2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 2013
DOI: 10.1109/trustcom.2013.73
|View full text |Cite
|
Sign up to set email alerts
|

S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance

Abstract: The inability to effectively track data in cloud computing environments is becoming one of the top concerns for cloud stakeholders. This inability is due to two main reasons. Firstly, the lack of data tracking tools built for clouds. Secondly, current logging mechanisms are only designed from a systemcentric perspective. There is a need for data-centric logging techniques which can trace data activities (e.g. file creation, edition, duplication, transfers, deletions, etc.) within and across all cloud servers. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3
2

Relationship

3
6

Authors

Journals

citations
Cited by 60 publications
(32 citation statements)
references
References 12 publications
0
31
0
1
Order By: Relevance
“…Inability to track data in the cloud has raised a number of challenges, for example, data provenance has turned out to be a very big concern because there exist no data tracking tools focused in the cloud at the time of writing this paper. Nevertheless the logging mechanisms that exist are mainly focused on operating in a system-centric perspective [7]. Research on methods of collecting digital evidence in the cloud and potential digital evidence have been proposed by Kebande & venter, where potential evidence can be digitally preserved for purposes of conducting digital investigation [17], [18], [19], [20], [21], [22].…”
Section: Cloud Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…Inability to track data in the cloud has raised a number of challenges, for example, data provenance has turned out to be a very big concern because there exist no data tracking tools focused in the cloud at the time of writing this paper. Nevertheless the logging mechanisms that exist are mainly focused on operating in a system-centric perspective [7]. Research on methods of collecting digital evidence in the cloud and potential digital evidence have been proposed by Kebande & venter, where potential evidence can be digitally preserved for purposes of conducting digital investigation [17], [18], [19], [20], [21], [22].…”
Section: Cloud Computingmentioning
confidence: 99%
“…In this research the authors highlights that if the metadata tags cannot be appended to the headers of all or any other file, then the metadata should be stored separately from the data objects [12].…”
Section: Related Workmentioning
confidence: 99%
“…Improvements to the provenance concepts Flogger introduced were made. For example, DataPROVE [20] was proposed to cater to the causality issue identified and S2Logger [21] was proposed to solve the scalability and visualisation challenges in end-to-end data activity tracking in the cloud. However, all of them still were unable to maintain the authenticity and integrity of provenance logs (e.g.…”
Section: B Critical Gaps Identified In Related Provenance Techniquesmentioning
confidence: 99%
“…Other approaches advocate the collection of data provenance to increase the awareness of data in third-party cloud services [38,41,42]. However, the importance of trusted computing for cloud services is accepted.…”
Section: B Cloud Computingmentioning
confidence: 99%