2019
DOI: 10.1002/cpe.5143
|View full text |Cite
|
Sign up to set email alerts
|

Secure logging scheme for forensic analysis in cloud

Abstract: Summary Cloud computing has emerged as a prominent technology that provides reliable on‐demand cloud services to users. Among the various kind of attacks, Distributed Denial of Service (DDoS) attack is one of the major application layer attacks that target the resources and services running in the cloud. Due to the distributed nature of attacks or crimes in the cloud, the evidence are collected from various components such as the router, switches, hard disk, log traces, and virtual machines. An attacker may co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Various studies on logging systems in cloud computing are underway in the area of digital forensics. Among them, Secure Logging-as-a-Service (SecLaaS) [7][8][9][10] and the Cloud-Log Assuring-Soundess and Secrecy Scheme (CLASS) [11] are representative cloud logging systems, taking into account cloud forensic challenges such as data volatility, multitenancy in the cloud, and ensuring user privacy.…”
Section: Conventional Cloud Logging Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Various studies on logging systems in cloud computing are underway in the area of digital forensics. Among them, Secure Logging-as-a-Service (SecLaaS) [7][8][9][10] and the Cloud-Log Assuring-Soundess and Secrecy Scheme (CLASS) [11] are representative cloud logging systems, taking into account cloud forensic challenges such as data volatility, multitenancy in the cloud, and ensuring user privacy.…”
Section: Conventional Cloud Logging Systemsmentioning
confidence: 99%
“…To protect log data in a logging system, almost all logging systems encrypt log data using an encryption key, such as Advanced Encryption Standard (AES), Data Encryption Standard (DES), and RSA. Raja Sree [10] suggested a secure logging scheme for forensic analysis in a cloud. The scheme also encrypts log data using 2048 bit RSA.…”
Section: Data Protection Techniquesmentioning
confidence: 99%