Secure Logging for Auditable File System Using Separate Virtual Machines

Siqin Zhao, Kang Chen, Weimin Zheng
{"title":"Secure Logging for Auditable File System Using Separate Virtual Machines","authors":"Siqin Zhao, Kang Chen, Weimin Zheng","doi":"10.1109/ISPA.2009.32","DOIUrl":null,"url":null,"abstract":"Auditable file system is used to track the usage of the file system including the operations like read and write. Auditable file system keeps the trails of users’ action and the trails are kept faithfully for future auditing. However, as the logs are still kept within the same file system, it will be quite vulnerable to be exposed as malware penetrating the system. Even with the file system hiding the logs, the skillful attacker can still analyze the on-disk structure to get and modify the logs. Thus the logs should be kept separate from the working system. Virtual machines can provide such separation as virtual machines can hold the whole operating system while still keep the system apart from the metal hardware. We propose a method of secure logging for auditable file system using a logging virtual machine. The logs are kept in another virtual machine safely. Even the working virtual machine is broken; the logs are not exposed to the outside. By the isolation provided by virtual machines, the logs can be kept safe and valid. The high privileged user can not modify the logs contents, or forge the logs and data to keep consistency, or pretend to be another user for doing un-authorized actions. We have done several works as well as a prototype system to show the feasibility of such approach. Experiments show that the logging virtual machine will not bring too much overhead.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"356 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPA.2009.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

Auditable file system is used to track the usage of the file system including the operations like read and write. Auditable file system keeps the trails of users’ action and the trails are kept faithfully for future auditing. However, as the logs are still kept within the same file system, it will be quite vulnerable to be exposed as malware penetrating the system. Even with the file system hiding the logs, the skillful attacker can still analyze the on-disk structure to get and modify the logs. Thus the logs should be kept separate from the working system. Virtual machines can provide such separation as virtual machines can hold the whole operating system while still keep the system apart from the metal hardware. We propose a method of secure logging for auditable file system using a logging virtual machine. The logs are kept in another virtual machine safely. Even the working virtual machine is broken; the logs are not exposed to the outside. By the isolation provided by virtual machines, the logs can be kept safe and valid. The high privileged user can not modify the logs contents, or forge the logs and data to keep consistency, or pretend to be another user for doing un-authorized actions. We have done several works as well as a prototype system to show the feasibility of such approach. Experiments show that the logging virtual machine will not bring too much overhead.
使用独立虚拟机的可审计文件系统的安全日志记录
可审计文件系统用于跟踪文件系统的使用情况,包括读和写等操作。可审计的文件系统保留用户操作的痕迹,并忠实地保留这些痕迹,以便将来进行审计。但是,由于日志仍然保存在同一个文件系统中,因此当恶意软件渗透系统时,它将非常容易暴露。即使文件系统隐藏了日志,熟练的攻击者仍然可以分析磁盘上的结构来获取和修改日志。因此,日志应该与工作系统分开。虚拟机可以提供这样的分离,因为虚拟机可以容纳整个操作系统,同时仍然使系统与金属硬件分开。提出了一种使用日志虚拟机对可审计文件系统进行安全日志记录的方法。日志安全地保存在另一个虚拟机中。甚至工作的虚拟机也坏了;原木没有暴露在外面。通过虚拟机提供的隔离,日志可以保持安全和有效。高权限用户不能修改日志内容,不能伪造日志和数据以保持一致性,不能冒充其他用户进行未经授权的操作。我们已经做了一些工作以及一个原型系统来展示这种方法的可行性。实验表明,日志虚拟机不会带来太多的开销。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信