A FRAMEWORK FOR MALICIOUS AGENT DETECTION IN CLOUD COMPUTING ENVIRONMENT

Published 29 FEB 2020 •  vol 135  • 


Authors:

 

Ishu Gupta, Department of Computer Applications, National Institute of Technology, Kurukshetra, Haryana, India
Ashutosh Kumar Singh, Department of Computer Applications, National Institute of Technology, Kurukshetra, Haryana, India

Abstract:

 

Data security is one of the major challenges encountered by cloud computing. The cloud data is shared among multiple entities which can be intentionally or unintentionally revealed out by any agent to the unauthorized recipient. Therefore, it has become a necessity to detect the malicious agent for protecting shared information. In this regard, we present a framework based on the probabilistic estimation that identifies the malicious agent for minimizing the likelihood of further leakage. In the proposed model, the data is distributed among multiple agents and the allocation is performed using 2-level trees. The parameters based on probability theory are computed for malicious agent identification when the data is leaked by any agent. The experimental results achieved average probability, average success rate, and detection rate up to 1, 0.98, 0.76 respectively for the various number of agents.

Keywords:

 

Data Leakage, Information Security, Leaker Detection, Threat Model, Probabilistic Approach

References:

 

[1] Buyya, R., Broberg, J., and Goscinski, A., "Cloud Computing: Principles and Paradigms", vol. 87, John Wiley & Sons, 2010.
[2] Gupta, I. and Singh, A. K., "An Integrated Approach for Data Leaker Detection in Cloud Environment", Journal of Information Science and Engineering, 2019.
[3] Gupta, I. and Singh, A. K., "A Confidentiality Preserving Data Leaker Detection Model for Secure Sharing of Cloud Data using Integrated Techniques", 7th International Conference on Smart Computing and Communication Systems (ICSCC), IEEE, Sarawak, Malaysia, pp. 1-5, 2019.
[4] Forbes, "State of Enterprise Cloud Computing 2018", [online] Available: https://www.forbes.com/sites/louiscolumbus/2018/08/30/state-of-enterprise-cloud-computing-2018/#2e5312c2265e, August, 2018.
[5] Cheng, L., Liu, F., and Yao, D., "Enterprise Data Breach: Causes, Challenges, Prevention, and Future Directions", WIREs Data Mining and Knowledge Discovery, vol. 7, pp. 1-14, September/October 2017.
[6] Shu, X., Yao, D., and Bertino, E., "Privacy-Preserving Detection of Sensitive Data Exposure", IEEE Transactions on Information Forensics and Security, vol. 10, no. 5, pp. 1092-1103, May 2015.
[7] Shu, X., Zhang, J., Yao, D., and Feng, W.-C., "Fast Detection of Transformed Data Leaks", IEEE Transactions on Information Forensics and Security, vol. 11, no. 3, pp. 528-542, March 2016.
[8] Kaur, K., Gupta, I., and Singh, A. K., "A Comparative Study of the Approach Provided for Preventing the Data Leakage", International Journal of Network Security & its Applications (IJNSA), vol. 9, no. 5, pp. 21-33, September 2017.
[9] Breach Level Index, "A Global Database of Public Data Breaches", [online] Available: https://www.gemalto.com/press/pages/data-breaches-compromised-4-5-billion-records-in-first-half-of-2018.aspx, October, 2018.
[10] Shehab, M., Bertino, E., and Ghafoor, A., "Watermarking Relational Databases using Optimization-Based Techniques", IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 1, pp. 116-129, 2008.
[11] Backes, M., Grimm, N., and Kate, A., "Data Lineage in Malicious Environments", IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp. 178-191, March/April 2016.
[12] Guo, Y., Au, O. C., Wang, R., Fang, L., and Cao, X., "Halftone Image Watermarking by Content Aware Double-Sided Embedding Error Diffusion", IEEE Transactions on Image Processing, vol. 27, no. 7, pp. 3387-3402, 2018.
[13] Mareen, H., Praeter, J. De, Wallendael, G. Van, and Lambert, P., "A Novel Video Watermarking Approach Based on Implicit Distortions", IEEE Transactions on Consumer Electronics, vol. 64, no. 3, pp. 250-258, August 2018.
[14] Liu, Z., Huang, Y., and Huang, J., "Patchwork-Based Audio Watermarking Robust Against De-synchronization and Recapturing Attacks", IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1171-1180, May 2019.
[15] Hu, D., Zhao, D., and Zheng, S., "A New Robust Approach for Reversible Database Watermarking with Distortion Control", IEEE Transactions on Knowledge and Data Engineering, vol. 31, no. 6, pp. 1024-1037, June 2019.
[16] Papadimitriou, P. and Garcia-Molina, H., "Data Leakage Detection", IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 1, pp. 51-63, January 2011.
[17] Gupta, I. and Singh, A. K., "A Probability Based Model for Data Leakage Detection using Bigraph", 7th International Conference on Communication and Network Security (ICCNS-2017), ACM, Tokyo, Japan, 2017.
[18] Gupta, I. and Singh, A. K., "A Probabilistic Approach for Guilty Agent Detection using Bigraph after Distribution of Sample Data", Procedia Computer Science, vol. 125, pp. 662-668, 2018.
[19] Gupta, I., and Singh, A. K., "Dynamic Threshold based Information Leaker Identification Scheme", Information Processing Letters, vol. 147, pp. 69-73, 2019.
[20] Gupta, I., Singh, N., and Singh, A. K., "Layer-based Privacy and Security Architecture for Cloud Data Sharing", Journal of Communication Software and Systems (JCOMSS), vol. 15, no. 2, pp. 173-185, 2019.

Citations:

 

APA:
Gupta, I., & Singh, A. K. (2020). A Framework for Malicious Agent Detection in Cloud Computing Environment. International Journal of Advanced Science and Technology (IJAST), ISSN: 2005-4238(Print); 2207-6360 (Online), NADIA, 135, 49-62. doi: 10.33832/ijast.2020.135.05.

MLA:
Gupta, Ishu, et al “A Framework for Malicious Agent Detection in Cloud Computing Environment.” International Journal of Advanced Science and Technology, ISSN: 2005-4238(Print); 2207-6360 (Online), NADIA, vol. 135, 2020, pp. 49-62. IJAST, http://article.nadiapub.com/IJAST/Vol135/5.html.

IEEE:
[1] I. Gupta, and A. K. Singh, "A Framework for Malicious Agent Detection in Cloud Computing Environment." International Journal of Advanced Science and Technology (IJAST), ISSN: 2005-4238(Print); 2207-6360 (Online), NADIA, vol. 135, pp. 49-62, Feb 2020.