skip to main content
10.1145/3369740.3373803acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
poster

Design of a Forensic Enabled Secure Cloud Logging

Authors Info & Claims
Published:19 February 2020Publication History

ABSTRACT

Adoption of cloud computing services greatly reduce the cost of managing businesses and increase the productivity. But, due to complex network configurations of cloud, it is a vector for various malicious attacks. Logs are the most valuable element which can be helpful in revealing the insights of any activity happened in cloud. Experienced attackers and malicious users always targets to destroy logging service first, after their attacks to remain untraceable. The existing logging techniques, which consider logger as a trusted stakeholder cannot be applied in cloud as there is possibility of collusion in between logger of cloud i.e. cloud service provider and fraud cloud service consumer or cloud forensic investigators to falsify the logs.

References

  1. P.Melland, T.Grance. "NIST Cloud Computing Forensic Science Challenges", NIST Cloud Computing Forensic Science Working Group, Information Technology Laboratory, Draft NISTIR 8006, 2014.Google ScholarGoogle Scholar
  2. S. Zawoad, A. Dutta, and R. Hasan, "Towards Building Forensics Enabled Cloud through Secure Logging-as-a-Service", IEEE Transactions on Dependable and Secure Computing, 2016.Google ScholarGoogle Scholar

Index Terms

  1. Design of a Forensic Enabled Secure Cloud Logging

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICDCN '20: Proceedings of the 21st International Conference on Distributed Computing and Networking
          January 2020
          460 pages
          ISBN:9781450377515
          DOI:10.1145/3369740

          Copyright © 2020 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 19 February 2020

          Check for updates

          Qualifiers

          • poster
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader