Abstract
Compute cloud interoperability across different domains represents a major challenge for the System administrator community. This work takes a look at the issues for enabling heterogeneous synchronization of virtual disk log attributes by use of an associative mapping technique. We explore this concern as a function of providing secure log auditing for the virtual machine (VM) cloud. Our contribution provides novel theoretical foundations that can be used to establish these synchronized log audit requirements supported by practical case study results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: VLDB Conference, pp. 487–499 (1994)
Dehaspe, L., Toivonen, H.: Discovery of frequent, datalog patterns. Data Mining. Knowledge. Discovery 3(1), 7–36
Ordonez, C.: Models for association rules based on clustering and correlation. Intelligent Data Analysis 13(2), 337–358 (2009)
Yan, X., Cheng, H., Han, J., Yu, P.S.: Mining significant graph patterns by leap search. In: SIGMOD, Conference, pp. 433–444 (2008)
http://www.usenix.org/events/osdi99/full_papers/wang/wang_html/node8.html
Arenas, et.al.: Inverting Schema Mappings: Bridging the Gap between Theory and Practice. PVLDB 2(1), 1018–1029 (2009)
Grandison, T., Maximillen, E.M., Thorpe, S., Alba, A.: Towards a formal definition of Cloud Computing. In: Proceedings of IEEE Services (2010)
Mahavan, J., Harvey, A.: Composing Mappings among Data Sources. In: VLDB, pp. 251–262 (1996)
ten Cate, B., Kolaitis, P.: Structural Characterizations of Schema Mapping Languages. In: ICDT, pp. 63–72 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Thorpe, S., Ray, I., Grandison, T. (2011). Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs. In: Herrero, Á., Corchado, E. (eds) Computational Intelligence in Security for Information Systems. Lecture Notes in Computer Science, vol 6694. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21323-6_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-21323-6_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21322-9
Online ISBN: 978-3-642-21323-6
eBook Packages: Computer ScienceComputer Science (R0)