Advertisement

Log-Based Cloud Forensic Techniques: A Comparative Study

  • Palash Santra
  • Asmita Roy
  • Sadip Midya
  • Koushik MajumderEmail author
  • Santanu Phadikar
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 4)

Abstract

Cloud computing is one of the most recent advancements in the field of distributed computing. It has gained a lot of attention due to its on demand, pay-per-use service, and all time availability, reliability, and scalability. Although it offers numerous advantages, but due to its multi-tenant architecture, it is prone to various malicious attacks and illegal activities. Cloud service provider (CSP) takes the responsibility to secure customers’ data against such attacks. In the event of such malicious activities, CSP aims to trace the intruder. Cloud forensic techniques help in identifying the attacker along with proper evidence in cloud platform. Components of clouds such as log records are then analyzed to track for such detrimental activities. In this paper, some existing log-based cloud forensic techniques have been widely studied. The detailed comparative analysis has been done for the various techniques based on their advantages and limitations. By exploring the limitations and advantages of the existing approaches, future research areas have been identified.

Keywords

Cloud computing Cloud forensic Investigation Evidence Fuzzy system Cryptography Logs 

References

  1. 1.
    Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. In: Future Generation computer systems, 25(6), 599–616 (2009).Google Scholar
  2. 2.
    Mell, P., Grance, T.: The NIST definition of cloud computing (2011).Google Scholar
  3. 3.
    Birk, D., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: IEEE Sixth International Workshop In Systematic Approaches to Digital Forensic Engineering, 1–10 (2011).Google Scholar
  4. 4.
    Ruan, K., Carthy, J., Kechadi, T.: Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis. In: Proceedings of the Conference on Digital Forensics, Security and Law. (2011).Google Scholar
  5. 5.
    Zawoad, S., Dutta, A. K., Hasan, R: SecLaaS: secure logging-as-a-service for cloud forensics. In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 219–230 (2013).Google Scholar
  6. 6.
    Zargari, S., Benford, D.: Cloud forensics: Concepts, issues, and challenges. In: IEEE 2012 Third International Conference on Emerging Intelligent Data and Web Technologies, 236–243 (2012).Google Scholar
  7. 7.
    Sang, T: A log based approach to make digital forensics easier on cloud computing. In: Intelligent System Design and Engineering Applications (ISDEA), Third International Conference. 91–94 (2013).Google Scholar
  8. 8.
    Patrascu, A., & Patriciu, V. V.: Logging framework for cloud computing forensic environments. In: Communications (COMM), 10th International Conference, 1–4 (2014).Google Scholar
  9. 9.
    Rajalakshmi, J. R., Rathinraj, M., Braveen, M.: Anonymizing log management process for secure logging in the cloud. In: Circuit, Power and Computing Technologies (ICCPCT), 2014 International Conference, 1559–1564 (2014).Google Scholar
  10. 10.
    Lantz, B., Hall, R., Couraud, J.:Locking Down Log Files: Enhancing Network Security By Protecting Log Files. Issues in Information Systems, 7(2) (2006).Google Scholar
  11. 11.
    Fontaine, C., Galand, F: A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security, (2007).Google Scholar
  12. 12.
    Iyengar, N. C. S., Banerjee, A., Ganapathy, G.: A fuzzy logic based defense mechanism against distributed denial of service attack in cloud computing environment. In: International Journal of Communication Networks and Information Security, 6(3), 233 (2014).Google Scholar
  13. 13.
    Kim, J. S., Kim, D. G., & Noh, B. N.: A fuzzy logic based expert system as a network forensics. In Fuzzy Systems, 2004. Proceedings. 2004 IEEE International Conference (2), 879–884 (2004).Google Scholar
  14. 14.
    Idquantiquecom. (2015). IDQ. Retrieved 24 May, 2016, from http://www.idquantique.com/securing-the-cloud-with-quantum-safe-cryptography/.

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Palash Santra
    • 1
  • Asmita Roy
    • 1
  • Sadip Midya
    • 1
  • Koushik Majumder
    • 1
    Email author
  • Santanu Phadikar
    • 1
  1. 1.Department of Computer Science & EngineeringMaulana Abul Kalam Azad University of Technology (Formerly WBUT)KolkataIndia

Personalised recommendations