2021
DOI: 10.1109/tsusc.2018.2833502
|View full text |Cite
|
Sign up to set email alerts
|

CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
12
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 30 publications
1
12
0
Order By: Relevance
“…Cloud log assuring soundness and secrecy(CLASS) is proposed in [42] which ensures maintenance of logs in the cloud through deviated encryption. McCabe et al produced PPL using Rabin's fingerprint strategy and blossom channel [43].…”
Section: Related Workmentioning
confidence: 99%
“…Cloud log assuring soundness and secrecy(CLASS) is proposed in [42] which ensures maintenance of logs in the cloud through deviated encryption. McCabe et al produced PPL using Rabin's fingerprint strategy and blossom channel [43].…”
Section: Related Workmentioning
confidence: 99%
“…Various studies on logging systems in cloud computing are underway in the area of digital forensics. Among them, Secure Logging-as-a-Service (SecLaaS) [7][8][9][10] and the Cloud-Log Assuring-Soundess and Secrecy Scheme (CLASS) [11] are representative cloud logging systems, taking into account cloud forensic challenges such as data volatility, multitenancy in the cloud, and ensuring user privacy.…”
Section: Conventional Cloud Logging Systemsmentioning
confidence: 99%
“…On the other hand, Cloud Log Assuring Soundness and Secrecy (CLASS) [1] was presented to secure logging by encrypting logs with individual user's public key. And Rabin's fingerprint and Bloom filter was used to generate proof of past log to speed up the log auditing.…”
Section: Reliable Loggingmentioning
confidence: 99%
“…The volume of the fine-grained logs becomes too large to efficiently audit. Some methods has been proposed to speed up the log integrity auditing process, including supporting selective verification [13] and using Rabin's fingerprint and bloom filter for every verification process [1]. However, there are still no efficiency improving method for log operation legality auditing.…”
Section: Introductionmentioning
confidence: 99%