首页> 外文期刊>IEEE transactions on dependable and secure computing >Detecting Suspicious File Migration or Replication in the Cloud
【24h】

Detecting Suspicious File Migration or Replication in the Cloud

机译:检测云中的可疑文件迁移或复制

获取原文
获取原文并翻译 | 示例

摘要

There has been a prolific rise in the popularity of cloud storage in recent years. While cloud storage offers many advantages such as flexibility and convenience, users are typically unable to tell or control the actual locations of their data. This limitation may affect users' confidence and trust in the storage provider, or even render cloud unsuitable for storing data with strict location requirements. To address this issue, we propose a system called LAST-HDFS which integrates Location-Aware Storage Technique (LAST) into the open source Hadoop Distributed File System (HDFS). The LAST-HDFS system enforces location-aware file allocations and continuously monitors file transfers to detect potentially illegal transfers in the cloud. Illegal transfers here refer to attempts to move sensitive data outside the ("legal") boundaries specified by the file owner and its policies. Our underlying algorithms model file transfers among nodes as a weighted graph, and maximize the probability of storing data items of similar privacy preferences in the same region. We equip each cloud node with a socket monitor that is capable of monitoring the real-time communication among cloud nodes. Based on the real-time data transfer information captured by the socket monitors, our system calculates the probability of a given transfer to be illegal. We have implemented our proposed framework and carried out an extensive experimental evaluation in a large-scale real cloud environment to demonstrate the effectiveness and efficiency of our proposed system.
机译:近年来云层储存的普及普遍存在。虽然云存储提供了许多优点,例如灵活性和便利性,但用户通常无法讲述或控制其数据的实际位置。这种限制可能会影响用户对存储提供商的信心和信任,甚至不适合将数据存储具有严格的位置要求的数据。要解决此问题,我们提出了一个称为Last-HDFS的系统,该系统将位置感知存储技术(最后)集成到开源Hadoop分布式文件系统(HDFS)中。 Last-HDFS系统强制执行位置感知文件分配,并连续监视文件传输,以检测云中的可能非法转移。这里的非法转移是指尝试在文件所有者及其策略指定的(“合法”)边界之外移动敏感数据。我们的基础算法模型文件在节点中作为加权图转换,并最大化存储在同一区域中类似隐私偏好的数据项的概率。我们用套接字监视器装备每个云节点,该套接字监视器能够监视云节点之间的实时通信。基于套接字监视器捕获的实时数据传输信息,我们的系统计算给定转移的概率是非法的。我们已经实施了我们提出的框架,并在大规模的真正云环境中进行了广泛的实验评估,以展示我们所提出的系统的有效性和效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号