Information Technology Reference
In-Depth Information
Enforcing Data Quality Rules for a Synchronized VM
Log Audit Environment Using Transformation Mapping
Techniques
Sean Thorpe 1 , Indrajit Ray 2 , and Tyrone Grandison 3
1 Faculty of Engineering and Computing, University of Technology,
Kingston, Jamaica
thorpe.sean@gmail.com
2 Colorado State University,
Fort Collins, USA
indrajit@cs.colostate.edu
3 IBM Almaden Research
Silicon Valley, USA
tyroneg@us.ibm.com
Abstract. In this paper we examine the transformation mapping mechanisms
required in synchronizing virtual machine (VM) log audit data for the system
administrator environment. We explain the formal constraints that are required
by the transformation mapping process between the source and target log
schemas for these VMs. We discuss the practical considerations of using these
formalisms in establishing the suitable data quality rules that provides for
security within these abstract domains.
Keywords: Transformation, Mapping, Log, Quality, Audit.
1 Motivation
Often when one thinks about the virtual machine cloud environment one sees economies
of scales for the business. To this end enabling security across these domains are
critical. The integrity of the disparate data sources however has proven a major
interoperability challenge within these hybrid compute clouds. Hence efforts to provide
data quality as apart of the VM data centre needs to be meticulous. Customarily data
integration systems are automated systems that permit the transformation, integration,
and exchange of structured data that has been designed and developed independently.
The often subtle and complex interdependencies within data can make the creation,
maintenance, and use of such systems quite challenging for database security. When one
thinks about these traditional challenges as a new and urgent concern within the cloud
computing arena the issues become even more problematic.
There are five (5) sections in this paper. Section 2 looks at the related work.
Section 3 looks at the formal transformation mapping constraint definitions. Section 4
provides a case study analysis of the security challenges in the transformation
mapping processes for our log auditor deployment. Section 5 summarizes the
conclusion and future work in our research.
 
Search WWH ::




Custom Search