Trusted Tamper-Evident Data Provenance

被引:10
|
作者
Taha, Mohammad M. Bany [1 ]
Chaisiri, Sivadon [1 ]
Ko, Ryan K. L. [1 ]
机构
[1] Univ Waikato, Cyber Secur Lab, Hamilton, New Zealand
关键词
Trusted Computing; Accountability in Cloud Computing; Data Security; Trusted Platform Module; Data Provenance; Remote Attestation; Tamper Evidence; Cloud Computing;
D O I
10.1109/Trustcom.2015.430
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data provenance, the origin and derivation history of data, is commonly used for security auditing, forensics and data analysis. While provenance loggers provide evidence of data changes, the integrity of the provenance logs is also critical for the integrity of the forensics process. However, to our best knowledge, few solutions are able to fully satisfy this trust requirement. In this paper, we propose a framework to enable tamper-evidence and preserve the confidentiality and integrity of data provenance using the Trusted Platform Module (TPM). Our framework also stores provenance logs in trusted and backup servers to guarantee the availability of data provenance. Tampered provenance logs can be discovered and consequently recovered by retrieving the original logs from the servers. Leveraging on TPM's technical capability, our framework guarantees data provenance collected to be admissible, complete, and confidential. More importantly, this framework can be applied to capture tampering evidence in large-scale cloud environments at system, network, and application granularities. We applied our framework to provide tamper-evidence for Progger, a cloud-based, kernel-space logger. Our results demonstrate the ability to conduct remote attestation of Progger logs' integrity, and uphold the completeness, confidential and admissible requirements.
引用
收藏
页码:646 / 653
页数:8
相关论文
共 50 条
  • [1] A Tamper-evident Ink
    Hayashi, Toshiki
    [J]. TAGA: TECHNICAL ASSOCIATION OF THE GRAPHIC ARTS, 2018, PROCEEDINGS, 2018, : 144 - 149
  • [2] THE GREENING OF TAMPER-EVIDENT CLOSURES
    MULLER, CH
    [J]. DRUG & COSMETIC INDUSTRY, 1985, 136 (06): : 35 - &
  • [3] Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking
    Ko, Ryan K. L.
    Will, Mark A.
    [J]. 2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 881 - 889
  • [4] Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance
    Zhang, Jing
    Chapman, Adriane
    LeFevre, Kristen
    [J]. SECURE DATA MANAGEMENT, PROCEEDINGS, 2009, 5776 : 17 - +
  • [5] CUSTOS: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution
    Paccagnella, Riccardo
    Datta, Pubali
    Ul Hassan, Wajih
    Bates, Adam
    Fletcher, Christopher W.
    Miller, Andrew
    Tian, Dave
    [J]. 27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
  • [6] Brief announcement: Tamper-evident stabilization
    Michigan State University, Houghton
    MI
    49931, United States
    不详
    MI
    48824, United States
    [J]. Lect. Notes Comput. Sci., (355-358):
  • [7] Brief Announcement: Tamper-Evident Stabilization
    Hajisheykhi, Reza
    Ebnenasir, Ali
    Kulkarni, Sandeep S.
    [J]. STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2014, 2014, 8756 : 355 - 358
  • [8] EXPANSION CONTINUES IN TAMPER-EVIDENT PACKAGING
    不详
    [J]. PACKAGE ENGINEERING, 1983, 28 (06): : 52 - 54
  • [9] Finding the evidence in tamper-evident logs
    Sandler, Daniel
    Derr, Kyle
    Crosby, Scott
    Wallach, Dan S.
    [J]. SADFE 2008: THIRD INTERNATIONAL WORKSHOP ON SYSTEMATIC APPROACHES TO DIGITAL FORENSIC ENGINEERING, PROCEEDINGS, 2008, : 69 - 75
  • [10] Implementing a tamper-evident database system
    Miklau, G
    Suciu, D
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS: DATA MANAGEMENT ON THE WEB, 2005, 3818 : 28 - 48