File processing security detection in multi-cloud environments: a process mining approach

被引:0
|
作者
Xiaolu Zhang
Lei Cui
Wuqiang Shen
Jijun Zeng
Li Du
Haoyang He
Long Cheng
机构
[1] China Southern Power Grid,Joint Laboratory on Cyberspace Security
[2] North China Electric Power University,School of Control and Computer Engineering
来源
关键词
Cloud file security; Process mining; Intrusion dection; Process analysis;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing has gained popularity in recent years, but with its rise comes concerns about data security. Unauthorized access and attacks on cloud-based data, applications, and infrastructure are major challenges that must be addressed. While machine learning algorithms have improved intrusion detection systems in cloud data security, they often fail to consider the entire life cycle of file processing, making it difficult to detect certain issues, especially insider attacks. To address these limitations, this paper proposes a novel approach to analyzing data file processing in multi-cloud environments using process mining. By generating a complete file processing event log from a multi-cloud environment, the proposed approach enables detection from both control flow and performance perspectives, providing a deeper understanding of the underlying file processing in its full life cycle. Through our case study, we demonstrate the power and capabilities of process mining for file security detection and showcase its ability to provide further insights into file security in multi-cloud environments.
引用
收藏
相关论文
共 50 条
  • [1] File processing security detection in multi-cloud environments: a process mining approach
    Zhang, Xiaolu
    Cui, Lei
    Shen, Wuqiang
    Zeng, Jijun
    Du, Li
    He, Haoyang
    Cheng, Long
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [2] A framework for evaluating security in multi-cloud environments
    Afolaranmi, Samuel Olaiya
    Ferrer, Borja Ramis
    Lastra, Jose Luis Martinez
    [J]. IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2018, : 3059 - 3066
  • [3] Security-as-a-Service in Multi-cloud and Federated Cloud Environments
    Pawar, Pramod S.
    Sajjad, Ali
    Dimitrakos, Theo
    Chadwick, David W.
    [J]. TRUST MANAGEMENT IX, 2015, 454 : 251 - 261
  • [4] An improved security and privacy management system for data in multi-cloud environments using a hybrid approach
    Pachala, Sunitha
    Rupa, Ch
    Sumalatha, L.
    [J]. EVOLUTIONARY INTELLIGENCE, 2021, 14 (02) : 1117 - 1133
  • [5] An improved security and privacy management system for data in multi-cloud environments using a hybrid approach
    Sunitha Pachala
    Ch. Rupa
    L. Sumalatha
    [J]. Evolutionary Intelligence, 2021, 14 : 1117 - 1133
  • [6] Security-by-design in multi-cloud applications: An optimization approach
    Casola, Valentina
    De Benedictis, Alessandra
    Rak, Massimiliano
    Villano, Umberto
    [J]. INFORMATION SCIENCES, 2018, 454 : 344 - 362
  • [7] A cloud brokerage approach for solving the resource management problem in multi-cloud environments
    Heilig, Leonard
    Lalla-Ruiz, Eduardo
    Voss, Stefan
    [J]. COMPUTERS & INDUSTRIAL ENGINEERING, 2016, 95 : 16 - 26
  • [8] Multi-cloud Applications Security Monitoring
    Carvallo, Pamela
    Cavalli, Ana R.
    Mallouli, Wissam
    Rios, Erkuden
    [J]. GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 748 - 758
  • [9] A Platform for Security Monitoring of Multi-cloud Applications
    Carvallo, Pamela
    Cavalli, Ana R.
    Mallouli, Wissam
    [J]. PERSPECTIVES OF SYSTEM INFORMATICS, PSI 2017, 2018, 10742 : 59 - 71
  • [10] Efficient Identity-Based Multi-Cloud Security Access Control in Distributed Environments
    Yakoob, S. K.
    Reddy, V. Krishna
    [J]. INTERNATIONAL JOURNAL OF E-COLLABORATION, 2023, 19 (03)