Intruder Detection through Pattern Matching and Provenance Driven Data Recovery

Anthony Chapman

Research output: Contribution to conferencePaper

Abstract

Intruder detection and recovering tampered data is challenging enough without the added complexity of the cloud or the forthcoming EU General Data Protection Regulation (GDPR), which will put greater pressure on companies to strengthen their cyber security or potentially face large fines. Intruder breach reporting and forensic analysis needs to drastically improve in order to avoid these potentially catastrophic fines. We conducted a conceptual exploration of intruder detection and data recovery methods. This paper aims to encourage further research for effective cloud security assurance with a focus on increased protection from tough legislation, such as complying with the forthcoming GDPR. We propose a framework which uses pattern matching to identify tampered data, provenance models for data assurance and audit trails to recover original data.
Original languageEnglish
Number of pages6
Publication statusPublished - 22 Feb 2018

Fingerprint

Data privacy
Pattern matching
Recovery
Industry

Keywords

  • cloud security
  • cloud audit
  • cloud provenance
  • gdpr

Cite this

Intruder Detection through Pattern Matching and Provenance Driven Data Recovery. / Chapman, Anthony.

2018.

Research output: Contribution to conferencePaper

@conference{5ed08b48349f4378acd538da16ba6f31,
title = "Intruder Detection through Pattern Matching and Provenance Driven Data Recovery",
abstract = "Intruder detection and recovering tampered data is challenging enough without the added complexity of the cloud or the forthcoming EU General Data Protection Regulation (GDPR), which will put greater pressure on companies to strengthen their cyber security or potentially face large fines. Intruder breach reporting and forensic analysis needs to drastically improve in order to avoid these potentially catastrophic fines. We conducted a conceptual exploration of intruder detection and data recovery methods. This paper aims to encourage further research for effective cloud security assurance with a focus on increased protection from tough legislation, such as complying with the forthcoming GDPR. We propose a framework which uses pattern matching to identify tampered data, provenance models for data assurance and audit trails to recover original data.",
keywords = "cloud security , cloud audit, cloud provenance , gdpr",
author = "Anthony Chapman",
year = "2018",
month = "2",
day = "22",
language = "English",

}

TY - CONF

T1 - Intruder Detection through Pattern Matching and Provenance Driven Data Recovery

AU - Chapman, Anthony

PY - 2018/2/22

Y1 - 2018/2/22

N2 - Intruder detection and recovering tampered data is challenging enough without the added complexity of the cloud or the forthcoming EU General Data Protection Regulation (GDPR), which will put greater pressure on companies to strengthen their cyber security or potentially face large fines. Intruder breach reporting and forensic analysis needs to drastically improve in order to avoid these potentially catastrophic fines. We conducted a conceptual exploration of intruder detection and data recovery methods. This paper aims to encourage further research for effective cloud security assurance with a focus on increased protection from tough legislation, such as complying with the forthcoming GDPR. We propose a framework which uses pattern matching to identify tampered data, provenance models for data assurance and audit trails to recover original data.

AB - Intruder detection and recovering tampered data is challenging enough without the added complexity of the cloud or the forthcoming EU General Data Protection Regulation (GDPR), which will put greater pressure on companies to strengthen their cyber security or potentially face large fines. Intruder breach reporting and forensic analysis needs to drastically improve in order to avoid these potentially catastrophic fines. We conducted a conceptual exploration of intruder detection and data recovery methods. This paper aims to encourage further research for effective cloud security assurance with a focus on increased protection from tough legislation, such as complying with the forthcoming GDPR. We propose a framework which uses pattern matching to identify tampered data, provenance models for data assurance and audit trails to recover original data.

KW - cloud security

KW - cloud audit

KW - cloud provenance

KW - gdpr

UR - https://www.researchgate.net/publication/323309212_Intruder_Detection_through_Pattern_Matching_and_Provenance_Driven_Data_Recovery

M3 - Paper

ER -