Abstract
Many organizations are widely using cloud for their day to day business activities. But several attackers and malicious users are targeting cloud for their personal benefits. It is very important to collect and preserve admissible evidences of various activities happened in cloud securely in spite of multi-stakeholder collusion problem. Logs are one of the utmost vital elements to trace the malicious activities happened in cloud computing environment. Thus, forensic investigations involving logs face a grave challenge of making sure that the logs being investigated are consistent and not tampered with. A lot of research has been performed in this field; however with the advent of blockchain and Interplanetary File System (IPFS) new innovative approaches can be applied to secure trustworthy evidences in cloud. In this paper, we used blockchain and IPFS to build a system which stores the logs of cloud users’ activities and assurances the trustworthiness and recovery of such logs to aid in forensic investigation. The integrity of the trustworthy log evidences is assured with the help of blockchain. Using versioning nature of IPFS our system can track the modification of log files. In earlier work, the systems could assure whether a log has been altered with or not, but none provided a mechanism to recover metadata of tampered logs to their original state. With the help of IPFS our proposed technique extend the existing work by providing the original logs for interfered logs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Balduzzi, M., Loureiro, S.: A security analysis of amazon’s elastic compute cloud service. In: Symposium on Applied Computing, pp. 1427–1434. ACM (2012)
Benet, J.: IPFS - Content Addressed, Versioned, P2P File Sys. Draft 3 (2014)
Birk, D., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: SADFE, pp. 1–10. IEEE (2011)
Cohen, F.: Challenges to Digital Forensic Evidence in the Cloud. In: Cybercrime & Cloud Forensics: Applied for Investigation Process, pp. 59–78. IGI Global (2012)
Congress of the United States. Sarbanes-Oxley Act. Accessed 20 Mar 2017
Dykstra, J., Sherman, A.: Acquiring forensic evidence from infrastructure-as-a-service cloud computing. J. Dig. Invest. 9, S90–S98 (2016)
Dykstra, J., Sherman, A.: Understanding issues in cloud forensics: two hypothetical case studies. Cyber Defense Lab, Department of CSEE (UMBC) (2011)
Health Information Privacy. http://goo.gl/NxgkMi, Accessed 20 Mar 2017
Hyperledger FabricDocs Documentation, Hyperledger. Accessed March 2018
Infosecurity, Ddos-ers launch attacks from amazon ec2. Accessed Jan 2018
Kent, K., Souppaya, M.: Guide to computer security log management. Technical Report 800-92, NIST Special Publication (2006)
Khan, S., Gani, A., et al.: Cloud log forensics: foundations, state of the art, and future directions. ACM Comput. Surv. 49(1), 1–42 (2016). Article 7
Marty, R.: Cloud application logging for forensics. In: Proceedings of the: ACM Symposium on Applied Computing (SAC11), Taichung, Taiwan., pp. 178–184. ACM (2011)
Melland, P., Grance, T.: Nist Cloud Computing Forensic Science Challenges. NIST Cloud Forensic Science WG, IT Laboratory, Draft NISTIR 8006 (2014)
MRM.: Market Research Media, Global Cloud Computing Market Forecast 2019–2024. https://www.marketresearchmedia.com/?p=839, Accessed 26 Apr 2018
Nasscom. India’s cloud market to cross \$7 billion by 2022. Accessed July 2018
Patrascu, A.: Logging system for cloud computing forensic environments. J. Control Eng. Appl. Inf. 16(1), 80–88 (2014)
Ray, I., Belyaev, K., Rajaram, M.: Secure logging as a service delegating log management to the cloud. IEEE Syst. J. 7(2), 323–334 (2013)
Subashini, S.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)
Thorpe, S., Ray, I.: Detecting temporal inconsistency in virtual machine activity timelines. J. Inf. Assur. Secur. 7, 24–31 (2012)
Zafarullah, Z., et al.: Digital forensics for eucalyptus. In: FIT. IEEE (2011)
Zawoad, S., Hasan, R.: Digital forensics in the cloud. J. Defen. Softw. Eng. 26(5), 17–20 (2013)
Zawoad, S., Dutta, A.K., Hasan, R.: SecLaaS: Secure logging-as-a service for cloud forensics. In: ASIACCS, pp. 219–230. ACM (2013)
Zawoad, S., et al.: Towards building forensics enabled cloud through secure logging-as-a-service. IEEE Trans. Depend. Sec. Comput. 13(2), 148–162 (2016)
Zawoad, S., Hasan, R.: Cloud forensics: a meta-study of challenges, approaches, and open problems (2013). arXiv: 1302.6312v1 [cs.DC]
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Fut. Gener. Comput. Syst. 28(3), 583–592 (2012)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Rane, S., Wagh, S., Dixit, A. (2021). Securing Trustworthy Evidences for Robust Forensic Cloud in Spite of Multi-stakeholder Collusion Problem. In: Abraham, A., Shandilya, S., Garcia-Hernandez, L., Varela, M. (eds) Hybrid Intelligent Systems. HIS 2019. Advances in Intelligent Systems and Computing, vol 1179. Springer, Cham. https://doi.org/10.1007/978-3-030-49336-3_37
Download citation
DOI: https://doi.org/10.1007/978-3-030-49336-3_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-49335-6
Online ISBN: 978-3-030-49336-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)