3 Journal

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

Journal of Digital Forensics,

Security and Law


Volume 13 | Number 3 Article 7

9-30-2018

A Forensic Enabled Data Provenance Model for


Public Cloud
Shariful Haque
University of Alabama, mshaque@crimson.ua.edu

Travis Atkison
University of Alabama, atkison@cs.ua.edu

Follow this and additional works at: https://commons.erau.edu/jdfsl


Part of the Computer Law Commons, and the Information Security Commons

Recommended Citation
Haque, Shariful and Atkison, Travis (2018) "A Forensic Enabled Data Provenance Model for Public Cloud," Journal of Digital Forensics,
Security and Law: Vol. 13 : No. 3 , Article 7.
DOI: https://doi.org/10.15394/jdfsl.2018.1570
Available at: https://commons.erau.edu/jdfsl/vol13/iss3/7

This Article is brought to you for free and open access by the Journals at
Scholarly Commons. It has been accepted for inclusion in Journal of Digital
Forensics, Security and Law by an authorized administrator of Scholarly
Commons. For more information, please contact commons@erau.edu,
wolfe309@erau.edu. (c)ADFSL
A Forensic Enabled Data Provenance Model for Public Cloud JDFSL V13N3

A FORENSIC ENABLED DATA


PROVENANCE MODEL FOR PUBLIC
CLOUD
Md. Shariful Haque, Travis Atkison∗
University of Alabama
Tuscaloosa, AL, USA
mshaque@crimson.ua.edu, atkison@cs.ua.edu

ABSTRACT
Cloud computing is a newly emerging technology where storage, computation and services
are extensively shared among a large number of users through virtualization and distributed
computing. This technology makes the process of detecting the physical location or own-
ership of a particular piece of data even more complicated. As a result, improvements in
data provenance techniques became necessary. Provenance refers to the record describing
the origin and other historical information about a piece of data. An advanced data prove-
nance system will give forensic investigators a transparent idea about the data’s lineage, and
help to resolve disputes over controversial pieces of data by providing digital evidence. In
this paper, the challenges of cloud architecture are identified, how this affects the existing
forensic analysis and provenance techniques is discussed, and a model for efficient provenance
collection and forensic analysis is proposed.

Keywords: data provenance, conceptual model, cloud architecture, digital forensic, digital
evidence, data confidentiality, forensic requirements, provenance challenges

1. INTRODUCTION Buyya, 2011). However, efficient data man-


agement must include some other param-
In recent years, advancement in data pro- eters to maintain the quality of the data
cessing and communication technology and and enable reusing it. Data provenance or
theabundance of digital storage capacity en- lineage is a form of metadata that stores
able coupling multiple computing resources the origin of a piece of data, keeps track of
tomanage large amount of data. The con- its ownership, and manages the history of
cept of cloud computing was developed to of- the computational processing the data goes
ferthis computing power and storage as ser- through in its lifetime. This data manage-
vice virtually. In such a utility-based busi- ment technique is useful not only as a source
nessmodel, a consumer can utilize the of- of data regeneration or as a component for
fered services on-demand following the ”pay- identifying errors through backward track-
as-you-go”approach (Voorsluys, Broberg, & ing, it also helps in regulatory purposes and
resolving disputes by facilitating a proper in-

Corresponding Author vestigation in digital forensics. These as-


c 2018 ADFSL Page 47
JDFSL V13N3 A Forensic Enabled Data Provenance Model for Public Cloud

pects of provenance records make it an es- cloud deployment models, the public cloud
sential topic to be discussed in cloud archi- architecture will be the focus as it introduces
tecture. more challenges than the other models. The
Clouds basically use the concept of multi- rest of the paper is organized as follows: In
tenancy and virtualization to ensure efficient Section 2, basic concepts of public cloud, dig-
utilization of available resources. It identi- ital forensic and data provenance along with
fies and solves some challenges of large scale their challenges and requirements will be dis-
data processing, such as on-demand resource cussed. In Section 3, previous work on re-
allocation based on computational require- lated areas will be explored. In Section 4,
ments, distribution and coordination of jobs the proposed data provenance model will be
among different machines, automatic recov- discussed along with additional design con-
ery management, dynamic scaling of oper- siderations. Finally, conclusions and future
ations based on workloads, and releasing work will be discussed in Section 5.
the machines when all the jobs are com-
plete (Amazon Web Services, 2008). These
features make cloud computing a popular 2. BACKGROUND
choice for small and medium scale indus-
tries, and research says this market will ex- 2.1 Public Cloud
pand with a 30% CAGR (Compound An- (Mell, Grance, et al., 2011) defined Cloud
nual Growth Rate) to reach 270 billion by computing as a “model for enabling ubiq-
2020 (Market Research Media, 2016). As uitous, convenient, on-demand network ac-
cloud computing grows in popularity, so do cess to a shared pool of configurable comput-
concerns about security, compliance, privacy ing resources (e.g., networks, servers, stor-
and legal matters (Chung & Hermans, 2010). age, applications, and services) that can be
Storing data in a location with an unknown rapidly provisioned and released with min-
owner’s record with thinner boundaries, and imal management effort or service provider
backing up data by an untrusted third party interaction.” With lots of services offered
are a couple of the notable security con- through advanced technologies, cloud com-
cerns with cloud architecture (Hashizume, puting is redefining computing technology.
Rosado, Fernández-Medina, & Fernandez, Its “pay-as-you-go” and “provision-as-you-
2013). These issues can eventually affect the go” make it the most suitable choice for
trustworthiness of the data, as well as the storing personal information, maintaining
metadata associated with it, making it dif- shared documents with a large group of
ficult to find accurate evidence to apply in users, and hosting large applications that
forensics. Though there are several digital require higher computational power. As
forensic tools to apply in general IT scenar- cloud computing offers wide ranges of ser-
ios, most of them have failed to prove their vices based on demand from a single user to
success over cloud architecture. Thus, new a large organization, different service and de-
digital forensic methods must be developed ployment models have been designed. One of
to meet the challenges of a cloud architec- the widely used deployment models of cloud
ture. service is public cloud, which (Jansen &
In this paper, a provenance model to in- Grance, 2011) describe as an “infrastructure
crease the capability of digital forensics in a and computational resource” that is “owned
cloud environment will be examined. While and operated by an outside party that de-
this model can be experimented on other livers to the general public via multi-tenant

Page 48
c 2018 ADFSL
A Forensic Enabled Data Provenance Model for Public Cloud JDFSL V13N3

platform”. Figure-1 depicts a general ar- the resources. An attacker might be able to
chitecture of the public cloud model where overcome this logical separation using config-
cloud consumers are accessing the infrastruc- uration errors or software bugs to gain illegit-
ture of a cloud provider. imate access. Accessing services over the in-
ternet also increases vulnerabilities through
Figure 1. Public Cloud Model (Bohn et al., various network threats (Bohn et al., 2011).
2011) When an organization manages its own re-
sources and records in its secured computing

•• environment, it can clearly arrange the nec-


essary protective measures and have a de-
-·· --!!-- --• --!!--- -5--- -
1 I ! I
tailed idea about the location and structure
- _.
I

111111
.
I

- -mpi -
I

- llf9
- - -=--
I

m:i- of the data. On the contrary, cloud comput-


ing services are dispersed and data is dupli-
Cloud Consumen accessing the cloud
Cloud Consumen acrcs~ing
thecloudo\-cr the nctwork
fi:omwithinthemterprise network cated over multiple locations to ensure avail-
ability of the records. Cloud providers main-
tain this information solely to eliminate pos-
sible security breaches. However, the inabil-
2.1.1 Challenges ity to locate the actual position of the data
As its definition suggests, the public cloud is a major compliancy concern for an orga-
model is actually designed to offer individu- nization while exporting its business control
als and enterprises the opportunity to mini- over to the cloud (Kandukuri, Rakshit, et
mize cost with on-demand infrastructure and al., 2009).
computation support in a shared environ-
ment. However, the shift of control over the 2.2 Digital Forensics
data and application to a different adminis- With the expanding use of technological de-
trative entity raises some security and pri- vices and widespread adoption of commu-
vacy concerns. A cloud provider’s reliable nication networks to share data, it has be-
and powerful infrastructure is often vulner- come necessary to develop technologies that
able to threats like media failures, malicious can store and examine records from differ-
attacks or software bugs. Their ability to ent sources. Digital forensics is a logical
access a user’s data with malicious inten- approach to identifying, collecting, and ex-
tion is another type of privacy issue found amining data while ensuring the integrity
in the public cloud model. (Ren, Wang, & and chain of custody is properly preserved
Wang, 2012) identified data owners’ inabil- and maintained. (Kent, Chevalier, Grance,
ity to monitor and define the access control & Dang, 2006) describe several applications
policy and lack of control over the record rel- of digital forensics based on a variety of
evant to cloud resource consumption as pos- data sources, such as investigating cyber-
sible security challenges. crime and violations of internal policy, recon-
(Bohn et al., 2011) and (Ren et al., 2012) structing security incidents, troubleshooting
considered hardware virtualization as an- operational problems and recovering from
other critical privacy and security issues. system damage.
Hardware virtualization leads to a multi- (Zawoad, Hasan, & Skjellum, 2015) pro-
tenant architecture where the physical in- vide an elaborate description of the steps of
frastructures are shared among multiple con- the digital forensic process based on the for-
sumers with logically separated control over mal definition. Figure-2 demonstrates the


c 2018 ADFSL Page 49
JDFSL V13N3 A Forensic Enabled Data Provenance Model for Public Cloud

digital forensic process flow. The identifica- (Alqahtany, Clarke, Furnell, & Reich, 2015)
tion process consists of two steps where the identified the challenges based on the gen-
incident and most relevant evidence are iden- eral process model of forensics – identifica-
tified along with their possible correlation tion, collection, organization and presenta-
with other incidents in the system. In the tion. Forensic challenges in cloud computing
collection step, all digital evidence related in this paper will be described referencing
to an incident is accumulated from different both of these models.
sources, preserving their integrity. Later, the Any digital investigation must begin with
records are properly organized by extracting the collection of the digital device to preserve
and investigating the data characteristics. In the artifact related to an occurrence. In
the final stage, a well formulated document cloud computing, volatile memory of a vir-
is prepared by the investigator to present to tual machine instance and the unavailabil-
the court. ity of the virtual images demands creation of
advanced technologies to preserve evidence.
Figure 2. Process Flow of Digital Forensic Logs, the valuable container of evidence, are
(Zawoad et al., 2015) maintained by the cloud providers, but in-
tegrity of this data might be affected by un-
lawful actions. A cloud environment also
imposes restrictions over the control of data
and relational information (e.g., location of
data) which reduces the opportunity of ef-
fective data preservation.
2.2.1 Challenges Once the necessary evidence is preserved
Applying the digital forensic process in a and ready for initial analysis to build a sat-
simple computing architecture is complex by isfactory theory, the incident identification
nature in and of itself; however, when a process can begin. (O’shaughnessy & Keane,
cloud architecture is taken into considera- 2013) described the effect of cloud service
tion, the process becomes even more chal- models in this phase. In both Software as
lenging. The distributed nature of cloud a Service (SaaS) and Platform as a Service
infrastructure and some of its features af- (PaaS), the consumer has limited access to
fect the credibility of the collected artifacts the cloud infrastructure, which leaves the
and eventually increase the complexity of the investigator with a limited option to iden-
forensic process in each of its steps. tify any occurrence directly in the server in-
(O’shaughnessy & Keane, 2013) illus- stance. Infrastructure as a Service (IaaS)
trated some of the issues relevant to the provides better access than the other two
cloud forensic process while describing the models as it allows the client to configure
difference from the general approach of dig- their server with necessary logs. The dif-
ital forensics based on the “Integrated Digi- ferent level of access in the different ser-
tal Investigation Process Model” of (Carrier, vice models eventually hinders the process
Spafford, et al., 2003). Carrier illustrated of building a unified model for incident iden-
the relevance between digital and physical tification and documentation.
investigation and described the digital in- Data collection involves accumulating
vestigation model with five phases – preser- data from different sources like storage de-
vation, survey, search and collection, re- vices, client’s browser history, client’s com-
construction and presentation. However, munication with the service provider and ac-

Page 50
c 2018 ADFSL
A Forensic Enabled Data Provenance Model for Public Cloud JDFSL V13N3

cess information of the cloud and other net- about five major cloud actors with their
work level data. Distributed cloud architec- defined responsibilities and offered services.
tures introduce various challenges for the in- Figure 3 illustrates a cloud architecture fo-
vestigator in this phase. They require ex- cusing on the cloud actors, based on the
tensive knowledge of the cloud architecture, high-level architecture shown in (Bohn et al.,
data storage techniques, extraction mecha- 2011). Each actor has sole or shared respon-
nisms for preserving data integrity and main- sibilities to execute different business trans-
taining privacy of cloud consumers. Also, actions or operations in a cloud environment.
shared storage for managing the logging in- In this scenario, cloud providers offer ser-
formation for multiple enterprises raise con- vices which are negotiated by the brokers,
cern for privacy concern if any incident needs connected and transported by the carrier,
thorough investigation and require collect- used by the cloud consumers and evaluated
ing the complete logging information. Data independently for performance and security
collection also might be affected by inte- by auditors.
gration of inefficient provenance techniques,
lack of time synchronization and inappropri- Figure 3. Conceptual Architecture of Cloud
ate maintenance of the chain of custody.
Collected records are further used in a con-
trolled environment to reconstruct an inci-
Cloud
Consumer r-- '
dent to solidify theory building in the re- Cloud Pro";der
Cloud
Broker

construction phase. This requires arranging Cloud Au ditor

records from different sources in a unified


structure, identifying correlations between
different events to successfully recreate the Cloud Carner

incident. Unavailability of proper forensic


tools and utility applications in a cloud envi-
ronment introduces critical challenges in this The contribution of these actors is later
phase. used by (Ruan & Carthy, 2012) when dis-
A successful forensic investigation ends cussing the different types of digital investi-
with the submission of a well-formulated gations. While an investigator is responsible
documentation of an incident in the court for the external investigations, cloud actors
with proper digital and physical artifacts to play a vital role in the internal investigations
defend the report. The distributed nature by taking various measures for security into
of the cloud might require a detailed ex- consideration. Based on the (Cloud Secu-
planation for proper understanding by the rity Alliance, 2011) defined by Cloud Secu-
jury, location of data might introduce dif- rity Alliance, (Ruan & Carthy, 2012) pre-
ficulty to determine the judicial boundary, sented a list of responsibilities of different
and sources and the data collection process cloud actors in digital forensics. The respon-
might be questioned for the lack of credibil- sibilities are identified as required criteria of
ity; hence, all these issues need to be over- cloud forensics.
come during this phase. Ensuring data ownership with steward-
ship, data retention and disposal, data reten-
2.2.2 Requirements
tion and disposal, facility security, clock syn-
(Bohn et al., 2011), in their conceptual refer- chronization, and integrating audit log and
ence model of cloud architecture, mentioned intrusion detection are identified as the sole


c 2018 ADFSL Page 51
JDFSL V13N3 A Forensic Enabled Data Provenance Model for Public Cloud

responsibilities of the cloud provider [23]. preservation of data and evidence integrity.
Data ownership with stewardship helps in
determining ownership of the records and 2.3 Data Provenance
maintaining a chain in custody in the foren- Data provenance has proved its applicabil-
sic investigation. With a proper backup fa- ity and necessity in different application do-
cility and redundant data storage policy, the mains, data processing systems and repre-
provider can ensure successful data reten- sentation models. For e-science, it can be
tion. Strict data disposal operations also used for transformation and easy derivation
need to be integrated to ensure complete re- of data. In warehousing, it can be used to
moval of data from all the sources without analyze and represent data. For Service Ori-
leaving any option to recover them. Backups ented Architectures (SOA), it can be used
are the only possible means of reconstructing to execute complex computations. In doc-
any event or incident. ument management and software develop-
Cloud providers also need to ensure ment tools, it can be used to identify the
there are controlled access and authoriza- lifecycle of a document. As the nature of the
tion checks for any entry to the facility and large range of applications differs, so does
during data relocation to a different facil- their technique of managing the provenance
ity. In digital forensics, identifying events records.
in proper order helps in incident reconstruc- Data provenance was classified in several
tion. Cloud providers need to ensure that all categories based on the techniques used to
the processes are running under a synchro- trace the records and the way these are pre-
nized environment. Integrating different log- served. The techniques for data tracing are
ging functionality to record every single op- classified under two approaches: “lazy” and
eration is another important responsibility “eager” (W. C. Tan, 2004). In the “lazy”
of cloud providers, which undoubtedly plays approach, provenance records are computed
the most vital role in digital forensic. only when they are required, while prove-
(Ruan & Carthy, 2012) also listed some nance records are carried with the data in
shared responsibilities of providers and con- the “eager” approach. Sequence-of-Delta
sumers based on the (Cloud Security Al- and Timestamping are two alternative ap-
liance, 2011). Defining meaningful taxon- proaches of archiving provenance records
omy, depending on data type, origin, legal or (W. C. Tan, 2004). The Sequence-of-Delta
contractual constraints and sensitivity, helps approach stores the reference version and a
in forensic investigations. All the impor- sequence of forward or backward deltas be-
tant assets need to be recorded with owner- tween versions. On the other hand, times-
ship information, and different data-related tamping uses versions and times to identify
operations need to be logged with common data at various steps of its lifetime.
forensic related terms. For the purpose of fa- Provenance can also be discussed from
cilitating regulatory, statutory and contrac- the points of the affect of the source
tual requirements for compliance mapping, data on the existence of data records, or
elements might be assigned with legislative the locations from which those records are
domains and jurisdiction. Other shared re- fetched (Buneman, Khanna, & Wang-Chiew,
sponsibilities of the provider and consumer 2001). These concepts are termed as why-
include authorization, multi-factor authen- provenance and where-provenance, respec-
tication, establishment of policy and proce- tively. From the aspect of data process-
dure as a part of incident management, and ing architecture, another classification was

Page 52
c 2018 ADFSL
A Forensic Enabled Data Provenance Model for Public Cloud JDFSL V13N3

proposed by (Simmhan, Plale, & Gannon, 2.3.1 Challenges


2005). This approach was later adopted
by (Muniswamy-Reddy, Holland, Braun, & Like digital forensics, the dynamic nature
Seltzer, 2006) and elaborated with more cat- of cloud computing and its architecture
egories. They extend the database-oriented introduces several challenges to establish
approach of (Simmhan et al., 2005) to in- a successful provenance technique. Re-
clude a file and file-system oriented ap- searchers have highlighted heterogeneous ar-
proach called Provenance Aware Storage chitecture of cloud infrastructure, granular-
System (PASS). A grid-based solution com- ity , virtualization, availability and data in-
prises the service-oriented architecture in tegrity as the prime challenges while iden-
which software-development tools are part of tifying a better provenance approach in
a scripting-architecture. Environment archi- the cloud (Muniswamy-Reddy, Macko, &
tecture was the fourth category included by Seltzer, 2010; Sakka, Defude, & Tellez, 2010;
(Muniswamy-Reddy et al., 2006). Zhang, Kirchberg, Ko, & Lee, 2011; Katilu,
Franqueira, & Angelopoulou, 2015; Abbadi,
In a domain-specific approach of storing Lyle, et al., 2011).
provenance, data and provenance are loosely (Muniswamy-Reddy et al., 2010) discov-
coupled, as data is managed by the file sys- ered the lack of extensibility of existing
tem and provenance is stored in database provenance systems in the area of cloud com-
systems (Muniswamy-Reddy et al., 2006). puting and also their inability to support
Lineage File System (LinFS) used a third availability and scalability as some of the
party database to store provenance records critical areas. Incompatible availability fea-
while able to track it at file system level au- tures between the provenance system and
tomatically (Sar & Cao, 2005). The obvi- the cloud architecture may affect the prin-
ous issue with file and provenance separa- ciple goal of provenance architecture. In ad-
tion was addressed in Flexible Image Trans- dition, lack of scalability becomes clearly vis-
port System by (Wells, Greisen, & Harten, ible when a database is used to store prove-
1981) where the file header contains the ad- nance in the cloud architecture. This feature
ditional attributes as a provenance record. makes provenance records query-able, but
Another approach for tight coupling be- in a distributed architecture, it introduces a
tween data and provenance was later in- deadlock or scalability bottleneck. Introduc-
troduced in PASS. PASS tracks the prove- tion of a parallel distributed database, a pos-
nance automatically like LinFS and man- sible solution to this problem, is often crit-
ages its database directly into the kernel by icized because of its lack of maintainability
its file system PASTA (Muniswamy-Reddy and cost.
et al., 2006). PASS proved its superiority (Sakka et al., 2010) highlighted challeng-
by ensuring better synchronization between ing areas arise due to the variety in cloud
data and provenance; it also provides se- architecture. Difference in policies applied
curity over the provenance and features to by these architectures to identify objects
query those records. File Provenance Sys- weaken the ability to establish a unique ob-
tem (FiPS) is another provenance system ject identification technique in cloud. Also,
that collects provenance records automati- there is no efficient and unified architec-
cally operating at the system level and below ture for an inter-operable provenance system
the Virtual File System (VFS) layer (Sultana which could manage the heterogeneous poli-
& Bertino, 2013). cies followed by different entity and multiple


c 2018 ADFSL Page 53
JDFSL V13N3 A Forensic Enabled Data Provenance Model for Public Cloud

level of granularity. based on concerning areas such as content,


The virtualization feature of cloud archi- management and usage which are essential
tecture and its nature of fault tolerance also for an effective resource description frame-
imposes some technical issues in provenance work (RDF) model. They presented an elab-
collection. (Zhang et al., 2011) discussed the orated discussion over each criterion. These
necessity of maintaining a record of operat- information include identity of the content,
ing systems, server locations and memory evaluation of the content over the time,
management of virtual and physical envi- records of processes or entities contributed in
ronments to provide more accurate informa- its evaluation including justification and de-
tion to the consumers. They also prioritized sign choices behind the evaluation process.
the maintenance of provenance information From the management perspective of the
about data migration which takes place in provenance records, a well-formatted repre-
case of hardware failure. sentation language and the accessibility of
(Abbadi et al., 2011) presented taxonomy the provenance records are also considered
of cloud infrastructures with a description as important attributes.
of the dynamic nature of this structure and (Moreau et al., 2011) also identified a sim-
identified the challenges in the area of log- ilar set of integral components in their Open
ging and auditing. It is imperative for a Provenance Model (OPM). Basic informa-
system administrator to identify the loca- tion about an object, processes and agents
tion and reason of an error through auditing involved in its evaluation, interdependencies
and logging. But cloud’s multilayer archi- between different entities, and actual role of
tecture makes it difficult to identify the ori- the agents are the most important tokens
gin of data from humongous resources col- of a provenance record. This information
lected from a large number of diversified later needs to be recorded in an easily rep-
sources. (Abbadi et al., 2011) defined the resentable language supported by heteroge-
role of the administrator in this scenario as neous systems and should allow customiza-
identifying the time intervals when physical tion to include additional information. Ad-
layers and virtual layers are used by the vir- ditionally, the recorded information should
tual resources and applications respectively, be easily accessible with a simple query.
and combining these records with other rele- With the necessary attributes mentioned
vant log files. They also spotted some short- above, provenance system also needs to fol-
comings like lack of protection in maintain- low some standards in terms of data mainte-
ing logging and auditing records and lack of nance, dependency on the associated appli-
trustworthiness of the provider maintaining cation, level of granularity and data integrity
the cloud infrastructure. and presentation (Muniswamy-Reddy et al.,
2010; Katilu et al., 2015; Taha, Chaisiri, &
2.3.2 Requirements
Ko, 2015; Y. S. Tan, Ko, & Holmes, 2013).
In this section, requirements of data prove- The data-coupling feature confirms the as-
nance will be discussed from two different as- sociation between the data and provenance
pects: the mandatory properties to fulfill the records. Appropriate data coupling cancels
general criteria of a provenance record and the chances of misleading data that might
the required features for a successful prove- contain new provenance information for old
nance technique in the cloud. data or vice-versa. This coupling must also
(Zhao, Bizer, Gil, Missier, & Sahoo, 2010) include the causal ordering among different
categorized the requirement of provenance entities while recording the provenance in-

Page 54
c 2018 ADFSL
A Forensic Enabled Data Provenance Model for Public Cloud JDFSL V13N3

formation (Muniswamy-Reddy et al., 2010). record (Katilu et al., 2015).


A provenance tracking system should en-
able tracking a particular object from every
host in a distributed environment, which is
3. RELATED WORKS
an essential property to detect an incident Digital provenance, in the cloud environ-
and ensure accountability across a system. ment, has been studied for a long time in
That way, if multiple host contribute in any order to meet the critical requirements im-
operation on an object, provenance records posed by the architecture and to mitigate the
should maintain record for each responsi- challenges revolved around digital forensics.
ble hosts. A provenance system should also Some researchers proposed different prove-
be independent of the application and plat- nance techniques, while others have identi-
form so that no additional configuration is fied efficient approaches for effective forensic
required to track if a new application is in- solutions (Muniswamy-Reddy et al., 2010;
troduced in a system or if the kernel of a Zhang et al., 2011). Several techniques were
system is modified (W. C. Tan, 2004). also proposed where provenance architecture
Provenance system should strictly main- is specially discussed considering the require-
tain the integrity of the records by mak- ments of digital forensic (Li, Chen, Huang,
ing them temper-evident and ensure persis- & Wong, 2014; P. M. Trenwith & Venter,
tence of the record. Data integrity assure 2014; Lu, Lin, Liang, & Shen, 2010).
the accuracy or correctness of the records (Muniswamy-Reddy et al., 2010) extended
over time while temper-evidence confirms re- PASS for cloud architecture which was ini-
liability, authenticity, admissibility, believe- tially used in local file systems and net-
ability and completeness (Taha et al., 2015). work attached storage. They have im-
On the other hand, persistence confirms the plemented three provenance recording pro-
existence of provenance information even tocols using Amazon Web Service (AWS)
when the actual object is erased from the - single cloud storage, cloud storage with
system as long as the object has a descen- cloud database, and cloud storage with cloud
dant. The nature of provenance information database and messaging service based on
also demands confidentiality in every level PASS. Cloud messaging service in the third
of data management e.g., data access, data architecture ensured its superiority over the
storage and data collection. other two by confirming provenance data-
Capturing provenance records from multi- coupling through transaction and providing
ple levels is also considered to be an essen- the fastest service.
tial property of a provenance system. Multi- Cloud providers usually track every oper-
layer granularity provides complete scenario ation executed inside a cloud environment
of any incident occurred with an object in to ensure immediate response to any inci-
different level of a system (Katilu et al., dent. Flogger is such a logging mechanism
2015). An advanced interface to represent which can track file provenance both in vir-
the provenance record along with an ef- tual and physical machines (Ko, Jagadpra-
ficient data retrieval technique is another mana, & Lee, 2011). DataPROVE, a data
measure that defines the success of a prove- provenance technique was proposed based
nance system. This sort of interface with on records generated by Flogger in collab-
efficient query mechanism helps identify- oration with other system monitoring tools
ing any occurrence quickly and understand like User, Process, Event Tracker, Change
patterns and characteristics of provenance Tracker and Network Traffic Tracker (Zhang


c 2018 ADFSL Page 55
JDFSL V13N3 A Forensic Enabled Data Provenance Model for Public Cloud

et al., 2011). It collects provenance infor- ical location of the data. They adopted a
mation in the application layer service like provenance technique in their proposed sys-
PaaS, SaaS and IaaS, rather than just vir- tem where transport layer protocol informa-
tual and physical machine information. It tion was recorded to identify the location
also captures other cloud related essential of data. They also considered the appli-
provenance information like client identifi- cation layer data to answer the additional
cation record and transfer of information queries like who, when, what and how infor-
between different virtual and physical ma- mation which are required for a successful
chines placed in different locations. Addi- forensic investigation. Provenance record is
tionally, DataPROVE also provides efficient proposed to be stored in a centralized log-
data API for indexing and query operations. ging server which eventually can overcome
S2Logger is another approach of maintain- the problem of strong coupling between data
ing secured data provenance through logging and its meta data and can also ensure data
at the block-level and file-level. It is imple- integrity. They proposed another model for
mented based on Flogger (Suen, Ko, Tan, provenance with features like digital object
Jagadpramana, & Lee, 2013). In this mech- tracking and location identification at any
anism, (Suen et al., 2013) addressed features point of the lifetime of that particular digi-
like capture mapping between virtual and tal object (P. Trenwith & Venter, 2015). In
physical resources, proper maintenance of this model, they introduced the concept of a
the provenance chain and data integrity and wrapper object which wrapped a file along
confidentiality. S2Logger also introduced an with its provenance records embedded to-
end-to-end data tracing mechanism that is gether and the location of the wrapper ob-
capable of capturing detail provenance infor- ject would be maintained in a separate cen-
mation from all nodes connected in the cloud tralized server.
environment.
(Lu et al., 2010) have designed a prove-
nance mechanism enabling the forensic fea-
4.
FORENSIC
tures in the cloud environment. Provenance ENABLED
was designed based on a bilinear pairing
technique considering some critical aspects PROVENANCE MODEL
of cloud like data confidentiality, anony- 4.1 Additional Design
mous access of the user, and dispute reso-
lution. This mechanism introduced compu- Consideration
tation and communication overhead at the Designing an efficient and forensic enabled
data owner’s end. This issue was later iden- provenance mechanism in a cloud environ-
tified by (Li et al., 2014), and they have ment requires that some other areas be con-
introduced a broadcast encryption method sidered which vastly contribute to the suc-
to overcome this. They have also ensured cess of the process. Identifying the possi-
anonymity of the user by implementing an ble sources of provenance records, deciding
attribute-based signature (ABS) scheme for on a unified model to store those records,
access control and privacy by designing an data storage with required features for ef-
anonymous key-issuing protocol. ficient data management, and ensuring se-
(P. M. Trenwith & Venter, 2014) discussed curity and integrity of the data for forensic
another source of log information which may operations are important factors that must
allow the investigator to answer to the phys- be considered for a provenance mechanism.

Page 56
c 2018 ADFSL
A Forensic Enabled Data Provenance Model for Public Cloud JDFSL V13N3

General cloud architecture can be divided The format and properties for logging
into several layers – physical resource layer, provenance data collected from different
resource abstraction layer and service layer sources is important in a provenance collec-
as shown in Figure 4. (Ruan & Carthy, tion system. (Marty, 2011) has identified
2012) identified the sources of forensic ar- some important properties of provenance
tifacts from each of the layers. Among data like timestamps, application, user, ses-
these, it is necessary to identify the actual sion id, category, and reason and severity
sources which provide necessary provenance of the event. Applications running in the
related information and help in forensic anal- service layer mostly contribute to this type
ysis. Hard disks, network logs and access of information which can be collected from
records are important sources from the phys- different application and event logs. A dis-
ical layer. Event logs and virtual resources tributed file system, like Google File System
are necessary from the abstraction layer, and (GFS), maintains a separate set of informa-
access logs, events logs, rigid information tion vital for provenance and forensics. The
about the virtual operating system, and ap- GFS master usually keeps information file
plication logs are vital sources from the ser- and chunk (part of a file) namespace, map-
vice layer. (Imran & Hlavacs, 2013) identi- ping from file to chunks, and location of the
fied provenance information in different sub- replica of the chunks (Ghemawat, Gobioff, &
layers of the service layer and developed an Leung, 2003). The Hadoop Distributed File
integrated provenance data collection pro- System (HDFS) also maintains a transaction
cess. In our conceptual model approach of log, called EditLog, in its NameNode which
collecting provenance data, we will also con- contains every modification recorded in file
sider the featured criteria used in these pro- system metadata (Borthakur et al., 2008).
posed systems which can be helpful for the Google cloud maintains region and zone re-
forensic process. lated information while creating a virtual
machine instance recording which has prove-
nance data along with other information
Figure 4. Cloud System Architecture that may guide an investigator in forensic
([(Bohn et al., 2011)]) analysis. The heterogeneous characteristics
of these records make the process of choos-
ing a particular format very hard. Marty has
Service Layer
suggested a syntax of logging the informa-
Saas tion as “key-value” pair, which is considered
as an ideal syntax of logging information in
PaaS
our design approach. We also include a uni-
IaaS
fied naming approach of the “key” to ensure
synchronicity of the same properties coming
from different from sources.
Resource Abstraction & Control Layer
Provenance data records must be eas-
ily searchable; therefore, a data repository
Physical Resource Lay er
that can provide the best performance and
Hardware
an efficient query interface must be chosen.
Facility (Muniswamy-Reddy, 2006) explored differ-
ent database architectures to choose the best
data repository. They considered aspects


c 2018 ADFSL Page 57
JDFSL V13N3 A Forensic Enabled Data Provenance Model for Public Cloud

like the format of maintaining dependency tion will provide a description of the pro-
of the files and different approaches of stor- posed model and surveys its requirements
ing the annotation metadata. They com- of provenance, forensic analysis, and neces-
pared Berkley DB as a schemaless database, sary design considerations. The concept of
MySQL as a RDBMS database, XMLDB as the general actors of cloud operations and
XML database and OpenLDAP as a rep- forensic analysis have been utilized in this
resentative of an LDAP architecture and model; however, the contribution of each of
found that Berkley DB outperformed other the cloud actors and access mechanisms to
database architectures in terms of stan- the provenance records for the investigator
dard database related operations in this sce- and court authority have been redefined. It
nario. While implementing PASS in cloud, is also necessary to introduce a unified log-
(Muniswamy-Reddy et al., 2010) also used ging mechanism in different layers of a cloud
SimpleDB and Amazon S3 to store prove- environment to leverage data manipulation
nance objects. while recording provenance information in a
Provenance records logged in different lay- persistent database.
ers are basically maintained by different ac-
tors of the cloud. Cloud consumers are usu- Figure 5. Forensic Enabled Cloud Prove-
ally responsible for the records maintenance nance Model
service layer while providers manage the log-
ging activities of the abstraction and physi-
cal layers. Provenance records in these lay-
ers may often be affected by the collusion
between the consumer and provider which
eventually can mislead the forensic investi-
gator. The investigator can also play the role
of an accomplice with either of these parties,
which ultimately diminishes the whole ap-
proach of data provenance and forensic anal-
ysis. To ensure integrity of the provenance In a cloud model, consumers and providers
data and trustworthiness of the collection are the two main contributors to the cloud
system, it is necessary to include a verifica- operation, while a cloud auditor basically
tion process which can be used to validate performs analysis on the cloud services and
the provenance information. (Zawoad et al., provides feedback. In the proposed model,
2015) proposed a Proof Publisher Method an additional responsibility for the cloud au-
(PPM) in their Open Cloud Forensic (OCF) ditors is included. Usually cloud services like
which can be used by the court authority to SaaS and PaaS are designed to provide the
verify the forensic reports provided by the consumer with less control over the system
investigators. They also proposed a reliable while IaaS allows configuring the necessary
way of collecting the evidence through se- applications. In these scenarios, a cloud au-
cured read-only APIs accessible only by the ditor’s additional responsibility will be moni-
investigator and court authority. toring whether the services used by the con-
sumers are capable of logging every opera-
4.2 Proposed Model tion or whether a provider enables the log-
Figure 5 shows the proposed Forensic En- ging features for each application where the
abled Cloud Provenance Model. This sec- consumer has limited access. The providers

Page 58
c 2018 ADFSL
A Forensic Enabled Data Provenance Model for Public Cloud JDFSL V13N3

additional responsibility will be introducing time to capture the sequence of events prop-
policies in SLA which will clearly instruct erly. To maintain proper chronology of the
the clients about installing necessary audit- data from different systems, each transaction
ing features. The provider should also re- will be saved with timestamp information for
design the access policies so that the client both the source and data storage system.
can have enough options for customization. This will eventually help in identifying the
The provider should also be capable of mon- unsynchronized nodes or sources.
itoring every operation performed by the Trustworthy data storage policy is another
client. In an ideal scenario, the provider important concern. It is necessary to en-
should install firewalls and other applica- sure integrity of the data and employ tech-
tions to detect intrusions or any form of ma- niques to easily identify any forged data and
licious activity. possible miscreants. To ensure this, the
Database architecture is an important as- database should be designed for capturing
pect of designing an ideal provenance model. necessary audit information. Audit informa-
It is required not only to accommodate a tion will include the application or user iden-
variety of information or manage large vol- tity which eventually stores or update any
umes of data, but also to ensure availabil- information. For all of the data that will be
ity and scalability. Considering these facts, saved an additional attribute will be added
the proposed system is a schema-less dis- as provenance. This attribute will contain
tributed database system to store the prove- the hash value of the data item. This hashed
nance record coming in heterogeneous for- data will be used later for verification of the
mat from different sources. The distributed information.
nature of the database architecture will en- If any issue is reported by any of the other
sure the availability and scalability features. three actors of cloud services, the process of
Data will be stored in a key-value format forensic analysis starts. In this case, an in-
where the key name will maintain a con- vestigator will conduct the preliminary in-
sistent naming convention to facilitate the vestigation by collecting provenance records
query operation maintained through a uni- from the provenance storage and finally pre-
fied data modeling policy. Each transaction pare a report eligible for submission to the
will be logged separately with the reference court authority. The court authority will
to the dependent object. Keeping a single verify the report and provide the verdict. To
instance of the provenance record requires facilitate this process, query and verification
updating the instance very frequently and interfaces for the investigator and court au-
hence reduces the expected performance of thority have been introduced in the proposed
the system. In the case of recording prove- system. These services will be provided by
nance for a file, it is recommended that a the service providers.
copy of the content that will be logged in
the repository be maintained. Provenance 4.3 Discussion
record of a data should also maintain rela- This section briefly demonstrates how the
tionship information with the process or en- proposed model of provenance collection
vironment variables that effected it at any overcomes the challenges already discussed
point of its lifetime. in Section 2 and how efficiently this model
A timestamp with every transaction is a can facilitate the process of forensic analy-
vital field. Loggers in different layers will re- sis. In table-1, we also present a compara-
quire maintaining strict synchronization of tive analysis with the existing approaches in


c 2018 ADFSL Page 59
JDFSL V13N3 A Forensic Enabled Data Provenance Model for Public Cloud

terms of the challenges of provenance man- ity make the provenance collection process
agement for forensic analysis in public cloud a highly challenging task. To ensure effi-
addressed by those models. cient forensic analysis, a provenance collec-
One of the primary concerns about cloud tion technique can compromise none of these
computing is the shift of control of data or concerns. Hence, it is recommended to en-
files to a different authority. Data might be sure a better data management policy. The
affected by malicious attacks, software bugs proposed model suggests a unified naming
or system failure. The distributed nature of convention for “keys” coming from different
cloud architecture can ensure availability of sources. A well-chosen naming conversion
data in these scenarios. Any unlawful access helps to identify the exact information in
from a provider’s end can be easily identified search and can also identify relations in log
through the provenance information, as ev- information coming from different sources.
ery access to any file or data is recorded by Regeneration of data or an incident from
the provenance system. the lineage information is another focus
Allowing multi-tenant facility through vir- of a data provenance system. Provenance
tualization and identifying the location is the records maintained with the actual content
most notable challenge in a public cloud en- can ease this process as an investigator can
vironment. Collecting snapshots of virtual easily extract any verified content from the
machine logs with additional information to provenance storage and apply the opera-
identify the virtual machine instance can tions which occur in the other version of the
solve this problem. File system metadata data to check if these operations generate
contains details about the file status and lo- the same result. This forensic enabled data
cation. Integrating necessary measures al- provenance model also considers the storing
ready discussed in 4.1 can lead to an efficient of the data along with its metadata in the
solution to these issues. Maintaining prove- provenance log.
nance records with location information will This proposed provenance model collects
eventually help investigators identifying the information from different layers of a cloud
location of an object and collect necessary architecture. It also considers necessary
artifacts accordingly. measures to include location information
Forensic investigation is often hampered and other attributes required to identify the
because of the lack of synchronization be- related entities or actions of data. This large
tween stored records and variations of volume of information opens enough oppor-
records coming from different sources. In the tunity for proper analysis.
proposed model, a unified model to identify A loose coupling between data and prove-
attributes of the entity and relevant oper- nance records is maintained as prove-
ations is introduced. This will facilitate the nance information is stored separately in
process of analysis as investigators can easily a database. Separation between these two
identify and differentiate between entities of records ensure the existence of provenance
a particular piece of information and their information even if the actual data is miss-
effect on the provenance record or forensic ing. By nature, provenance information is
analysis. immutable and persistent. If any provenance
Managing the large collection of prove- is deleted from the database intentionally, a
nance data is a difficult job. The large database audit can provide necessary hints
volume of information, variety in data for- to identify the miscreants.
mats and increase in volume in high veloc- The proposed model also prioritizes the

Page 60
c 2018 ADFSL
A Forensic Enabled Data Provenance Model for Public Cloud JDFSL V13N3

Proposed Approaches
(Muniswamy- (Zhang (Li et (P. M. Tren- (Lu Our
Reddy et al., et al., al., with & et al., Ap-
2010) 2011) 2014) Venter, 2010) proach
2014)
Virtualization 3 3
Public
Security & 3 3 3 3 3
Cloud
Privacy
Data Loca- 3 3
tion
Data Preser- 3 3 3 3
vation
Digital
Identification 3 3 3 3 3
Forensic
Collection 3 3 3 3
Scenario Re- 3 3 3 3 3
construction
Presentation 3
Data Cou- 3 3 3
pling
Cross-Host 3
Provenance Tracking
Application 3 3
Independence
Multilayer 3 3 3
Granularity
Data In- 3 3 3 3 3
tegrity
Confidentiality 3 3 3 3
Query-able 3 3 3
Persistence 3 3
Causal Or- 3 3 3
dering
Table 1. Comparative analysis of the proposed approaches

necessity of a query and verification inter- chronological order, providing information


face for the investigator and court author- about a file with location and list of pro-
ity. A well-designed interface with features cesses that contributed in evolution of the
of executing customize requests to extract file can help an investigator define the le-
required information from the provenance gal boundary while requesting for actual ar-
database can prove the efficiency of a prove- tifacts from the providers without interven-
nance model. Effective data visualization ing other users’ information and identifying
is another important aspect of these inter- the actual lineage of the file. A step by step
faces. A detailed overview of an event in verification can also help a jury or court au-


c 2018 ADFSL Page 61
JDFSL V13N3 A Forensic Enabled Data Provenance Model for Public Cloud

thority to detect the possible symptoms of Borthakur, D., et al. (2008). Hdfs
collusion between the consumer and cloud architecture guide. Hadoop Apache
service provider, consumer and investigator, Project, 53 .
or provider and investigator. Buneman, P., Khanna, S., & Wang-Chiew,
T. (2001). Why and where: A
characterization of data provenance.
5. CONCLUSION In International conference on
database theory (pp. 316–330).
Maintaining the provenance information of
Carrier, B., Spafford, E. H., et al. (2003).
data is as important as the data itself. In
Getting physical with the digital
modern day computing technology, it is an
investigation process. International
integral part of data to ensure its authen-
Journal of digital evidence, 2 (2),
ticity and integrity. In this paper, we have
1–20.
identified the challenges of cloud architec-
Chung, M., & Hermans, J. (2010). From
ture, discussed how this affects the existing
hype to future: Kpmg’s 2010 cloud
forensic analysis and provenance techniques,
computing survey. KPMG, 8–28.
and discussed a model for efficient prove-
Cloud Security Alliance. (2011, September).
nance collection and forensic analysis. We
Cloud controls matrix v1.2 - cloud
have also briefly highlighted the necessity of
controls matrix working group.
provenance data visualization and explained
(https://cloudsecurityalliance.org/
why or how it can be helpful for modern day
download/
forensic analysis.
cloud-controls-matrix-v1-2/)
Ghemawat, S., Gobioff, H., & Leung, S.-T.
REFERENCES (2003). The google file system
(Vol. 37) (No. 5). ACM.
Abbadi, I. M., Lyle, J., et al. (2011). Hashizume, K., Rosado, D. G.,
Challenges for provenance in cloud Fernández-Medina, E., & Fernandez,
computing. In Tapp. E. B. (2013). An analysis of security
Alqahtany, S., Clarke, N., Furnell, S., & issues for cloud computing. Journal of
Reich, C. (2015). Cloud forensics: a internet services and applications,
review of challenges, solutions and 4 (1), 5.
open problems. In Cloud computing Imran, M., & Hlavacs, H. (2013). Layering
(iccc), 2015 international conference of the provenance data for cloud
on (pp. 1–9). computing. In International
Amazon Web Services. (2008, September). conference on grid and pervasive
Building greptheweb in the cloud, part computing (pp. 48–58).
1: Cloud architectures. Jansen, W., & Grance, T. (2011). Sp
(http://developer.amazonwebservices.com/ 800-144. guidelines on security and
connect/ entry.jspa?externalID=1632 privacy in public cloud computing.
[September 30 2016]) Kandukuri, B. R., Rakshit, A., et al.
Bohn, R. B., Messina, J., Liu, F., Tong, J., (2009). Cloud security issues. In
& Mao, J. (2011). Nist cloud Services computing, 2009. scc’09. ieee
computing reference architecture. In international conference on (pp.
Services (services), 2011 ieee world 517–520).
congress on (pp. 594–596). Katilu, V. M., Franqueira, V. N., &

Page 62
c 2018 ADFSL
A Forensic Enabled Data Provenance Model for Public Cloud JDFSL V13N3

Angelopoulou, O. (2015). Challenges J., Gil, Y., Groth, P., . . . others


of data provenance for cloud forensic (2011). The open provenance model
investigations. In Availability, core specification (v1. 1). Future
reliability and security (ares), 2015 generation computer systems, 27 (6),
10th international conference on (pp. 743–756.
312–317). Muniswamy-Reddy, K.-K. (2006). Deciding
Kent, K., Chevalier, S., Grance, T., & how to store provenance.
Dang, H. (2006). Guide to integrating Muniswamy-Reddy, K.-K., Holland, D. A.,
forensic techniques into incident Braun, U., & Seltzer, M. I. (2006).
response. NIST Special Publication, Provenance-aware storage systems. In
10 , 800–86. Usenix annual technical conference,
Ko, R. K., Jagadpramana, P., & Lee, B. S. general track (pp. 43–56).
(2011). Flogger: A file-centric logger Muniswamy-Reddy, K.-K., Macko, P., &
for monitoring file access and Seltzer, M. I. (2010). Provenance for
transfers within cloud computing the cloud. In Fast (Vol. 10, pp.
environments. In Trust, security and 15–14).
privacy in computing and O’shaughnessy, S., & Keane, A. (2013).
communications (trustcom), 2011 ieee Impact of cloud computing on digital
10th international conference on (pp. forensic investigations. In Ifip
765–771). international conference on digital
Li, J., Chen, X., Huang, Q., & Wong, D. S. forensics (pp. 291–303).
(2014). Digital provenance: Enabling Ren, K., Wang, C., & Wang, Q. (2012).
secure data forensics in cloud Security challenges for the public
computing. Future Generation cloud. IEEE Internet Computing,
Computer Systems, 37 , 259–266. 16 (1), 69–73.
Lu, R., Lin, X., Liang, X., & Shen, X. S. Ruan, K., & Carthy, J. (2012). Cloud
(2010). Secure provenance: the computing reference architecture and
essential of bread and butter of data its forensic implications: A
forensics in cloud computing. In preliminary analysis. In International
Proceedings of the 5th acm symposium conference on digital forensics and
on information, computer and cyber crime (pp. 1–21).
communications security (pp. Sakka, M. A., Defude, B., & Tellez, J.
282–292). (2010). Document provenance in the
Market Research Media. (2016, cloud: constraints and challenges. In
September). Global cloud computing Meeting of the european network of
market forecast 2015-2020. universities and companies in
(https://www.marketresearchmedia.com/ information and communication
?p=839) engineering (pp. 107–117).
Marty, R. (2011). Cloud application Sar, C., & Cao, P. (2005). Lineage file
logging for forensics. In Proceedings of system. Online at
the 2011 acm symposium on applied http://crypto.stanford.edu/ cao/
computing (pp. 178–184). lineage. html , 411–414.
Mell, P., Grance, T., et al. (2011). The nist Simmhan, Y. L., Plale, B., & Gannon, D.
definition of cloud computing. (2005). A survey of data provenance
Moreau, L., Clifford, B., Freire, J., Futrelle, in e-science. ACM Sigmod Record ,


c 2018 ADFSL Page 63
JDFSL V13N3 A Forensic Enabled Data Provenance Model for Public Cloud

34 (3), 31–36. Principles and paradigms, 1–41.


Suen, C. H., Ko, R. K., Tan, Y. S., Wells, D., Greisen, E., & Harten, R. (1981).
Jagadpramana, P., & Lee, B. S. Fits-a flexible image transport
(2013). S2logger: End-to-end data system. Astronomy and Astrophysics
tracking mechanism for cloud data Supplement Series, 44 , 363.
provenance. In Trust, security and Zawoad, S., Hasan, R., & Skjellum, A.
privacy in computing and (2015). Ocf: an open cloud forensics
communications (trustcom), 2013 model for reliable digital forensics. In
12th ieee international conference on Cloud computing (cloud), 2015 ieee
(pp. 594–602). 8th international conference on (pp.
Sultana, S., & Bertino, E. (2013). A file 437–444).
provenance system. In Proceedings of Zhang, O. Q., Kirchberg, M., Ko, R. K., &
the third acm conference on data and Lee, B. S. (2011). How to track your
application security and privacy (pp. data: The case for cloud computing
153–156). provenance. In Cloud computing
Taha, M. M. B., Chaisiri, S., & Ko, R. K. technology and science (cloudcom),
(2015). Trusted tamper-evident data 2011 ieee third international
provenance. In conference on (pp. 446–453).
Trustcom/bigdatase/ispa, 2015 ieee Zhao, J., Bizer, C., Gil, Y., Missier, P., &
(Vol. 1, pp. 646–653). Sahoo, S. (2010). Provenance
Tan, W. C. (2004). Research problems in requirements for the next version of
data provenance. IEEE Data Eng. rdf. In W3c workshop rdf next steps.
Bull., 27 (4), 45–52.
Tan, Y. S., Ko, R. K., & Holmes, G.
(2013). Security and data
accountability in distributed systems:
A provenance survey. In High
performance computing and
communications & 2013 ieee
international conference on embedded
and ubiquitous computing (hpcc euc),
2013 ieee 10th international
conference on (pp. 1571–1578).
Trenwith, P., & Venter, H. (2015). Locating
and tracking digital objects in the
cloud. In Ifip international conference
on digital forensics (pp. 287–301).
Trenwith, P. M., & Venter, H. S. (2014). A
digital forensic model for providing
better data provenance in the cloud.
In Information security for south
africa (issa), 2014 (pp. 1–6).
Voorsluys, W., Broberg, J., & Buyya, R.
(2011). Introduction to cloud
computing. Cloud computing:

Page 64
c 2018 ADFSL
© 2018. This work is published under
https://creativecommons.org/licenses/by-nc/4.0/(the “License”). Notwithstanding
the ProQuest Terms and Conditions, you may use this content in accordance
with the terms of the License.

You might also like