Trustworthy Logging for Virtual Organisations

<p>In order to securely monitor user or system activities and detect malicious attempts across a distributed system, provision of trustworthy audit and logging services is necessary. Existing audit-based monitoring services, however, are often prone to compromise due to the lack of guarantees...

Volledige beschrijving

Bibliografische gegevens
Hoofdauteur: Huh, J
Formaat: Thesis
Gepubliceerd in: 2010
_version_ 1826312245558116352
author Huh, J
author_facet Huh, J
author_sort Huh, J
collection OXFORD
description <p>In order to securely monitor user or system activities and detect malicious attempts across a distributed system, provision of trustworthy audit and logging services is necessary. Existing audit-based monitoring services, however, are often prone to compromise due to the lack of guarantees of log integrity, confidentiality, and availability. This thesis presents several use cases where these properties are essential, conducts a threat analysis on these use cases, and identifies key security requirements from the threats and their risks. Then, this thesis proposes a log generation and reconciliation infrastructure in which the requirements are satisfied and threats are mitigated.</p> <p>Applications usually expose a weak link in the way logs are generated and protected. In the proposed logging system, important application events are <em>involuntarily</em> recorded through a trustworthy logging component operating inside a privileged virtual machine. Virtual machine isolation makes it infeasible for applications to bypass the logging component. Trusted Computing attestation allows users to verify the logging properties of remote systems, and ensure that the collected logs are trustworthy.</p> <p>Despite ongoing research in the area of usable security for distributed systems, there remains a `trust gap' between the users' requirements and current technological capabilities. To bridge this `trust gap', this thesis also proposes two different types of distributed systems, one applicable for a computational system and the other for a distributed data system. Central to these systems is the <em>configuration resolver</em> which maintains a list of trustworthy participants available in the virtual organisation. Users submit their jobs to the configuration resolver, knowing that their jobs will be dispatched to trustworthy participants and executed in protected environments. As a form of evaluation, this thesis suggests how these ideas could be integrated with existing systems, and highlights the potential security enhancements.</p>
first_indexed 2024-03-07T08:24:42Z
format Thesis
id oxford-uuid:7266bcda-a82b-4b4f-9ec5-d46f8f3573a0
institution University of Oxford
last_indexed 2024-03-07T08:24:42Z
publishDate 2010
record_format dspace
spelling oxford-uuid:7266bcda-a82b-4b4f-9ec5-d46f8f3573a02024-02-12T11:43:22ZTrustworthy Logging for Virtual OrganisationsThesishttp://purl.org/coar/resource_type/c_db06uuid:7266bcda-a82b-4b4f-9ec5-d46f8f3573a0Department of Computer Science2010Huh, J<p>In order to securely monitor user or system activities and detect malicious attempts across a distributed system, provision of trustworthy audit and logging services is necessary. Existing audit-based monitoring services, however, are often prone to compromise due to the lack of guarantees of log integrity, confidentiality, and availability. This thesis presents several use cases where these properties are essential, conducts a threat analysis on these use cases, and identifies key security requirements from the threats and their risks. Then, this thesis proposes a log generation and reconciliation infrastructure in which the requirements are satisfied and threats are mitigated.</p> <p>Applications usually expose a weak link in the way logs are generated and protected. In the proposed logging system, important application events are <em>involuntarily</em> recorded through a trustworthy logging component operating inside a privileged virtual machine. Virtual machine isolation makes it infeasible for applications to bypass the logging component. Trusted Computing attestation allows users to verify the logging properties of remote systems, and ensure that the collected logs are trustworthy.</p> <p>Despite ongoing research in the area of usable security for distributed systems, there remains a `trust gap' between the users' requirements and current technological capabilities. To bridge this `trust gap', this thesis also proposes two different types of distributed systems, one applicable for a computational system and the other for a distributed data system. Central to these systems is the <em>configuration resolver</em> which maintains a list of trustworthy participants available in the virtual organisation. Users submit their jobs to the configuration resolver, knowing that their jobs will be dispatched to trustworthy participants and executed in protected environments. As a form of evaluation, this thesis suggests how these ideas could be integrated with existing systems, and highlights the potential security enhancements.</p>
spellingShingle Huh, J
Trustworthy Logging for Virtual Organisations
title Trustworthy Logging for Virtual Organisations
title_full Trustworthy Logging for Virtual Organisations
title_fullStr Trustworthy Logging for Virtual Organisations
title_full_unstemmed Trustworthy Logging for Virtual Organisations
title_short Trustworthy Logging for Virtual Organisations
title_sort trustworthy logging for virtual organisations
work_keys_str_mv AT huhj trustworthyloggingforvirtualorganisations