dc.contributor.advisor |
Venter, Hein S. |
|
dc.contributor.coadvisor |
Eloff, Jan H.P. |
|
dc.contributor.postgraduate |
Dlamini, Moses Thandokuhle |
|
dc.date.accessioned |
2020-02-12T12:47:11Z |
|
dc.date.available |
2020-02-12T12:47:11Z |
|
dc.date.created |
2020-04 |
|
dc.date.issued |
2020 |
|
dc.description |
Thesis (PhD)--University of Pretoria, 2020. |
en_ZA |
dc.description.abstract |
The increasing number of reports on data leakage incidents increasingly erodes the already low consumer confidence in cloud services. Hence, some organisations are still hesitant to fully trust the cloud with their confidential data. Therefore, this study raises a critical and challenging research question: How can we restore the damaged consumer confidence and improve the uptake and security of cloud services? This study makes a plausible attempt at unpacking and answering the research question in order to holistically address the data leakage problem from three fronts, i.e. conflict-aware virtual machine (VM) placement, strong authentication and digital forensic readiness. Consequently, this study investigates, designs and develops an innovative conceptual architecture that integrates conflict-aware VM placement, cutting-edge authentication and digital forensic readiness to strengthen cloud security and address the data leakage problem in the hope of eventually restoring consumer confidence in cloud services.
The study proposes and presents a conflict-aware VM placement model. This model uses varying degrees of conflict tolerance levels, the construct of sphere of conflict and sphere of non-conflict. These are used to provide the physical separation of VMs belonging to conflicting tenants that share the same cloud infrastructure. The model assists the cloud service provider to make informed VM placement decisions that factor in their tenants’ security profile and balance it against the relevant cost constraints and risk appetite.
The study also proposes and presents a strong risk-based multi-factor authentication mechanism that scales up and down, based on threat levels or risks posed on the system. This ensures that users are authenticated using the right combination of access credentials according to the risk they pose. This also ensures end-to-end security of authentication data, both at rest and in transit, using an innovative cryptography system and steganography.
Furthermore, the study proposes and presents a three-tier digital forensic process model that proactively collects and preserves digital evidence in anticipation of a legal lawsuit or policy breach investigation. This model aims to reduce the time it takes to conduct an investigation in the cloud. Moreover, the three-tier digital forensic readiness process model collects all user activity in a forensically sound manner and notifies investigators of potential security incidents before they occur.
The current study also evaluates the effectiveness and efficiency of the proposed solution in addressing the data leakage problem. The results of the conflict-aware VM placement model are derived from simulated and real cloud environments. In both cases, the results show that the conflict-aware VM placement model is well suited to provide the necessary physical isolation of VM instances that belong to conflicting tenants in order to prevent data leakage threats. However, this comes with a performance cost in the sense that higher conflict tolerance levels on bigger VMs take more time to be placed, compared to smaller VM instances with low conflict tolerance levels. From the risk-based multifactor authentication point of view, the results reflect that the proposed solution is effective and to a certain extent also efficient in preventing unauthorised users, armed with legitimate credentials, from gaining access to systems that they are not authorised to access. The results also demonstrate the uniqueness of the approach in that even minor deviations from the norm are correctly classified as anomalies. Lastly, the results reflect that the proposed 3-tier digital forensic readiness process model is effective in the collection and storage of potential digital evidence. This is done in a forensically sound manner and stands to significantly improve the turnaround time of a digital forensic investigation process. Although the classification of incidents may not be perfect, this can be improved with time and is considered part of the future work suggested by the researcher. |
en_ZA |
dc.description.availability |
Unrestricted |
en_ZA |
dc.description.degree |
PhD |
en_ZA |
dc.description.department |
Computer Science |
en_ZA |
dc.identifier.citation |
Dlamini, MT 2020, Combating Data Leakage in the Cloud, PhD Thesis, University of Pretoria, Pretoria, viewed yymmdd <http://hdl.handle.net/2263/73245> |
en_ZA |
dc.identifier.other |
A2020 |
en_ZA |
dc.identifier.uri |
http://hdl.handle.net/2263/73245 |
|
dc.language.iso |
en |
en_ZA |
dc.publisher |
University of Pretoria |
|
dc.rights |
© 2019 University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria. |
|
dc.subject |
Security of Cloud Computing |
en_ZA |
dc.subject |
Cloud Computing |
en_ZA |
dc.subject |
Digital Forensics |
en_ZA |
dc.subject |
Behavioural Multifactor Authentication |
en_ZA |
dc.subject |
Data Leakage Threats |
en_ZA |
dc.subject |
Information Security |
en_ZA |
dc.subject |
UCTD |
|
dc.title |
Combating Data Leakage in the Cloud |
en_ZA |
dc.type |
Thesis |
en_ZA |