Filters








27 Hits in 2.7 sec

SecLaaS: Secure Logging-as-a-Service for Cloud Forensics [article]

Shams Zawoad, Amit Kumar Dutta, Ragib Hasan
2013 arXiv   pre-print
In this paper, we introduce Secure-Logging-as-a-Service (SecLaaS), which stores virtual machines' logs and provides access to forensic investigators ensuring the confidentiality of the cloud users.  ...  Cloud computing has emerged as a popular computing paradigm in recent years. However, today's cloud computing architectures often lack support for computer forensic investigations.  ...  To mitigate the challenges discussed in the above scenario, we propose the notion of Secure-Logging-as-a-Service (SecLaaS) in this paper.  ... 
arXiv:1302.6267v1 fatcat:b4h4teefgzbvtehuq64kn2q4lm

SecLaaS

Shams Zawoad, Amit Kumar Dutta, Ragib Hasan
2013 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13  
In this paper, we introduce Secure-Logging-as-a-Service (SecLaaS), which stores virtual machines' logs and provides access to forensic investigators ensuring the confidentiality of the cloud users.  ...  Cloud computing has emerged as a popular computing paradigm in recent years. However, today's cloud computing architectures often lack support for computer forensic investigations.  ...  Acknowledgment This research was supported by a Google Faculty Research Award, the Office of Naval Research Grant #N000141210217, the Department of Homeland Security Grant #FA8750-12-2-0254, and by the  ... 
doi:10.1145/2484313.2484342 dblp:conf/ccs/ZawoadDH13 fatcat:kr22nfigdrbffl6v6hn3twymcy

Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service

Shams Zawoad, Amit Kumar Dutta, Ragib Hasan
2016 IEEE Transactions on Dependable and Secure Computing  
Based on the threat model, we propose Secure-Logging-as-a-Service (SecLaaS), which preserves various logs generated for the activity of virtual machines running in clouds and ensures the confidentiality  ...  The current secure logging schemes, which consider the logger as trusted cannot be applied in clouds since there is a chance that cloud providers (logger) collude with malicious users or investigators  ...  We proposed SecLaaS, which can be a solution to store and provide logs for forensics purpose securely. This scheme will allow CSPs to store logs while preserving the confidentiality of cloud users.  ... 
doi:10.1109/tdsc.2015.2482484 fatcat:xuzrnrqshvab7lx6ep2xouxbs4

eCLASS: Edge-Cloud-Log Assuring-Secrecy Scheme for Digital Forensics

Junyoung Park, Eui-Nam Huh
2019 Symmetry  
This change in the computing paradigm has also brought about new challenges for digital forensics.  ...  In cloud forensics, it is difficult to collect user activity logs due to the fact of virtualization technologies and the multitenancy environment, which can infringe upon user privacy when collecting logs  ...  Among them, Secure Logging-as-a-Service (SecLaaS) [7] [8] [9] [10] and the Cloud-Log Assuring-Soundess and Secrecy Scheme (CLASS) [11] are representative cloud logging systems, taking into account  ... 
doi:10.3390/sym11101192 fatcat:jjuy623lene6fiftfymr2mmtqe

Launching Stealth Attacks using Cloud [article]

Moitrayee Chatterjee and Prerit Datta and Faranak Abri and Akbar Siami Namin and Keith S. Jones
2020 arXiv   pre-print
At the same time, the off-site location of the resources of this service model makes it more vulnerable to certain types of adversarial actions.  ...  Cloud computing offers users scalable platforms and low resource cost.  ...  ACKNOWLEDGMENT Thanks Sara Sartoli for her contribution to the interview data collection. This research work is supported by National Science Foundation under Grants No: 1516636, 1723765, 1821560.  ... 
arXiv:2006.07908v1 fatcat:ta72pmnybrd3te2lt7zln2vfse

Design of Security Technique through Secure Logging for Cloud Forensics

2019 International Journal of Engineering and Advanced Technology  
Ensuring the reliability and integrity of logs is crucial. Most existing solutions for secure logging are designed for traditional systems rather than the complexity of a cloud environment.  ...  Cloud computing has a new edge computing paradigm these days. Sometimes cloud computing architectures don't support for computer forensics investigations.  ...  [1] has drafted Secure-Logging-as-a-Service (SecLaaS), which stores virtual machine's logs and permit access to forensic examiners by maintaining the privacy of the cloud customers.  ... 
doi:10.35940/ijeat.f9312.088619 fatcat:hlvwvd6hyjhtjfzlvh7qv7rydi

LogDrive: a proactive data collection and analysis framework for time-traveling forensic investigation in IaaS cloud environments

Manabu Hirano, Natsuki Tsuzuki, Seishiro Ikeda, Ryotaro Kobayashi
2018 Journal of Cloud Computing: Advances, Systems and Applications  
This paper presents the LogDrive framework for mitigating the following problems of storage forensics in Infrastructure-as-a-Service (IaaS) cloud environments: volatility, increasing volume of forensic  ...  We employ a sector-hash-based file detection method with random sampling to search for an evidence file in the record of the write logs of the virtual storage.  ...  Suguru Yamaguchi for his longstanding support to our research project. We thank H. Ogawa, H. Takase, and K. Yoshida for their effort in the initial development.  ... 
doi:10.1186/s13677-018-0119-2 fatcat:5m4p2cbv4fb5rmrkpv5pbglhxy

Proposed Proactive Digital Forensic Approach for Cloud Computing Environment

Ganthan Narayana Samy, Nurazean Maarop, Doris Hooi-Ten Wong, Fiza Abdul Rahim, Noor Hafizah Hassan, Sundresan Perumal, Pritheega Magalingam, Sameer Hasan Albakri
2018 International Journal of Engineering & Technology  
Thus, this paper proposed a proactive digital forensic approach for cloud computing environment.  ...  Therefore, there is a need to develop an appropriate digital forensic approach for cloud computing environment.  ...  Acknowledgement The authors would like to thank Malaysian Government and Universiti Teknologi Malaysia (UTM) for supporting this work through the Fundamental Research Grant Scheme (FRGS) under Grant vote  ... 
doi:10.14419/ijet.v7i4.15.21362 fatcat:swtxbbqaubbnvpuxe56f4blqzu

Challenges of Cloud Log Forensics

Hanan Alobaidli, Qassim Nasir, Asif Iqbal, Mario Guimaraes
2017 Proceedings of the SouthEast Conference on - ACM SE '17  
In this research we aim to provide an insight into cloud computing log forensics, as logs are an important source of forensic evidence in the cloud.  ...  This is followed with conclusions regarding the issues faced by researchers in log forensics in cloud computing that will aid the research process.  ...  [4] [5] presenting Secure-Loggingas-a-Service (SecLaaS), which stores a virtual machine's logs and provides access to forensic investigators, while ensuring the confidentiality of other cloud users.  ... 
doi:10.1145/3077286.3077302 dblp:conf/ACMse/AlobaidliNIG17 fatcat:u4oyhiucijaobbxcr4e7ivrnsq

Cloud Forensics: Challenges and Solutions (Blockchain Based Solutions)

Hassan Kaleem, Ijaz Ahmed
2021 Innovative Computing Review  
Digital forensics is used to help forensic investigators extract evidence against cloud/ cybercriminals and maintain the integrity and security of data stored in a cloud environment.  ...  Finally, this survey paper can be considered an initiative to carry out research and develop cloud forensic-able services for the cloud environment.  ...  Zawoad [8] purposed Secure Logging as a Service (SecLaas) for cloud forensics, which allows CSPs to store logs files of virtual machines which will later be accessed by forensics investigators.  ... 
doi:10.32350/icr.0102.01 fatcat:k47dks7y2vb5vbihqsvmud25b4

Digital Forensics Architecture for Evidence Collection and Provenance Preservation in IaaS Cloud Environment using SDN and Blockchain Technology

Mehran Pourvahab, Gholamhossein Ekbatanifard
2019 IEEE Access  
To resolve this severe problem, this paper proposes a novel digital forensic architecture using fast-growing Software-Defined Networking (SDN) and Blockchain technology for Infrastructure-as-a-Service  ...  For every data stored in the cloud, a block is created in the SDN controller and the history of data is recorded as metadata.  ...  Thus attacker only needs to affect forensic server to alter and delete the evidence. Secure-Logging-as-a-Service (SecLaaS) model was presented to build cloud forensics architecture [32] .  ... 
doi:10.1109/access.2019.2946978 fatcat:tqe5befmfbgszlcwxr64niebky

Experts reviews of a cloud forensic readiness framework for organizations

Ahmed Alenezi, Hany F. Atlam, Gary B. Wills
2019 Journal of Cloud Computing: Advances, Systems and Applications  
forensic readiness in organizations that utilize an Infrastructure as a Service (IaaS) model.  ...  Cloud computing has drastically altered the ways in which it is possible to deliver information technologies (ITs) to consumers as a service.  ...  His research interests include and not limited to: Parallel Computing, Digital forensics, Cloud Forensics, Cloud Security, Internet of Things Forensics and Internet of Things Security.  ... 
doi:10.1186/s13677-019-0133-z fatcat:4j5hj7rhmzgubajo5dnbymvzjq

Audit Logs Management and Security - A Survey

Ahmad Ali, Dept. of Computer Science, COMSATS University, Islamabad, Islamabad, Pakistan, Mansoor Ahmed, Abid Khan, Dept. of Computer Science, COMSATS University, Islamabad, Islamabad, Pakistan, Dept. of Computer Science, Aberystwyth University, Aberystwyth, UK
2021 Maǧallaẗ Al-Kuwayt li-l-ʿulūm  
Similarly, repudiation is another serious issue in computer forensics and non-repudiation can be provided by a secure recording of event logs.  ...  In this survey, we searched for the requirements of securing audit logs and available approaches to secure these logs.  ...  Logging as a Service has also been proposed for cloud users after the deployment of cloud architectures as IaaS, PaaS, and SaaS.  ... 
doi:10.48129/kjs.v48i3.10624 fatcat:u3hkgagpgjahxmfbezbhvhn7jq

TOWARDS ACHIEVING RELIABLE DIGITAL FORENSICS IN IAAS AND STAAS CLOUDS USING THE OPEN CLOUD FORENSICS MODEL

Shams Zawoad, Ragib Hasan, Anthony Skjellum
2016 Services Transactions on Cloud Computing  
Based on this we propose two cloud architectures: the OCF-supported Infrastructure-asa-Service (IaaS) cloud and the OCF-supported Storage-as-a-Service (StaaS) cloud.  ...  In the digital forensics process involving clouds, the role of cloud service providers (CSPs) is extremely important; a role which needs to be considered in the science of cloud forensics.  ...  proposed a Secure Logging-as-a-Service (SecLaaS) securely to store VM activities, a procedure that ensures integrity and confidentiality of logs from a malicious CSP and investigators .  ... 
doi:10.29268/stcc.2016.0008 fatcat:pa7w3xycjvddbbon6h5hgrbkdq

TOWARDS ACHIEVING RELIABLE DIGITAL FORENSICS IN IAAS AND STAAS CLOUDS USING THE OPEN CLOUD FORENSICS MODEL

2016 Services Transactions on Cloud Computing  
Based on this we propose two cloud architectures: the OCF-supported Infrastructure-asa-Service (IaaS) cloud and the OCF-supported Storage-as-a-Service (StaaS) cloud.  ...  In the digital forensics process involving clouds, the role of cloud service providers (CSPs) is extremely important; a role which needs to be considered in the science of cloud forensics.  ...  proposed a Secure Logging-as-a-Service (SecLaaS) securely to store VM activities, a procedure that ensures integrity and confidentiality of logs from a malicious CSP and investigators .  ... 
doi:10.29268/stcc.2016.4.3.2 fatcat:xc5qd3te3zeelk433lcsh3jxeu
« Previous Showing results 1 — 15 out of 27 results