Paper 2015/1175

Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud

Bhanu Prakash Gopularam and Nalini. N

Abstract

Cloud computing is delivery of services rather than a product and among different cloud deployment models, the public cloud provides improved scalability and cost reduction when compared to others. Security and privacy of data is one of the key factors in transitioning to cloud. Typically the cloud providers have a demilitarized zone protecting the data center along with a reverse proxy setup. The reverse proxy gateway acts as initial access point and provides additional capabilities like load balancing, caching, security monitoring capturing events, syslogs related to hosts residing in the cloud. The audit-trail logs captured by reverse proxy server comprise important information related to all the tenants. While the PKI infrastructure works in cloud scenario it becomes cumbersome from manageability point of view and they lack flexibility in providing controlled access to data. In this paper we evaluate risks associated with security and privacy of audit logs produced by reverse proxy server. We provide a two-phase approach for sharing the audit-logs with users allowing fine-grained access. In this paper we evaluate certain Identity-Based and AttributeBased Encryption schemes and provide detailed analysis on performance.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud
DOI
10.14569/IJACSA.2014.051120
Keywords
Data confidentialitymulti-tenancyaudit-trail logAttribute-based encryptionreverse proxy security
Contact author(s)
bhanuprakash gopularam @ gmail com
History
2015-12-08: received
Short URL
https://ia.cr/2015/1175
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/1175,
      author = {Bhanu Prakash Gopularam and Nalini.  N},
      title = {Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud},
      howpublished = {Cryptology ePrint Archive, Paper 2015/1175},
      year = {2015},
      doi = {10.14569/IJACSA.2014.051120},
      note = {\url{https://eprint.iacr.org/2015/1175}},
      url = {https://eprint.iacr.org/2015/1175}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.