Anomaly Detection in Cloud Computing

Dr. Amol D. Potgantwar, Prof. Rakesh S. Shirsath

Abstract


Cloud Computing is the emerging technology that combines the concept of “Software-as-a-Service” and “Utility Computing”, provides the on-demand services to the end users. In cloud computing security is the important aspect and has various issues and problem. Nowadays many organizations are moving their data on the cloud, by using File Syncing and Sharing Services. End users uses their own devices to access the data and due to this there is rise in the new challenge for preventing the player/decoder abuse. In this paper, a system is developed called as PHE that is Partially-Ordered Hierarchical Encryption which implements partial order key hierarchy. Partial order key hierarchy is same as role hierarchy used in Hierarchical Role Based Access Control(HRBAC).This paper also introduces anomaly detection by using audit, pattern matching and risk assessment. This anomaly detection will identify the suspected players and will trace and revoke the authorities of the suspected players

[1]   Yan Zhu, Guohua Gan, Ruiqi Guo, and Dijiang Huang, ”PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud”, IEEE Transaction on Cloud Computing,2016.

[2]   Prince Jain, ”Security Issues and their Solution in Cloud Computing”, International Journal of Computing Business Research,2012

 

[3]     Santosh Kumar and R. H. Goudar, “Cloud Computing Research Issues, Challenges, Architecture, Platforms and Applications: A Survey ”, International Journal of Future Computer and Communication, Vol. 1, No. 4, December 2012.

 

[4]    F. R. Institute, ”Personal data in the cloud: A global survey of consumer attitudes”, http://www.fujitsu.com/downloads/SOL/fai/reports/ fujitsu/personaldata-in-the cloud.pdf, 2010.

 

[5]  Zhi Qiao, Shuwen Liang, Spencer Davis and Hai Jiang,” Survey of Attribute Based Encryption”, IEEE Conference,2014

[6]   V. Goyal, O. Pandey, A. Sahai, and B. Waters, ”Attribute-based encryption for fine-grained access control of encrypted data”, in ACM Conference on CCS,pp.8998,2006

[7]   A. Fiat and M. Naor, ”Broadcast encryption”, in Advances in Cryptology (CRYPTO93), vol. 773 of LNCS. springer-verlag, pp. 480491,1994

 

[8]  Zhen Liu, Zhenfu Cao, ” Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild”, IEEE Transaction on Information Forensics and Security, Vol. 10, N0. 1, January 2015

 

[9]  Christian D.Peer, Dominik Engel, Stephen B.Wicker, “Hierarchical Key Management for multi-resolution Load Data Representation”, IEEE International Conference on Smart Grid Communications, 2014


[10] D. Boneh and B. Waters, ”A fully collusion resistant broadcast, trace, and revoke system”, in ACM Conference on Computer and Communications Security, pp. 211220,2006.

[11] David F. Ferraiolo, Janet A. Cugini, D. Richard Kuhn, “Role-Based Access Control (RBAC): Features and Motivations”

[12] H. Chung, J. Park, S. Lee, and C. Kang, ” Digital forensic investigation of cloud storage services”, Digital Investigation, vol. 9, no. 2, pp.

 

8195, 2012.

 

[13] Chen, S. Nyemba, and B. Malin, ”Detecting anomalous insiders in collaborative information systems”, Dependable and Secure Computing, IEEE Transactions on, vol. 9, no. 3, pp. 332344, May 2012

[14] M. Blanton and K. B. Frikken, ”Efficient Multi-dimensional key management in broadcast services”, in ESORICS, pp. 424 440,2010

 

[15] S. Garg, A. Kumarasubramanian, A. Sahai, and B. Waters, ”Building efficient fully collusion-resilient traitor tracing and revocation schemes”, in Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, pp.

 

121130,2010.

 

[16] M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, ”Dynamic and efficient key management for access hierarchies”, ACM Trans. Inf. Syst.

Secur., vol. 12, no. 3, 2009.

 

[17]     N. Attrapadung and H. Imai, ”Conjunctive broadcast and attribute-based encryption”, in Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings,pp.248265,2009

 

[18]   Y. Chung, H. Lee, F. Lai, and T. Chen, Access control in user hierarchy based on elliptic curve cryptosystem”, Information Sciences, vol. 178, pp. 230243,2008.

 

[19]     E. Bertino, N. Shang, and S. Wagstaff, ”An efficient time-bound hierarchical key management scheme for secure broadcasting”, IEEE Trans. on Dependable and Secure Computing, vol. 5, no. 2, pp. 6570, 2008

[20]      R. Ostrovsky, A. Sahai, and B.Waters, Attribute-based encryption with nonmonotonic access structures”, in ACM Conference on


 

 


Full Text:

PDF

References


Yan Zhu, Guohua Gan, Ruiqi Guo, and Dijiang Huang, ”PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud”, IEEE Transaction on Cloud Computing,2016.

Prince Jain, ”Security Issues and their Solution in Cloud Computing”, International Journal of Computing Business Research,2012

Santosh Kumar and R. H. Goudar, “Cloud Computing Research Issues, Challenges, Architecture, Platforms and Applications: A Survey ”, International Journal of Future Computer and Communication, Vol. 1, No. 4, December 2012.

F. R. Institute, ”Personal data in the cloud: A global survey of consumer attitudes”, http://www.fujitsu.com/downloads/SOL/fai/reports/ fujitsu/personaldata-in-the cloud.pdf, 2010.

Zhi Qiao, Shuwen Liang, Spencer Davis and Hai Jiang,” Survey of Attribute Based Encryption”, IEEE Conference,2014

V. Goyal, O. Pandey, A. Sahai, and B. Waters, ”Attribute-based encryption for fine-grained access control of encrypted data”, in ACM Conference on CCS,pp.8998,2006

A. Fiat and M. Naor, ”Broadcast encryption”, in Advances in Cryptology (CRYPTO93), vol. 773 of LNCS. springer-verlag, pp. 480491,1994

Zhen Liu, Zhenfu Cao, ” Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild”, IEEE Transaction on Information Forensics and Security, Vol. 10, N0. 1, January 2015

Christian D.Peer, Dominik Engel, Stephen B.Wicker, “Hierarchical Key Management for multi-resolution Load Data Representation”, IEEE International Conference on Smart Grid Communications, 2014

D. Boneh and B. Waters, ”A fully collusion resistant broadcast, trace, and revoke system”, in ACM Conference on Computer and Communications Security, pp. 211220,2006.

David F. Ferraiolo, Janet A. Cugini, D. Richard Kuhn, “Role-Based Access Control (RBAC): Features and Motivations”

H. Chung, J. Park, S. Lee, and C. Kang, ” Digital forensic investigation of cloud storage services”, Digital Investigation, vol. 9, no. 2, pp.

, 2012.

Chen, S. Nyemba, and B. Malin, ”Detecting anomalous insiders in collaborative information systems”, Dependable and Secure Computing, IEEE Transactions on, vol. 9, no. 3, pp. 332344, May 2012

M. Blanton and K. B. Frikken, ”Efficient Multi-dimensional key management in broadcast services”, in ESORICS, pp. 424 440,2010

S. Garg, A. Kumarasubramanian, A. Sahai, and B. Waters, ”Building efficient fully collusion-resilient traitor tracing and revocation schemes”, in Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, pp.

,2010.

M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, ”Dynamic and efficient key management for access hierarchies”, ACM Trans. Inf. Syst.

Secur., vol. 12, no. 3, 2009.

N. Attrapadung and H. Imai, ”Conjunctive broadcast and attribute-based encryption”, in Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings,pp.248265,2009

Y. Chung, H. Lee, F. Lai, and T. Chen, Access control in user hierarchy based on elliptic curve cryptosystem”, Information Sciences, vol. 178, pp. 230243,2008.

E. Bertino, N. Shang, and S. Wagstaff, ”An efficient time-bound hierarchical key management scheme for secure broadcasting”, IEEE Trans. on Dependable and Secure Computing, vol. 5, no. 2, pp. 6570, 2008

R. Ostrovsky, A. Sahai, and B.Waters, Attribute-based encryption with nonmonotonic access structures”, in ACM Conference onComputer and Communications Security, pp.

,2007.

J. Bethencourt, A. Sahai, and B. Waters, ”Ciphertext-policy attribute-based encryption”, in IEEE Symposium on Security and Privacy, pp. 321334,2007.

A. D. Santis, A. L. Ferrara, and B. Masucci, ”Efficient provably secure hierarchical key assignment schemes”, in MFCS, pp. 371382,2007.

D. Boneh, A. Sahai, and B. Waters, ”Fully collusion resistant traitor tracing with short cipher texts and private keys”, in EUROCRYPT, pp. 573592,2006

D. Boneh, X. Boyen, and E.-J. Goh, ”Hierarchical identity based encryption with constant size cipher text”, in Advances in Cryptology (EUROCRYPT2005), vol. 3494 of

LNCS, pp. 440456,2005.

H. Kim, B. Park1, J. Ha, B. Lee, and D. Park, ”New key management systems for multilevel security”, in ICCSA 2005, vol. 3481 of LNCS, pp. 245253,2005.

A. Sahai and B. Waters, ”Fuzzy identity-based encryption”, in EUROCRYPT, pp. 457473,2005

H. Chien, ”Efficient time-bound hierarchical key assignment scheme”, IEEE Trans. on

Knowledge and Data Engineering, vol. 16, no. 10, pp. 13011304, 2004.

N. Provos, M. Friedl, and P. Honeyman, ”Preventing privilege escalation”, in Proceedings of the 12thUSENIX Security Symposium,

Washington, D.C., USA, August 4-8, 2003, 2003.

W. Tzeng, ”A time-bound cryptographic key assignment scheme for access control in a hierarchy”, IEEE Trans. on Knowledge and Data Engineering, vol.14, no. 1, pp. 182188, 2002.

D. Boneh and M. K. Franklin, ”Identity-based encryption fromthe weil pairing”, in CRYPTO,pp. 213229,2001

Carlo Bellettini, Elisa Bertino, Elena Ferrari, ”, Information”RoleBasedAccessControlModels

Security Technical Report, Vol. 6, No. 2 21-9,2001

W.-G. Tzeng and Z.-J. Tzeng, ”A public-key traitor tracing scheme with revocation using dynamic shares”, in Public Key Cryptography, pp. 207224,2001

D. Boneh and M. K. Franklin, ”An efficient public key traitor tracing scheme”, in CRYPTO, 1999, pp. 338353.


Refbacks

  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology