Abstract
Cloud computing offers computing and software services to users on an on-demand basis. It facilitates users to use computing resources as utility with pay-per-usage billing, which allows users to acquire computational resources with low or no initial cost. Due to this greater level of flexibility, the cloud has become the breeding ground of a new generation of products and services. Since more and more people rely on the cloud with their data and computing, ensuring the trustworthiness of cloud services has become a major issue for both the users and cloud providers. Due to the black box nature of cloud, there has been a lack of trust among providers and users, which has become a major barrier to the widespread growth of cloud computing. One of the trust concerns of cloud is lack of computational transparency. In particular, in current cloud architecture a provider controls all the logging and auditing records corresponding to computation and users do not have access to these records. This is a big concern for many clients of cloud. In this paper, we first identify the risks associated with lack of transparency in cloud and propose a middleware service that eliminates these risks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abbadi, I.M., Lyle, J.: Challenges for provenance in cloud computing. In: TaPP 2011: Proceedings of the Third USENIX Workshop on the Theory and Practice of Provenance (2011)
Zhang, O.Q., Kirchberg, M., Ko, R.K., Lee, B.S.: How to track your data: the case for cloud computing provenance. In: IEEE International Conference on Cloud Computing Technology and Science, pp. 446–453 (2011)
Zhang, L., Chen, Y., Tang, F., Ao, X.: Design and implementation of cloud-based performance testing system for web services. In: Proceedings of the 2011 6th International ICST Conference on Communications and Networking in China, CHINACOM ’11, pp. 875–880. IEEE Computer Society, Washington, DC (2011)
Lee, J., Cho, J., Seo, J., Shon, T., Won, D.: A novel approach to analyzing for detecting malicious network activity using a cloud computing testbed. Mob. Networks Appl. 18(1), 122–128 (2013)
Ferguson, E., Weber, J., Hasan, R.: Cloud based content fetching: using cloud infrastructure to obfuscate phishing scam analysis. In: SERVICES, pp. 255–261 (2012)
Grossman, R., Gu, Y.: Data mining using high performance data clouds: experimental studies using sector and sphere. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’08, pp. 920–927. ACM, New York (2008)
Butler, P., Rhodes, A., Hasan, R.: Manticore: masking all network traffic via IP concealment with OpenVPN relaying to EC2. In: IEEE CLOUD, pp. 487–493 (2012)
Lyle, J., Martin, A.: Trusted computing and provenance: better together. In: TaPP ’10: 2nd Workshop on the Theory and Practice of Provenance (2010)
Muniswamy-Reddy, K.K., Macko, P., Seltzer, M.: Making a cloud provenance-aware. In: First Workshop on Theory and Practice of Provenance, TAPP’09, pp. 12:1–12:10. USENIX Association, Berkeley (2009)
Muniswamy-Reddy, K.K., Macko, P., Seltzer, M.: Provenance for the cloud. In: Proceedings of the 8th USENIX Conference on File and Storage Technologies, FAST’10, pp. 15–14. USENIX Association, Berkeley (2010)
Muniswamy-Reddy, K.K., Seltzer, M.: Provenance as first class cloud data. SIGOPS Oper. Syst. Rev. 43(4), 11–16 (2010)
Ko, R.K.L., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., Lee, B.S.: Trustcloud: a framework for accountability and trust in cloud computing. In: SERVICES, pp. 584–588. IEEE Computer Society (2011)
Reilly, C.F., Naughton, J.F.: Transparently gathering provenance with provenance aware condor. In: First Workshop on Theory and Practice of Provenance, TAPP’09, pp. 13:1–13:10. USENIX Association, Berkeley (2009)
Abbadi, I.M.: Middleware services at cloud virtual layer. In: DSOC 2011: Proceedings of the 2nd International Workshop on Dependable Service-Oriented and Cloud computing, August 2011. IEEE Computer Society (2011)
Abbadi, I.M., Martin, A.: Trust in the cloud. Inf. Secur. Tech. Rep. 16(3–4), 108–114 (2011)
Park, H., Ikeda, R., Widom, J.: RAMP: a system for capturing and tracing provenance in MapReduce workflows. PVLDB 4(12), 1351–1354 (2011)
Akoush, S., Sohan, R., Hopper, A.: Hadoopprov: towards provenance as a first class citizen in MapReduce. In: Proceedings of the 5th USENIX Workshop on the Theory and Practice of Provenance, TaPP ’13, pp. 11:1–11:4. USENIX Association, Berkeley (2013)
Li, L., Zhang, M.: The strategy of mining association rule based on cloud computing. In: IEEE Computer Society, pp. 475–478 (2011)
Wang, J., Wan, J., Liu, Z., Wang, P.: Data mining of mass storage based on cloud computing. In: IEEE Computer Society, pp. 426–431 (2010)
Dev, H., Sen, T., Basak, M., Ali, M.E.: An approach to protect the privacy of cloud data from data mining based attacks. In: Proceedings of the 2012 SC Companion: High Performance Computing, Networking Storage and Analysis, SCC ’12, pp. 1106–1115. IEEE Computer Society, Washington, DC (2012)
Karl Rexer, P.: 2010 data miner survey highlights the views of 735 data miners (2010)
Institute, F.R.: Personal data in the cloud: a global survey of consumer attitudes (2010)
Wang, Y., Burgener, D., Flores, M., Kuzmanovic, A., Huang, C.: Towards street-level client-independent IP geolocation. In: Proceeding NSDI’11 Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, NSDI’11, pp. 27–40. USENIX Association, Berkeley (2011)
Ryan, K.L., Ko, P.J., Lee, B.S.: Flogger: a file-centric logger for monitoring file access and transfers within cloud computing environments. Technical report, HP Cloud and Security Lab Singapore (2011)
Globus. http://www.globus.org
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dev, H., Ali, M.E., Sen, T., Basak, M. (2014). AntiqueData: A Proxy to Maintain Computational Transparency in Cloud. In: Han, WS., Lee, M., Muliantara, A., Sanjaya, N., Thalheim, B., Zhou, S. (eds) Database Systems for Advanced Applications. DASFAA 2014. Lecture Notes in Computer Science(), vol 8505. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43984-5_19
Download citation
DOI: https://doi.org/10.1007/978-3-662-43984-5_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43983-8
Online ISBN: 978-3-662-43984-5
eBook Packages: Computer ScienceComputer Science (R0)