Skip to main content

AntiqueData: A Proxy to Maintain Computational Transparency in Cloud

  • Conference paper
  • First Online:
Database Systems for Advanced Applications (DASFAA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8505))

Included in the following conference series:

Abstract

Cloud computing offers computing and software services to users on an on-demand basis. It facilitates users to use computing resources as utility with pay-per-usage billing, which allows users to acquire computational resources with low or no initial cost. Due to this greater level of flexibility, the cloud has become the breeding ground of a new generation of products and services. Since more and more people rely on the cloud with their data and computing, ensuring the trustworthiness of cloud services has become a major issue for both the users and cloud providers. Due to the black box nature of cloud, there has been a lack of trust among providers and users, which has become a major barrier to the widespread growth of cloud computing. One of the trust concerns of cloud is lack of computational transparency. In particular, in current cloud architecture a provider controls all the logging and auditing records corresponding to computation and users do not have access to these records. This is a big concern for many clients of cloud. In this paper, we first identify the risks associated with lack of transparency in cloud and propose a middleware service that eliminates these risks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abbadi, I.M., Lyle, J.: Challenges for provenance in cloud computing. In: TaPP 2011: Proceedings of the Third USENIX Workshop on the Theory and Practice of Provenance (2011)

    Google Scholar 

  2. Zhang, O.Q., Kirchberg, M., Ko, R.K., Lee, B.S.: How to track your data: the case for cloud computing provenance. In: IEEE International Conference on Cloud Computing Technology and Science, pp. 446–453 (2011)

    Google Scholar 

  3. Zhang, L., Chen, Y., Tang, F., Ao, X.: Design and implementation of cloud-based performance testing system for web services. In: Proceedings of the 2011 6th International ICST Conference on Communications and Networking in China, CHINACOM ’11, pp. 875–880. IEEE Computer Society, Washington, DC (2011)

    Google Scholar 

  4. Lee, J., Cho, J., Seo, J., Shon, T., Won, D.: A novel approach to analyzing for detecting malicious network activity using a cloud computing testbed. Mob. Networks Appl. 18(1), 122–128 (2013)

    Article  Google Scholar 

  5. Ferguson, E., Weber, J., Hasan, R.: Cloud based content fetching: using cloud infrastructure to obfuscate phishing scam analysis. In: SERVICES, pp. 255–261 (2012)

    Google Scholar 

  6. Grossman, R., Gu, Y.: Data mining using high performance data clouds: experimental studies using sector and sphere. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’08, pp. 920–927. ACM, New York (2008)

    Google Scholar 

  7. Butler, P., Rhodes, A., Hasan, R.: Manticore: masking all network traffic via IP concealment with OpenVPN relaying to EC2. In: IEEE CLOUD, pp. 487–493 (2012)

    Google Scholar 

  8. Lyle, J., Martin, A.: Trusted computing and provenance: better together. In: TaPP ’10: 2nd Workshop on the Theory and Practice of Provenance (2010)

    Google Scholar 

  9. Muniswamy-Reddy, K.K., Macko, P., Seltzer, M.: Making a cloud provenance-aware. In: First Workshop on Theory and Practice of Provenance, TAPP’09, pp. 12:1–12:10. USENIX Association, Berkeley (2009)

    Google Scholar 

  10. Muniswamy-Reddy, K.K., Macko, P., Seltzer, M.: Provenance for the cloud. In: Proceedings of the 8th USENIX Conference on File and Storage Technologies, FAST’10, pp. 15–14. USENIX Association, Berkeley (2010)

    Google Scholar 

  11. Muniswamy-Reddy, K.K., Seltzer, M.: Provenance as first class cloud data. SIGOPS Oper. Syst. Rev. 43(4), 11–16 (2010)

    Article  Google Scholar 

  12. Ko, R.K.L., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., Lee, B.S.: Trustcloud: a framework for accountability and trust in cloud computing. In: SERVICES, pp. 584–588. IEEE Computer Society (2011)

    Google Scholar 

  13. Reilly, C.F., Naughton, J.F.: Transparently gathering provenance with provenance aware condor. In: First Workshop on Theory and Practice of Provenance, TAPP’09, pp. 13:1–13:10. USENIX Association, Berkeley (2009)

    Google Scholar 

  14. Abbadi, I.M.: Middleware services at cloud virtual layer. In: DSOC 2011: Proceedings of the 2nd International Workshop on Dependable Service-Oriented and Cloud computing, August 2011. IEEE Computer Society (2011)

    Google Scholar 

  15. Abbadi, I.M., Martin, A.: Trust in the cloud. Inf. Secur. Tech. Rep. 16(3–4), 108–114 (2011)

    Google Scholar 

  16. Park, H., Ikeda, R., Widom, J.: RAMP: a system for capturing and tracing provenance in MapReduce workflows. PVLDB 4(12), 1351–1354 (2011)

    Google Scholar 

  17. Akoush, S., Sohan, R., Hopper, A.: Hadoopprov: towards provenance as a first class citizen in MapReduce. In: Proceedings of the 5th USENIX Workshop on the Theory and Practice of Provenance, TaPP ’13, pp. 11:1–11:4. USENIX Association, Berkeley (2013)

    Google Scholar 

  18. Li, L., Zhang, M.: The strategy of mining association rule based on cloud computing. In: IEEE Computer Society, pp. 475–478 (2011)

    Google Scholar 

  19. Wang, J., Wan, J., Liu, Z., Wang, P.: Data mining of mass storage based on cloud computing. In: IEEE Computer Society, pp. 426–431 (2010)

    Google Scholar 

  20. Dev, H., Sen, T., Basak, M., Ali, M.E.: An approach to protect the privacy of cloud data from data mining based attacks. In: Proceedings of the 2012 SC Companion: High Performance Computing, Networking Storage and Analysis, SCC ’12, pp. 1106–1115. IEEE Computer Society, Washington, DC (2012)

    Google Scholar 

  21. Karl Rexer, P.: 2010 data miner survey highlights the views of 735 data miners (2010)

    Google Scholar 

  22. Institute, F.R.: Personal data in the cloud: a global survey of consumer attitudes (2010)

    Google Scholar 

  23. Wang, Y., Burgener, D., Flores, M., Kuzmanovic, A., Huang, C.: Towards street-level client-independent IP geolocation. In: Proceeding NSDI’11 Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, NSDI’11, pp. 27–40. USENIX Association, Berkeley (2011)

    Google Scholar 

  24. Ryan, K.L., Ko, P.J., Lee, B.S.: Flogger: a file-centric logger for monitoring file access and transfers within cloud computing environments. Technical report, HP Cloud and Security Lab Singapore (2011)

    Google Scholar 

  25. Globus. http://www.globus.org

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Himel Dev .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dev, H., Ali, M.E., Sen, T., Basak, M. (2014). AntiqueData: A Proxy to Maintain Computational Transparency in Cloud. In: Han, WS., Lee, M., Muliantara, A., Sanjaya, N., Thalheim, B., Zhou, S. (eds) Database Systems for Advanced Applications. DASFAA 2014. Lecture Notes in Computer Science(), vol 8505. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43984-5_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43984-5_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43983-8

  • Online ISBN: 978-3-662-43984-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics