{"id":"https://openalex.org/W3135360585","doi":"https://doi.org/10.1109/tdsc.2021.3062204","title":"ProSAS: Proactive Security Auditing System for Clouds","display_name":"ProSAS: Proactive Security Auditing System for Clouds","publication_year":2022,"publication_date":"2022-07-01","ids":{"openalex":"https://openalex.org/W3135360585","doi":"https://doi.org/10.1109/tdsc.2021.3062204","mag":"3135360585"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3062204","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1941-0018","1545-5971","2160-9209"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013360015","display_name":"Suryadipta Majumdar","orcid":"https://orcid.org/0000-0002-6501-4214"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Suryadipta Majumdar","raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073187941","display_name":"Gagandeep Singh Chawla","orcid":null},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Gagandeep Singh Chawla","raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008129282","display_name":"Amir Alimohammadifar","orcid":null},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Amir Alimohammadifar","raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000817197","display_name":"Taous Madi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210094041","display_name":"Ericsson (Canada)","ror":"https://ror.org/00nas2c56","country_code":"CA","type":"company","lineage":["https://openalex.org/I1306339040","https://openalex.org/I4210094041"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Taous Madi","raw_affiliation_string":"The Ericsson Security Research, Ericsson Canada, Montreal, QC, Canada","raw_affiliation_strings":["The Ericsson Security Research, Ericsson Canada, Montreal, QC, Canada"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020688490","display_name":"Yosr Jarraya","orcid":"https://orcid.org/0009-0000-6194-5321"},"institutions":[{"id":"https://openalex.org/I4210094041","display_name":"Ericsson (Canada)","ror":"https://ror.org/00nas2c56","country_code":"CA","type":"company","lineage":["https://openalex.org/I1306339040","https://openalex.org/I4210094041"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Yosr Jarraya","raw_affiliation_string":"The Ericsson Security Research, Ericsson Canada, Montreal, QC, Canada","raw_affiliation_strings":["The Ericsson Security Research, Ericsson Canada, Montreal, QC, Canada"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077892893","display_name":"Makan Pourzandi","orcid":"https://orcid.org/0000-0001-9775-6231"},"institutions":[{"id":"https://openalex.org/I4210094041","display_name":"Ericsson (Canada)","ror":"https://ror.org/00nas2c56","country_code":"CA","type":"company","lineage":["https://openalex.org/I1306339040","https://openalex.org/I4210094041"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Makan Pourzandi","raw_affiliation_string":"The Ericsson Security Research, Ericsson Canada, Montreal, QC, Canada","raw_affiliation_strings":["The Ericsson Security Research, Ericsson Canada, Montreal, QC, Canada"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064023616","display_name":"Lingyu Wang","orcid":"https://orcid.org/0000-0002-8953-250X"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Lingyu Wang","raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"]},{"author_position":"last","author":{"id":"https://openalex.org/A5028605138","display_name":"Mourad Debbabi","orcid":"https://orcid.org/0000-0003-3015-3043"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mourad Debbabi","raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"]}],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"has_fulltext":false,"cited_by_count":5,"cited_by_percentile_year":{"min":89,"max":91},"biblio":{"volume":"19","issue":"4","first_page":"2517","last_page":"2534"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Security Challenges in Cloud Computing","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Security Challenges in Cloud Computing","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Language-based Information Flow Security","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"keyword":"proactive security auditing system","score":0.7716}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8563285},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.72230077},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.60832006},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5785019},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.5650243},{"id":"https://openalex.org/C2776007630","wikidata":"https://www.wikidata.org/wiki/Q2798912","display_name":"Accountability","level":2,"score":0.50601476},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.48356625},{"id":"https://openalex.org/C80958533","wikidata":"https://www.wikidata.org/wiki/Q1047174","display_name":"Audit trail","level":3,"score":0.41217846},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.0871498},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.08412662},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.077846825},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3062204","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1941-0018","1545-5971","2160-9209"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.73}],"grants":[{"funder":"https://openalex.org/F4320321588","funder_display_name":"Concordia University","award_id":null},{"funder":"https://openalex.org/F4320332911","funder_display_name":"University at Albany","award_id":null},{"funder":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada","award_id":null}],"referenced_works_count":35,"referenced_works":["https://openalex.org/W1055523","https://openalex.org/W39510960","https://openalex.org/W1587692465","https://openalex.org/W1980939416","https://openalex.org/W1985929316","https://openalex.org/W1985994373","https://openalex.org/W1987459411","https://openalex.org/W1994571662","https://openalex.org/W2001759130","https://openalex.org/W2004056952","https://openalex.org/W2014143000","https://openalex.org/W2036910349","https://openalex.org/W2041696954","https://openalex.org/W2048855209","https://openalex.org/W2119028650","https://openalex.org/W2122695394","https://openalex.org/W2125140474","https://openalex.org/W2137137684","https://openalex.org/W2144006591","https://openalex.org/W2284032370","https://openalex.org/W2293837963","https://openalex.org/W2298763913","https://openalex.org/W2322572695","https://openalex.org/W2407127642","https://openalex.org/W2520233939","https://openalex.org/W2559755452","https://openalex.org/W2574070836","https://openalex.org/W2605289564","https://openalex.org/W2624359066","https://openalex.org/W2744492707","https://openalex.org/W2773646351","https://openalex.org/W2903853604","https://openalex.org/W2972955891","https://openalex.org/W4241115065","https://openalex.org/W4254342428"],"related_works":["https://openalex.org/W4377233172","https://openalex.org/W3199802296","https://openalex.org/W2124184151","https://openalex.org/W2487194309","https://openalex.org/W2750461430","https://openalex.org/W2374959091","https://openalex.org/W2581634534","https://openalex.org/W2079105056","https://openalex.org/W2494121465","https://openalex.org/W2948428544"],"ngrams_url":"https://api.openalex.org/works/W3135360585/ngrams","abstract_inverted_index":{"The":[0],"multi-tenancy":[1],"in":[2,80,112,138,345],"a":[3,45,57,101,123,139,153,164,185,234,268,276,324],"cloud":[4,22,36,42,140,212,270,285,326],"along":[5],"with":[6,96,118,184,327],"its":[7,206],"dynamic":[8,98,154],"and":[9,28,32,89,141,147,189,214,252,273,292,301,318,330],"self-service":[10],"nature":[11,99],"could":[12],"cause":[13,109,258],"severe":[14],"security":[15,48,63,167,180,261,347],"concerns,":[16],"such":[17,26,287],"as":[18,288],"isolation":[19],"breaches":[20],"among":[21],"tenants.":[23],"To":[24,158],"mitigate":[25],"concerns":[27],"ensure":[29],"the":[30,35,61,73,87,97,104,113,119,126,239,246,305],"accountability":[31],"transparency":[33],"of":[34,47,100,122,248,260,307,332],"providers":[37],"towards":[38],"their":[39],"tenants,":[40],"verifying":[41],"states":[43],"against":[44],"list":[46],"policies,":[49],"a.k.a.":[50],"security":[53],"auditing":[54],",":[55,174],"is":[56,78,264],"promising":[58],"solution.":[59],"However,":[60],"existing":[62,105],"auditing":[64,75,168,348],"solutions":[65],"for":[66,152,323],"clouds":[67],"suffer":[68],"from":[69,219],"several":[70],"limitations.":[71],"First,":[72],"traditional":[74],"approach,":[76],"which":[77,175,230,256],"retroactive":[79],"nature,":[81],"can":[82,108,176,257],"only":[83],"detect":[84],"violations":[85,178,259],"after":[86],"fact":[88],"hence,":[90],"often":[91],"becomes":[92],"ineffective":[93],"while":[94,116],"dealing":[95,117],"cloud.":[102,124,157],"Second,":[103],"runtime":[106,183],"approaches":[107,129],"significant":[110,144],"delay":[111],"response":[114,187,311],"time":[115,312],"sheer":[120],"size":[121],"Finally,":[125],"current":[127],"proactive":[128,166,346],"typically":[130],"rely":[131],"on":[132,321],"prior":[133,194],"knowledge":[134,195],"about":[135,196],"future":[136,197,227,250],"changes":[137],"also":[142],"require":[143,193],"manual":[145],"efforts,":[146],"thus":[148],"become":[149],"less":[150],"practical":[151,186],"environment":[155],"like":[156],"address":[159],"those":[160,249,254],"limitations,":[161],"we":[162,274],"present":[163],"novel":[165],"system,":[169],"namely,":[170],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">ProSAS":[173,203],"prevent":[177],"to":[179,279,282,313],"policies":[181],"at":[182,316],"time,":[188],"yet":[190],"does":[191],"not":[192],"changes.":[198],"More":[199],"specifically,":[200],"first":[204],"establishes":[205],"models":[207],"(e.g.,":[208,222],"dependency":[209,240],"relationships":[210],"between":[211],"events,":[213,251],"critical":[215,228,340],"events)":[216],"through":[217],"learning":[218,335],"historical":[220],"data":[221,303],"logs);":[223],"it":[224,243],"then":[225],"predicts":[226],"events":[229,255,341],"would":[231],"likely":[232],"follow":[233],"received":[235],"event":[236],"by":[237,349],"leveraging":[238],"relationships;":[241],"afterwards,":[242],"proactively":[244],"verifies":[245],"impacts":[247],"prevents":[253],"policies.":[262],"ProSAS":[263,281],"integrated":[265],"into":[266],"OpenStack,":[267],"popular":[269,284],"management":[271],"platform,":[272],"provide":[275],"concrete":[277],"guideline":[278],"port":[280],"other":[283],"platforms,":[286],"Google":[289],"Cloud":[290],"Platform,":[291],"Amazon":[293],"EC2.":[294],"Our":[295],"experiment":[296],"results":[297],"using":[298],"both":[299],"real":[300],"synthetic":[302],"demonstrate":[304],"improvement":[306],"efficiency":[308],"(i.e.,":[309,334],"reducing":[310],"1,450":[314],"nanoseconds":[315],"best":[317],"8.5":[319],"milliseconds":[320],"average":[322],"large-scale":[325],"10,000":[328],"tenants)":[329],"level":[331],"automation":[333],"more":[336],"than":[337],"20":[338],"new":[339],"spanning":[342],"100":[343],"days)":[344],"ProSAS.":[350]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3135360585","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2024-03-20T19:14:19.457852","created_date":"2021-03-15"}