Secure Logging as a Service against DDoS and Pollution Attacks

Suraj G. Mehare, Dr. A. C. Lomte

Abstract


Now a days cloud computing has became as a popular computing paradigm. However, cloud computing architectures
lack support for computer forensic investigations. Analyzing
various logs like process logs, network logs play an important
role in computer forensics. Unluckily, collecting logs from a cloud
is hard given the black-box nature of clouds and the multi-tenant
cloud models, where the same processing and network resources
are shared by many users. Researchers have proposed to mitigate
the challenges of collecting logs from cloud infrastructure using
log API or cloud management console. However, there is no
concrete work, which shows the ways to provide cloud logs to
investigator promising users privacy and integrity of the logs
is preserved. In this paper, we introduce Secure-Logging-as-aService (SecLaaS) that stores virtual machines logs and provides
access to forensic investigators ensuring the confidentiality of the
cloud users. SecLaaS also preserves proofs of past log and thus
protects the integrity of the logs from dishonest investigators or
cloud providers.

Full Text:

PDF

References


Josiah Dykstra, Alan T. Sherman Design and implementation of FROST:

Digital forensic tools for the OpenStack cloud computing platform

Published by Elsevier Ltd. 2013.

Nay Aung Aung and Myat Myat Min Cloud Forensic Investigation using

Digital Provenance Scheme ICAET, Singapore, March 29-30, 2014.

Shams Zawoad, Amit Dutta, Ragib Hasan, Towards Building Forensics

Enabled Cloud Through Secure Logging-as-aService IEEE Transactions

on Dependable and Secure Computing, 2015.

Shams Zawoad, Amit Dutta, Ragib Hasan, SecLaaS: Secure Logging-asa-Service for Cloud Forensics ACM- ASIACCS, China, 25 Feb 2013.

Z. Zafarullah, F. Anwar, and Z. Anwar, Digital forensics for eucalyptus

in IEEE, FIT, 2011.

A. Patrascu and V.V. Patriciu, Logging system for cloud computing forensic environments International Journal of Computers Communications and

Control, April 2015.

R. Marty, Cloud application logging for forensics in Symposium on

Applied Computing. ACM, 2011.

K. Shanmugasundaram, H. Br nnimann and N. Memon, Payload of

attribution via hierarchical bloom filters in conference CCS, Washington,

DC, USA Oct 2004.

Ameer Pichan, Mihai Lazarescu, Sie Teng Soh.Cloud forensics: Technical

challenges, solutions and comparative analysis, Digital Investigation,

Elsevier Ltd 2015.

I. Ray, K. Belyaev, M. Strizhov, D. Mulamba, and M. Rajaram, Secure

logging as a servicedelegating log management to the cloud. IEEE

Systems Journal, 2013.


Refbacks

  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology