Real-Time Detection of Illegal File Transfers in the Cloud

Adam Bowers, Dan Lin, Anna Squicciarini, Ali Hurson

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

There has been a prolific rise in the popularityof cloud storage in recent years. While cloud storage offersmany advantages such as flexibility and convenience, users arenow unable to tell or control the actual locations of their data. This limitation may affect users' confidence and trust in thestorage provider, or even be unsuitable for storing data withstrict location requirements. To address this issue, we proposean illegal file transfer detection framework that constantlymonitors the real-time file transfers in the cloud and is capableof detecting potential illegal transfers which moves sensitivedata outside the ('legal') boundaries specified by the fileowner. The main idea is to classifying multiple users' location preferences when making the data storage arrangement inthe cloud nodes. We model the legal file transfers amongnodes as a weighted graph and then maximize the probabilityof storing data items of similar privacy preferences in thesame region. Then we leverage the socket monitoring functionsprovided by LAST-HDFS (a recent location-aware Hadoop filestorage system) to monitor the real-time communication amongcloud nodes. Based on our legal file transfer graph and thedetected communication, we propose an approach to calculatethe probability of the detected transfer to be illegal.

Original languageEnglish (US)
Title of host publicationProceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017
EditorsKisung Lee, Ling Liu
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2597-2600
Number of pages4
ISBN (Electronic)9781538617915
DOIs
StatePublished - Jul 13 2017
Event37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017 - Atlanta, United States
Duration: Jun 5 2017Jun 8 2017

Publication series

NameProceedings - International Conference on Distributed Computing Systems

Other

Other37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017
CountryUnited States
CityAtlanta
Period6/5/176/8/17

Fingerprint

Communication
Data storage equipment
Monitoring

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Cite this

Bowers, A., Lin, D., Squicciarini, A., & Hurson, A. (2017). Real-Time Detection of Illegal File Transfers in the Cloud. In K. Lee, & L. Liu (Eds.), Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017 (pp. 2597-2600). [7980248] (Proceedings - International Conference on Distributed Computing Systems). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICDCS.2017.13
Bowers, Adam ; Lin, Dan ; Squicciarini, Anna ; Hurson, Ali. / Real-Time Detection of Illegal File Transfers in the Cloud. Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. editor / Kisung Lee ; Ling Liu. Institute of Electrical and Electronics Engineers Inc., 2017. pp. 2597-2600 (Proceedings - International Conference on Distributed Computing Systems).
@inproceedings{6d8c5c893b1a411db5250d1ce783ef1f,
title = "Real-Time Detection of Illegal File Transfers in the Cloud",
abstract = "There has been a prolific rise in the popularityof cloud storage in recent years. While cloud storage offersmany advantages such as flexibility and convenience, users arenow unable to tell or control the actual locations of their data. This limitation may affect users' confidence and trust in thestorage provider, or even be unsuitable for storing data withstrict location requirements. To address this issue, we proposean illegal file transfer detection framework that constantlymonitors the real-time file transfers in the cloud and is capableof detecting potential illegal transfers which moves sensitivedata outside the ('legal') boundaries specified by the fileowner. The main idea is to classifying multiple users' location preferences when making the data storage arrangement inthe cloud nodes. We model the legal file transfers amongnodes as a weighted graph and then maximize the probabilityof storing data items of similar privacy preferences in thesame region. Then we leverage the socket monitoring functionsprovided by LAST-HDFS (a recent location-aware Hadoop filestorage system) to monitor the real-time communication amongcloud nodes. Based on our legal file transfer graph and thedetected communication, we propose an approach to calculatethe probability of the detected transfer to be illegal.",
author = "Adam Bowers and Dan Lin and Anna Squicciarini and Ali Hurson",
year = "2017",
month = "7",
day = "13",
doi = "10.1109/ICDCS.2017.13",
language = "English (US)",
series = "Proceedings - International Conference on Distributed Computing Systems",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "2597--2600",
editor = "Kisung Lee and Ling Liu",
booktitle = "Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017",
address = "United States",

}

Bowers, A, Lin, D, Squicciarini, A & Hurson, A 2017, Real-Time Detection of Illegal File Transfers in the Cloud. in K Lee & L Liu (eds), Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017., 7980248, Proceedings - International Conference on Distributed Computing Systems, Institute of Electrical and Electronics Engineers Inc., pp. 2597-2600, 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, United States, 6/5/17. https://doi.org/10.1109/ICDCS.2017.13

Real-Time Detection of Illegal File Transfers in the Cloud. / Bowers, Adam; Lin, Dan; Squicciarini, Anna; Hurson, Ali.

Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. ed. / Kisung Lee; Ling Liu. Institute of Electrical and Electronics Engineers Inc., 2017. p. 2597-2600 7980248 (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Real-Time Detection of Illegal File Transfers in the Cloud

AU - Bowers, Adam

AU - Lin, Dan

AU - Squicciarini, Anna

AU - Hurson, Ali

PY - 2017/7/13

Y1 - 2017/7/13

N2 - There has been a prolific rise in the popularityof cloud storage in recent years. While cloud storage offersmany advantages such as flexibility and convenience, users arenow unable to tell or control the actual locations of their data. This limitation may affect users' confidence and trust in thestorage provider, or even be unsuitable for storing data withstrict location requirements. To address this issue, we proposean illegal file transfer detection framework that constantlymonitors the real-time file transfers in the cloud and is capableof detecting potential illegal transfers which moves sensitivedata outside the ('legal') boundaries specified by the fileowner. The main idea is to classifying multiple users' location preferences when making the data storage arrangement inthe cloud nodes. We model the legal file transfers amongnodes as a weighted graph and then maximize the probabilityof storing data items of similar privacy preferences in thesame region. Then we leverage the socket monitoring functionsprovided by LAST-HDFS (a recent location-aware Hadoop filestorage system) to monitor the real-time communication amongcloud nodes. Based on our legal file transfer graph and thedetected communication, we propose an approach to calculatethe probability of the detected transfer to be illegal.

AB - There has been a prolific rise in the popularityof cloud storage in recent years. While cloud storage offersmany advantages such as flexibility and convenience, users arenow unable to tell or control the actual locations of their data. This limitation may affect users' confidence and trust in thestorage provider, or even be unsuitable for storing data withstrict location requirements. To address this issue, we proposean illegal file transfer detection framework that constantlymonitors the real-time file transfers in the cloud and is capableof detecting potential illegal transfers which moves sensitivedata outside the ('legal') boundaries specified by the fileowner. The main idea is to classifying multiple users' location preferences when making the data storage arrangement inthe cloud nodes. We model the legal file transfers amongnodes as a weighted graph and then maximize the probabilityof storing data items of similar privacy preferences in thesame region. Then we leverage the socket monitoring functionsprovided by LAST-HDFS (a recent location-aware Hadoop filestorage system) to monitor the real-time communication amongcloud nodes. Based on our legal file transfer graph and thedetected communication, we propose an approach to calculatethe probability of the detected transfer to be illegal.

UR - http://www.scopus.com/inward/record.url?scp=85027244944&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85027244944&partnerID=8YFLogxK

U2 - 10.1109/ICDCS.2017.13

DO - 10.1109/ICDCS.2017.13

M3 - Conference contribution

AN - SCOPUS:85027244944

T3 - Proceedings - International Conference on Distributed Computing Systems

SP - 2597

EP - 2600

BT - Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017

A2 - Lee, Kisung

A2 - Liu, Ling

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Bowers A, Lin D, Squicciarini A, Hurson A. Real-Time Detection of Illegal File Transfers in the Cloud. In Lee K, Liu L, editors, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Institute of Electrical and Electronics Engineers Inc. 2017. p. 2597-2600. 7980248. (Proceedings - International Conference on Distributed Computing Systems). https://doi.org/10.1109/ICDCS.2017.13