• Title/Summary/Keyword: Remote auditing

Search Result 5, Processing Time 0.022 seconds

Improving efficiency of remote data audit for cloud storage

  • Fan, Kuan;Liu, Mingxi;Shi, Wenbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.2198-2222
    • /
    • 2019
  • The cloud storage service becomes a rising trend based on the cloud computing, which promotes the remote data integrity auditing a hot topic. Some research can audit the integrity and correctness of user data and solve the problem of user privacy leakage. However, these schemes cannot use fewer data blocks to achieve better auditing results. In this paper, we figure out that the random sampling used in most auditing schemes is not well apply to the problem of cloud service provider (CSP) deleting the data that users rarely use, and we adopt the probability proportionate to size sampling (PPS) to handle such situation. A new scheme named improving audit efficiency of remote data for cloud storage is designed. The proposed scheme supports the public auditing with fewer data blocks and constrains the server's malicious behavior to extend the auditing cycle. Compared with the relevant schemes, the experimental results show that the proposed scheme is more effective.

A Study on Batch Auditing with Identification of Corrupted Cloud Storage in Multi-Cloud Environments (손상 클라우드 식별 가능한 다중 클라우드 일괄 감사 기법에 관한 연구)

  • Shin, Sooyeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.75-82
    • /
    • 2015
  • Recently, many public auditing schemes have been proposed to support public auditability that enables a third party auditor to verify the integrity of data stored in the remote cloud server. To improve the performance of the auditor, several public auditing schemes support batch auditing which allows the auditor to handle simultaneously multiple auditing delegations from different users. However, when even one data is corrupted, the batch auditing will fail and individual and repeated auditing processes will be required. It is difficult to identify the corrupted data from the proof in which distinct data blocks and authenticators of distinct users are intricately aggregated. In this paper, we extend a public auditing scheme of Wang et al. to support batch auditing for multi-cloud and multi-user. We propose an identification scheme of the corrupted cloud when the data of a single cloud is corrupted in the batch auditing of multi-cloud and multi-user.

A Novel Auditing System for Dynamic Data Integrity in Cloud Computing (클라우드 컴퓨팅에서 동적 데이터 무결성을 위한 개선된 감사 시스템)

  • Kim, Tae-yeon;Cho, Gi-hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1818-1824
    • /
    • 2015
  • Cloud computing draws attention as an application to provide dynamically scalable infrastructure for application, data and file storage. An untrusted remote server can cause a variety of problems in the field of data protection. It may process intentionally or involuntarily user's data operations(modify, insert, delete) without user's permission. It may provide false information in order to hide his mistakes in the auditing process. Therefore, it is necessary to audit the integrity of data stored in the cloud server. In this paper, we propose a new data auditing system that can verify whether servers had a malicious behavior or not. Performance and security analysis have proven that our scheme is suitable for cloud computing environments in terms of performance and security aspects.

A Pilot Study for the Remote Monitoring of IMRT Using a Head and Neck Phantom (원격 품질 보증 시스템을 사용한 세기변조 방사선치료의 예비 모니터링 결과)

  • Han, Young-Yih;Shin, Eun-Hyuk;Lim, Chun-Il;Kang, Se-Kwon;Park, Sung-Ho;Lah, Jeong-Eun;Suh, Tae-Suk;Yoon, Myong-Geun;Lee, Se-Byeong;Ju, Sang-Gyu;Ahn, Yong-Chan
    • Radiation Oncology Journal
    • /
    • v.25 no.4
    • /
    • pp.249-260
    • /
    • 2007
  • Purpose: In order to enhance the quality of IMRT as employed in Korea, we developed a remote monitoring system. The feasibility of the system was evaluated by conducting a pilot study. Materials and Methods: The remote monitoring system consisted of a head and neck phantom and a user manual. The phantom contains a target and three OARs (organs at risk) that can be detected on CT images. TLD capsules were inserted at the center of the target and at the OARs. Two film slits for GafchromicEBT film were located on the axial and saggital planes. The user manual contained an IMRT planning guide and instructions for IMRT planning and the delivery process. After the manual and phantom were sent to four institutions, IMRT was planed and delivered. Predicted doses were compared with measured doses. Dose distribution along the two straight lines that intersected at the center of the axial film was measured and compared with the profiles predicted by the plan. Results: The measurements at the target agreed with the predicted dose within a 3% deviation. Doses at the OARs that represented the thyroid glands showed larger deviations (minimum 3.3% and maximum 19.8%). The deviation at OARs that represented the spiral cord was $0.7{\sim}1.4%$. The percentage of dose distributions that showed more than a 5% of deviation on the lines was $7{\sim}27%$ and $7{\sim}14%$ along the horizontal and vertical lines, respectively. Conculsion: Remote monitoring of IMRT using the developed system was feasible. With remote monitoring, the deviation at the target is expected to be small while the deviation at the OARs can be very large. Therefore, a method that is able to investigate the cause of a large deviation needs to be developed. In addition, a more clinically relevant measure for the two-dimensional dose comparison and pass/fail criteria need to be further developed.

A Real-Time Intrusion Detection based on Monitoring in Network Security (네트워크 보안에서 모니터링 기반 실시간 침입 탐지)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.9-15
    • /
    • 2013
  • Recently, Intrusion detection system is an important technology in computer network system because of has seen a dramatic increase in the number of attacks. The most of intrusion detection methods do not detect intrusion on real-time because difficult to analyze an auditing data for intrusions. A network intrusion detection system is used to monitors the activities of individual users, groups, remote hosts and entire systems, and detects suspected security violations, by both insider and outsiders, as they occur. It is learns user's behavior patterns over time and detects behavior that deviates from these patterns. In this paper has rule-based component that can be used to encode information about known system vulnerabilities and intrusion scenarios. Integrating the two approaches makes Intrusion Detection System a comprehensive system for detecting intrusions as well as misuse by authorized users or Anomaly users (unauthorized users) using RFM analysis methodology and monitoring collect data from sensor Intrusion Detection System(IDS).