based cloud auditing, that provides improved trans-
parency to cloud stakeholders about data process-
ing in the cloud. The extension introduces the con-
cept of cloud provider chains, data processing and
privacy policies with an extended scope on all in-
volved providers, and audit evidence exchange. The
main contribution of this paper introduces the concept
adapting CSA CloudTrust Protocol (CTP) (Cloud Se-
curity Alliance, 2015) for the use in inter-provider ex-
change of evidence during cloud audits.
Using the introduced CTP extension, additionally
generated evidence (i.e., information not specified in
the original CTP) will be used to enhance CTP re-
ports. Furthermore the extension enables auditing of
third-party contractors within provider chains to show
that each statement made by the provider, with respect
to the users established policies (e.g., data location,
service availability), is fulfilled.
This paper is organized as follows: In the next
Section 2 related work is presented. Section 3 in-
troduces the concept of service provision chains and
discusses the scopes and applicability of policies. In
Section 4 two approaches towards cloud auditing are
introduced. After that, we propose a lifecycle model
for delegated auditing of cloud provider chains in
Section 5. Next, we focus on data exchange pat-
terns (Section 6) that are used in Section 7, where
we present our proposed system. Following that, sec-
tion 8 evaluates the presented results using a scenario
description and a discussion of the threat model. In
Section 9 we conclude this paper.
2 RELATED WORK
Security and privacy auditing are increasingly impor-
tant topics in cloud auditing. They demonstrate that
security controls are put in place by the provider and
also that they are functioning correctly (i.e., data pro-
tection mechanisms are working correctly and effec-
tively). There are some projects working on the ar-
chitectural and interface level regarding the automa-
tion of security audits, such as the Security Audit
as a Service (SAaaS) project (Doelitzscher et al.,
2012; Doelitzscher et al., 2013). SAaaS is specif-
ically designed to detect incidents in the cloud and
thereby consider the dynamic nature of such ecosys-
tems, where resources are rapidly provisioned and re-
moved. However, SAaaS does not address provider
chain setups or treat gathered data as evidence.
ABTiCI (Agent-Based Trust in Cloud Infrastruc-
ture) describes a system used for monitoring (Saleh,
2014). All relevant parts of a cloud infrastructure
are monitored to be able to detect and verify unau-
thorized access. Integrity checks are done at boot-
time, using Trusted Platform Module (TPM) boot or
at runtime. Monitoring hardware and software con-
figurations allow the system to detect changes at run-
time. The aforementioned system is similar to our ap-
proach. Instead of using agents we utilize CTP. Fur-
thermore, our approach relies on evidence collection
through audits with pull and trigger mechanisms.
A centralized trust model is introduced by Rizvi
et al. (Rizvi et al., 2014). Trust between consumer
and provider is established by using an independent
third-party auditor. With the adoption of a third-party
auditing system, consumers are able to create baseline
evaluation for providers they have never worked with
to generate initial trust. The model acts as a feed-
back mechanism providing valuable insight into the
providers processes. After initial trust was generated
the third-party auditor continues to obtain trust values
for the consumer. We see initial trust in the provider
as a given factor and focus on obtaining trust values
based on evidence within a multi-provider scenario.
A completely different approach is proposed by
Gonzales et al., where the authors introduce an ar-
chitecture for the measurement of integrity and confi-
dentiality of a cloud provider (Gonzales et al., 2015).
Their approach is based on best practices and secu-
rity metrics. It uses trust zones to delineate resources
(physical, logical or virtual) within multi-tenant IaaS
infrastructures. Such a zone is used to separate in-
terests. Sensitive business data is located in a Gold
Zone, non-business partners are located in a less privi-
leged zone and can’t access the Gold Zone. The focus
in this work lies in the separation of concerns. Trust
is generated using best practices and security metrics.
There is no provider auditing involved, but everything
is estimated based on metric values. Whereas, in our
approach metrics can be used to collect additional in-
formation but the focus lies in evidence collection.
The DMTF is also working on cloud auditing with
the Cloud Audit Data Federation (CADF) working
group. They focus on developing standardized in-
terfaces and data formats to enable cloud security
auditing (Distributed Management Task Force, Inc.
(DMTF), 2014). A similar project is the Cloud Se-
curity Alliance’s Cloud Trust Protocol (CTP), which
defines an interface for enabling cloud users to “gen-
erate confidence that everything that is claimed to be
happening in the cloud is indeed happening as de-
scribed, . . . , and nothing else” (Cloud Security Al-
liance, 2015), which indicates an additional focus on
providing additional transparency of cloud services.
The latter two projects, however, do not elaborate on
how the interfaces should be implemented nor do they
describe explicitly focus on privacy and accountabil-
CLOSER 2016 - 6th International Conference on Cloud Computing and Services Science
84