Plale, Roger Barga, Patrick Paulson, Bertram Ludaescher, Paolo Missier, Luc Moreau, Simon Miles, Juliana Freire, Carole Goble, Shawn Bowers, Paul Groth, Robert McGrath, Jim Myers, Joe Futrelle, The Open Provenance Model (v1.01) s.n.. ,(2008)
Jennifer Widom, Trio: A System for Integrated Management of Data, Accuracy, and Lineage conference on innovative data systems research. pp. 262- 276 ,(2004)
Zhenyu Guo, Feibo Chen, Xuezheng Liu, Xi Wang, Ming Wu, Zheng Zhang, Xiaochen Lian, Jian Tang, M. Frans Kaashoek, D 3 S: debugging deployed distributed systems networked systems design and implementation. pp. 423- 437 ,(2008)
John R. Douceur, Thomas Moscibroda, Dave Levin, Jacob R. Lorch, TrInc: small trusted hardware for large distributed systems networked systems design and implementation. pp. 1- 14 ,(2009)
Richard Mortier, Rebecca Isaacs, Austin Donnelly, Paul Barham, Using magpie for request extraction and workload modelling operating systems design and implementation. pp. 18- 18 ,(2004)