Skip to main content

Securing Trustworthy Evidences for Robust Forensic Cloud in Spite of Multi-stakeholder Collusion Problem

  • Conference paper
  • First Online:
Hybrid Intelligent Systems (HIS 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1179))

Included in the following conference series:

  • 512 Accesses

Abstract

Many organizations are widely using cloud for their day to day business activities. But several attackers and malicious users are targeting cloud for their personal benefits. It is very important to collect and preserve admissible evidences of various activities happened in cloud securely in spite of multi-stakeholder collusion problem. Logs are one of the utmost vital elements to trace the malicious activities happened in cloud computing environment. Thus, forensic investigations involving logs face a grave challenge of making sure that the logs being investigated are consistent and not tampered with. A lot of research has been performed in this field; however with the advent of blockchain and Interplanetary File System (IPFS) new innovative approaches can be applied to secure trustworthy evidences in cloud. In this paper, we used blockchain and IPFS to build a system which stores the logs of cloud users’ activities and assurances the trustworthiness and recovery of such logs to aid in forensic investigation. The integrity of the trustworthy log evidences is assured with the help of blockchain. Using versioning nature of IPFS our system can track the modification of log files. In earlier work, the systems could assure whether a log has been altered with or not, but none provided a mechanism to recover metadata of tampered logs to their original state. With the help of IPFS our proposed technique extend the existing work by providing the original logs for interfered logs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Balduzzi, M., Loureiro, S.: A security analysis of amazon’s elastic compute cloud service. In: Symposium on Applied Computing, pp. 1427–1434. ACM (2012)

    Google Scholar 

  2. Benet, J.: IPFS - Content Addressed, Versioned, P2P File Sys. Draft 3 (2014)

    Google Scholar 

  3. Birk, D., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: SADFE, pp. 1–10. IEEE (2011)

    Google Scholar 

  4. Cohen, F.: Challenges to Digital Forensic Evidence in the Cloud. In: Cybercrime & Cloud Forensics: Applied for Investigation Process, pp. 59–78. IGI Global (2012)

    Google Scholar 

  5. Congress of the United States. Sarbanes-Oxley Act. Accessed 20 Mar 2017

    Google Scholar 

  6. Dykstra, J., Sherman, A.: Acquiring forensic evidence from infrastructure-as-a-service cloud computing. J. Dig. Invest. 9, S90–S98 (2016)

    Article  Google Scholar 

  7. Dykstra, J., Sherman, A.: Understanding issues in cloud forensics: two hypothetical case studies. Cyber Defense Lab, Department of CSEE (UMBC) (2011)

    Google Scholar 

  8. Health Information Privacy. http://goo.gl/NxgkMi, Accessed 20 Mar 2017

  9. Hyperledger FabricDocs Documentation, Hyperledger. Accessed March 2018

    Google Scholar 

  10. Infosecurity, Ddos-ers launch attacks from amazon ec2. Accessed Jan 2018

    Google Scholar 

  11. Kent, K., Souppaya, M.: Guide to computer security log management. Technical Report 800-92, NIST Special Publication (2006)

    Google Scholar 

  12. Khan, S., Gani, A., et al.: Cloud log forensics: foundations, state of the art, and future directions. ACM Comput. Surv. 49(1), 1–42 (2016). Article 7

    Article  Google Scholar 

  13. Marty, R.: Cloud application logging for forensics. In: Proceedings of the: ACM Symposium on Applied Computing (SAC11), Taichung, Taiwan., pp. 178–184. ACM (2011)

    Google Scholar 

  14. Melland, P., Grance, T.: Nist Cloud Computing Forensic Science Challenges. NIST Cloud Forensic Science WG, IT Laboratory, Draft NISTIR 8006 (2014)

    Google Scholar 

  15. MRM.: Market Research Media, Global Cloud Computing Market Forecast 2019–2024. https://www.marketresearchmedia.com/?p=839, Accessed 26 Apr 2018

  16. Nasscom. India’s cloud market to cross \$7 billion by 2022. Accessed July 2018

    Google Scholar 

  17. Patrascu, A.: Logging system for cloud computing forensic environments. J. Control Eng. Appl. Inf. 16(1), 80–88 (2014)

    Google Scholar 

  18. Ray, I., Belyaev, K., Rajaram, M.: Secure logging as a service delegating log management to the cloud. IEEE Syst. J. 7(2), 323–334 (2013)

    Article  Google Scholar 

  19. Subashini, S.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)

    Article  Google Scholar 

  20. Thorpe, S., Ray, I.: Detecting temporal inconsistency in virtual machine activity timelines. J. Inf. Assur. Secur. 7, 24–31 (2012)

    Google Scholar 

  21. Zafarullah, Z., et al.: Digital forensics for eucalyptus. In: FIT. IEEE (2011)

    Google Scholar 

  22. Zawoad, S., Hasan, R.: Digital forensics in the cloud. J. Defen. Softw. Eng. 26(5), 17–20 (2013)

    Google Scholar 

  23. Zawoad, S., Dutta, A.K., Hasan, R.: SecLaaS: Secure logging-as-a service for cloud forensics. In: ASIACCS, pp. 219–230. ACM (2013)

    Google Scholar 

  24. Zawoad, S., et al.: Towards building forensics enabled cloud through secure logging-as-a-service. IEEE Trans. Depend. Sec. Comput. 13(2), 148–162 (2016)

    Article  Google Scholar 

  25. Zawoad, S., Hasan, R.: Cloud forensics: a meta-study of challenges, approaches, and open problems (2013). arXiv: 1302.6312v1 [cs.DC]

  26. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Fut. Gener. Comput. Syst. 28(3), 583–592 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Sagar Rane , Sanjeev Wagh or Arati Dixit .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rane, S., Wagh, S., Dixit, A. (2021). Securing Trustworthy Evidences for Robust Forensic Cloud in Spite of Multi-stakeholder Collusion Problem. In: Abraham, A., Shandilya, S., Garcia-Hernandez, L., Varela, M. (eds) Hybrid Intelligent Systems. HIS 2019. Advances in Intelligent Systems and Computing, vol 1179. Springer, Cham. https://doi.org/10.1007/978-3-030-49336-3_37

Download citation

Publish with us

Policies and ethics