Secure Logging as a Service against DDoS and Pollution Attacks
Abstract
lack support for computer forensic investigations. Analyzing
various logs like process logs, network logs play an important
role in computer forensics. Unluckily, collecting logs from a cloud
is hard given the black-box nature of clouds and the multi-tenant
cloud models, where the same processing and network resources
are shared by many users. Researchers have proposed to mitigate
the challenges of collecting logs from cloud infrastructure using
log API or cloud management console. However, there is no
concrete work, which shows the ways to provide cloud logs to
investigator promising users privacy and integrity of the logs
is preserved. In this paper, we introduce Secure-Logging-as-aService (SecLaaS) that stores virtual machines logs and provides
access to forensic investigators ensuring the confidentiality of the
cloud users. SecLaaS also preserves proofs of past log and thus
protects the integrity of the logs from dishonest investigators or
cloud providers.
Full Text:
PDFReferences
Josiah Dykstra, Alan T. Sherman Design and implementation of FROST:
Digital forensic tools for the OpenStack cloud computing platform
Published by Elsevier Ltd. 2013.
Nay Aung Aung and Myat Myat Min Cloud Forensic Investigation using
Digital Provenance Scheme ICAET, Singapore, March 29-30, 2014.
Shams Zawoad, Amit Dutta, Ragib Hasan, Towards Building Forensics
Enabled Cloud Through Secure Logging-as-aService IEEE Transactions
on Dependable and Secure Computing, 2015.
Shams Zawoad, Amit Dutta, Ragib Hasan, SecLaaS: Secure Logging-asa-Service for Cloud Forensics ACM- ASIACCS, China, 25 Feb 2013.
Z. Zafarullah, F. Anwar, and Z. Anwar, Digital forensics for eucalyptus
in IEEE, FIT, 2011.
A. Patrascu and V.V. Patriciu, Logging system for cloud computing forensic environments International Journal of Computers Communications and
Control, April 2015.
R. Marty, Cloud application logging for forensics in Symposium on
Applied Computing. ACM, 2011.
K. Shanmugasundaram, H. Br nnimann and N. Memon, Payload of
attribution via hierarchical bloom filters in conference CCS, Washington,
DC, USA Oct 2004.
Ameer Pichan, Mihai Lazarescu, Sie Teng Soh.Cloud forensics: Technical
challenges, solutions and comparative analysis, Digital Investigation,
Elsevier Ltd 2015.
I. Ray, K. Belyaev, M. Strizhov, D. Mulamba, and M. Rajaram, Secure
logging as a servicedelegating log management to the cloud. IEEE
Systems Journal, 2013.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology