Design of a Forensic Enabled Secure Cloud Logging

被引:1
|
作者
Rane, Sagar [1 ]
Wagh, Sanjeev [2 ]
Dixit, Arati [3 ]
机构
[1] Savitribai Phule Pune Univ, Dept Technol, Pune, Maharashtra, India
[2] Govt Coll Engn, Informat Technol, Karad, Maharashtra, India
[3] North Carolina State Univ, Elect & Comp Engn, Raleigh, NC 27695 USA
关键词
Cloud Forensics; Forensic Investigation; Cloud Security; Blockchain; Interplanetary File System (IPFS);
D O I
10.1145/3369740.3373803
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Adoption of cloud computing services greatly reduce the cost of managing businesses and increase the productivity. But, due to complex network configurations of cloud, it is a vector for various malicious attacks. Logs are the most valuable element which can be helpful in revealing the insights of any activity happened in cloud. Experienced attackers and malicious users always targets to destroy logging service first, after their attacks to remain untraceable. The existing logging techniques, which consider logger as a trusted stakeholder cannot be applied in cloud as there is possibility of collusion in between logger of cloud i.e. cloud service provider and fraud cloud service consumer or cloud forensic investigators to falsify the logs.
引用
收藏
页数:1
相关论文
共 50 条
  • [1] Secure logging scheme for forensic analysis in cloud
    Sree, Thankaraja Raja
    Bhanu, Somasundaram Mary Saira
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (15):
  • [2] Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service
    Zawoad, Shams
    Dutta, Amit Kumar
    Hasan, Ragib
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (02) : 148 - 162
  • [3] Design and formal verification of a cloud compliant secure logging mechanism
    Sandikkaya, Mehmet Tahir
    Ovatman, Tolga
    Harmanci, Ali Emre
    [J]. IET INFORMATION SECURITY, 2016, 10 (04) : 203 - 214
  • [4] A secure logging scheme for forensic computing
    Kawaguchi, N
    Ueda, S
    Obata, N
    Miyaji, R
    Kaneko, S
    Shigeno, H
    Okada, K
    [J]. PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 386 - 393
  • [5] Logging for Cloud Computing Forensic Systems
    Patrascu, A.
    Patriciu, V. V.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2015, 10 (02) : 222 - 229
  • [6] Logging Framework for Cloud Computing Forensic Environments
    Patrascu, Alecsandru
    Patriciu, Victor-Valeriu
    [J]. 2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [7] Logging System for Cloud Computing Forensic Environments
    Pitrascu, Alecsandru
    Patriciu, Victor-Valeriu
    [J]. CONTROL ENGINEERING AND APPLIED INFORMATICS, 2014, 16 (01): : 80 - 88
  • [8] Design and Implementation of a Blockchain-Enabled Secure Sensing Data Processing and Logging System
    Zhao, Wenbing
    Upadhyay, Himanshu
    Lagos, Leonel
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2021, : 386 - 391
  • [9] Secure Logging Framework Integrating with Cloud Database
    Lin, Chung-Yi
    Chang, Ming-Che
    Chiu, Hua-Chou
    Shyu, Keh-Hwa
    [J]. 49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 13 - 17
  • [10] Secure Logging Monitor Service for Cloud Forensics
    Wu, Songyang
    Zhang, Yong
    [J]. 2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 757 - 762