{"title":"Design of a Forensic Enabled Secure Cloud Logging","authors":"Sagar Rane, S. Wagh, A. Dixit","doi":"10.1145/3369740.3373803","DOIUrl":null,"url":null,"abstract":"Adoption of cloud computing services greatly reduce the cost of managing businesses and increase the productivity. But, due to complex network configurations of cloud, it is a vector for various malicious attacks. Logs are the most valuable element which can be helpful in revealing the insights of any activity happened in cloud. Experienced attackers and malicious users always targets to destroy logging service first, after their attacks to remain untraceable. The existing logging techniques, which consider logger as a trusted stakeholder cannot be applied in cloud as there is possibility of collusion in between logger of cloud i.e. cloud service provider and fraud cloud service consumer or cloud forensic investigators to falsify the logs.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 21st International Conference on Distributed Computing and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3369740.3373803","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Adoption of cloud computing services greatly reduce the cost of managing businesses and increase the productivity. But, due to complex network configurations of cloud, it is a vector for various malicious attacks. Logs are the most valuable element which can be helpful in revealing the insights of any activity happened in cloud. Experienced attackers and malicious users always targets to destroy logging service first, after their attacks to remain untraceable. The existing logging techniques, which consider logger as a trusted stakeholder cannot be applied in cloud as there is possibility of collusion in between logger of cloud i.e. cloud service provider and fraud cloud service consumer or cloud forensic investigators to falsify the logs.