Secure Logging Monitor Service for Cloud Forensics

被引:0
作者
Wu, Songyang [1 ]
Zhang, Yong [1 ]
机构
[1] Minist Publ Secur, Res Inst 3, Shanghai 201204, Peoples R China
来源
2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT) | 2015年
关键词
Cloud Forensics; Forensic Investigation; Information Security; TOOLS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Logs are one of the most important pieces in forensics, which can be leveraged to extract critical evidences or help drastically speed up the investigation. Nevertheless, collecting the logs from cloud infrastructure is extremely difficult, since the investigators almost totally lack of control over the cloud. In this work, we introduce the notion of secure logging monitor service, which is deployed in the cloud and generates integrity proofs of cloud logs in real time. Once a proof entry has been produced, a dishonest cloud service provider (CSP) even colludes with the investigator, can't fake or remove the corresponding logs without being detected. Compared with related works, the proposed scheme can simultaneously meet the most major requirements of cloud forensics, including the integrity of log evidences, privacy protection and low computational burden.
引用
收藏
页码:757 / 762
页数:6
相关论文
共 13 条
[1]  
[Anonymous], SYST APPR DIG FOR EN
[2]  
[Anonymous], ADVANCES IN DIGITAL
[3]  
[Anonymous], 118891 ISOIEC
[4]  
[Anonymous], ASIA CCS 2013 P 8 AC
[5]   Security Proofs for Identity-Based Identification and Signature Schemes [J].
Bellare, Mihir ;
Namprempre, Chanathip ;
Neven, Gregory .
JOURNAL OF CRYPTOLOGY, 2009, 22 (01) :1-61
[6]  
BIRK D., 2011, SYSTEMATIC APPROACHE
[7]  
Brickell E, 2010, LECT NOTES COMPUT SC, V6101, P181, DOI 10.1007/978-3-642-13869-0_12
[8]   Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform [J].
Dykstra, Josiah ;
Sherman, Alan T. .
DIGITAL INVESTIGATION, 2013, 10 :S87-S95
[9]   Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques [J].
Dykstra, Josiah ;
Sherman, Alan T. .
DIGITAL INVESTIGATION, 2012, 9 :S90-S98
[10]  
Grispos G., 2013, EMERG DIG FORENSICS, V4, P28