BCALS: Blockchain-based secure log management system for cloud computing

被引:17
作者
Ali, Ahmad [1 ]
Khan, Abid [2 ]
Ahmed, Mansoor [1 ,3 ]
Jeon, Gwanggil [4 ]
机构
[1] COMSATS Univ, Dept Comp Sci, Islamabad CUI, Islamabad, Pakistan
[2] Aberystwyth Univ, Dept Comp Sci, Aberystwyth, Dyfed, Wales
[3] Maynooth Univ, Innovat Value Inst, Maynooth, Kildare, Ireland
[4] Incheon Natl Univ, Dept Embedded Syst Engn, Incheon 22012, South Korea
基金
欧盟地平线“2020”; 爱尔兰科学基金会;
关键词
Semantics;
D O I
10.1002/ett.4272
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
A computing environment requires a robust and comprehensive process to track and document user activities to uphold confidence in the system. Audit logs are used for this purpose to monitor the actions of administrators and users. However, these logs are vulnerable to multidimensional attacks, including modification of logs, erasability of logs, and privacy of the user. Since administrators have unprecedented access to these logs, they can modify, delete, and even destroy them. Securing these logs against malicious activities is the prime requirement of audit log management. Existing schemes have several limitations, including immutability, computational expensiveness, missing semantics, and are not verifiable. Various schemes have been proposed for this purpose, but a standard method is required to structure heterogeneous logs and their security semantically. To cope with these limitations, in this paper, we propose a Log Management System using blockchain. The proposed system will ensure audit logs' security, which will eventually strengthen users' trust in the computing environment and make it unbreachable even by the administrators. It has been evinced that our model performed better in terms of performance and features already mentioned when compared with existing schemes.
引用
收藏
页数:20
相关论文
共 36 条
[1]  
Accorsi R, 2011, LECT NOTES COMPUT SC, V6711, P109
[2]  
Ali A, 2017, 2017 INTERNATIONAL CONFERENCE ON ENERGY CONSERVATION AND EFFICIENCY (ICECE), P1, DOI 10.1109/ECE.2017.8248819
[3]   MITIS - An Insider Threats Mitigation Framework for Information Systems [J].
Ali, Ahmad ;
Ahmed, Mansoor ;
Ilyas, Muhammad ;
Kueng, Josef .
FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 :407-415
[4]  
[Anonymous], 1997, TECHNICAL REPORT
[5]   Distributed Immutabilization of Secure Logs [J].
Cucurull, Jordi ;
Puiggali, Jordi .
SECURITY AND TRUST MANAGEMENT, STM 2016, 2016, 9871 :122-137
[6]   Semantic Logging: Towards Explanation-Aware DAS [J].
Forcher, Bjoern ;
Agne, Stefan ;
Dengel, Andreas ;
Gillmann, Michael ;
Roth-Berghofer, Thomas .
11TH INTERNATIONAL CONFERENCE ON DOCUMENT ANALYSIS AND RECOGNITION (ICDAR 2011), 2011, :1140-1144
[7]   Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures [J].
Hartung, Gunnar ;
Kaidel, Bjoern ;
Koch, Alexander ;
Koch, Jessica ;
Hartmann, Dominik .
PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 :87-106
[8]   Distributed Configuration, Authorization and Management in the Cloud-based Internet of Things [J].
Henze, Martin ;
Wolters, Benedikt ;
Matzutt, Roman ;
Zimmermann, Torsten ;
Wehrle, Klaus .
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, :185-192
[9]  
HOLT J.E., 2006, 2006 AUSTRALASIAN WO, V54, P203
[10]  
Jaquette GA., 2001, US Patent, Patent No. [6,272,086, 6272086]