Cloud data safe auditing method based on multi-Agent

A data and database technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of unable to send logs in a centralized manner, large bandwidth, denial of service attacks, etc., and achieve the effect of supporting data privacy protection and flexible event analysis

Inactive Publication Date: 2013-05-29
PLA UNIV OF SCI & TECH
View PDF1 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2) The audit log system designed according to the PEO and VCR protocols does not fully support the security log audit system of cloud storage, mainly in the following aspects: the logs of different formats from various systems or applications cannot be centrally sent to a remote log server for storage; only A simple log encryption method is used to protect the original log, and the message authentication code (MAC) mechanism is not used to verify the authority of the auditor to request access to the log; when the log generated by the system is sent to the log server in real time, the bandwidth paid is relatively large, and it is easy for attacks After obtaining the system authority, the attacker launches a denial of service attack (Dos) on the log server, thereby modifying or even deleting the log; when viewing the log, as long as the decryption key of a log record is obtained, all subsequent log records can be viewed
[0006] 3) The scalability of the current audit system is not good enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data safe auditing method based on multi-Agent
  • Cloud data safe auditing method based on multi-Agent
  • Cloud data safe auditing method based on multi-Agent

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention is based on a multi-Agent dynamically scalable cloud data security audit method, which mainly completes data protection verification and related audit work, including functions such as remote data verification, data privacy protection, log audit and data batch audit.

[0042] Such as figure 1As shown, the audit system environment in which the audit method of the present invention operates includes three parts: a host, a GUI client and a central management server. The host part can be a Linux Agent system or a Windows Agent system, which can be a physical host or a virtual machine. Agent event collection subsystems and Agent event analysis subsystems are deployed on each host, and these subsystems run auditing as background processes in the monitored system The main purpose of information collection and analysis is to collect security-related event information on the host, and transmit the data analysis and processing to the central manager server. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamically extensible cloud auditing method based on multi-Agent. The method includes steps that every host loads and operates an Agent event collection subsystem and an Agent event analysis subsystem; the collection subsystem and the analysis subsystem serve as background processes to collect and analyze auditing information in a monitored cloud auditing system, and transmit data to a central administrator server; a GUI (Graphical User Interface)client-side is used for checking status of every host; the central administrator server and a data base are used for receiving data and reports from the hosts, controlling communication information of the whole cloud auditing system, and analyzing and store received safe auditing events; a Windows Agent subsystem bottom calls application programming interface of the system to access to contents of Windows events, then the contents are normalized to system log events to be sent to the Agent event analysis subsystem; and an Linux Agent system bottom uses an event collection module to collect data.

Description

technical field [0001] The invention relates to the field of cloud storage data security in computer networks, in particular to a multi-Agent-based cloud data security audit method. Background technique [0002] Security audit is to use data mining and data warehouse technology to realize terminal-to-terminal monitoring and management in different network environments. When necessary, it can issue warnings to administrators or automatically take troubleshooting measures through various channels, and can analyze historical data. , processing and tracking. [0003] With the development of information technology and the rise of cloud storage technology, the audit log system is very important for checking, understanding or evaluating the degree of attack on cloud storage system. However, the current auditing system has the following problems: [0004] 1) At present, almost all audit systems simply write sensitive log information into log files in text form, or send logs to the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04L12/26
Inventor 文艾袁晓萍孙志丹刘鹏邹哲峰
Owner PLA UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products