首页> 外文期刊>Concurrency and computation: practice and experience >Secure logging scheme for forensic analysis in cloud
【24h】

Secure logging scheme for forensic analysis in cloud

机译:云中取证分析的安全日志记录方案

获取原文
获取原文并翻译 | 示例

摘要

Cloud computing has emerged as a prominent technology that provides reliable on-demandcloud services to users. Among the various kind of attacks, Distributed Denial of Service (DDoS)attack is one of the major application layer attacks that target the resources and services runningin the cloud. Due to the distributed nature of attacks or crimes in the cloud, the evidence arecollected from various components such as the router, switches, hard disk, log traces, and virtualmachines. An attacker may collude with the cloud provider or investigators to tamper the logfiles or by inserting false information or by deleting the malicious activity logs altogether byleaving no trace. Hence, security is the major concern in cloud wherein investigation of crimesand attacks are very difficult. Collecting logs from the cloud providers is very hard since manyusers share the same network resources and the investigators rely on the providers to accessthe information. Therefore, in order to preserve the confidentiality, integrity, and authenticationof logs, secure logging scheme is proposed to preserve the logs for forensic investigation. Thispaper highlights the secure logging scheme by extracting the features from logs of all virtualmachine instances by double encryption scheme and also deals the integrity of the logs usinghashing and verifies the signatures using Bloom filter–based R tree (BR tree). Furthermore,the verification is performed using Shamir Secret Sharing (SSS) scheme, and it is responsiblefor sharing the secret (private) keys to all the three parties, ie, user, investigator, and cloudproviders. It is inferred fromthe experimental results that the proposed scheme requires minimallog processing time, minimal verification time for inserting logs, stores logs in time, and spaceefficient manner and scalable than existing methods.
机译:云计算已经成为一种杰出的技术,可以为用户提供可靠的按需 r ncloud服务。在各种攻击中,分布式拒绝服务(DDoS) r nackack是针对云中运行的资源和服务的主要应用程序层攻击之一。由于攻击或犯罪行为在云中具有分布性,因此需要从路由器,交换机,硬盘,日志跟踪和虚拟机等各种组件中收集证据。攻击者可能与云提供商或调查人员合谋篡改日志 r n文件,或者通过插入虚假信息或通过完全不留痕迹来完全删除恶意活动日志。因此,安全性是云计算中的主要关注点,其中,犯罪/随机攻击的调查非常困难。从云提供商那里收集日志非常困难,因为许多用户共享相同的网络资源,并且调查人员依靠提供商来访问信息。因此,为了保护日志的机密性,完整性和认证性,提出了一种安全的日志记录方案来保存日志以供司法调查。本文通过双重加密方案从所有虚拟机实例的日志中提取功能来突出显示安全的日志记录方案,并使用散列处理日志的完整性,并使用基于Bloom过滤器的签名进行验证R树(BR树)。此外, r n使用Shamir秘密共享(SSS)方案执行验证,并且负责 r n将秘密(私有)密钥共享给所有三个方(即用户,调查者和云) r 提供者。从实验结果可以看出,与现有方法相比,该方案所需的处理时间最少,插入日志,存储日志的验证时间最少,并且空间高效,可扩展。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号