Research Area:  Cloud Security
With the rapid development of cloud computing and distributed system, the security of data stored in cloud server becomes more and more important. In this paper, we analyze the challenges and problems of clouding security, and introduce the cloud security framework, as well as compare the different cloud security controlling methods. Meanwhile, we propose our own trusted cloud framework based on Cloud Accountability Life Cycle. To satisfy the requirements of cloud security, auditing the provenance data in cloud server is the most efficient method, and the log is a type of provenance data, which is relative easy and stable to collect. Therefore, audit based on log data plays a significant role in cloud security framework. In this paper, we also compare different security audit mechanisms, and point out their advantages and disadvantages as well as suggest how to improve these mechanisms.
Keywords:  
Cloud security Auditing
Provenance data
Trusted cloud framework
Log analysis
Author(s) Name:  Haoyu Chen; Shanshan Tu; Chunye Zhao; Yongfeng Huang
Journal name:  
Conferrence name:  2016 IEEE International Conference of Online Analysis and Computing Science (ICOACS)
Publisher name:  IEEE
DOI:  2016 IEEE International Conference of Online Analysis and Computing Science (ICOACS)
Volume Information:  
Paper Link:   https://ieeexplore.ieee.org/abstract/document/7563069