One-way accumulators: a decentralized alternative to digital signatures
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
An Efficient Dynamic and Distributed Cryptographic Accumulator
ISC '02 Proceedings of the 5th International Conference on Information Security
Computer Forensics: Computer Crime Scene Investigation (Networking Series) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (Networking Series) (Networking Series)
The Best Damn Cybercrime and Digital Forensics Book Period
The Best Damn Cybercrime and Digital Forensics Book Period
A new approach to secure logging
ACM Transactions on Storage (TOS)
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Proceedings of the 16th ACM conference on Computer and communications security
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
ACSAC '09 Proceedings of the 2009 Annual Computer Security Applications Conference
Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS
CLOUD '10 Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing
Cloud application logging for forensics
Proceedings of the 2011 ACM Symposium on Applied Computing
Digital Forensics for Eucalyptus
FIT '11 Proceedings of the 2011 Frontiers of Information Technology
Technical Issues of Forensic Investigations in Cloud Computing Environments
SADFE '11 Proceedings of the 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering
Hi-index | 0.00 |
Cloud computing has emerged as a popular computing paradigm in recent years. However, today's cloud computing architectures often lack support for computer forensic investigations. Analyzing various logs (e.g., process logs, network logs) plays a vital role in computer forensics. Unfortunately, collecting logs from a cloud is very hard given the black-box nature of clouds and the multi-tenant cloud models, where many users share the same processing and network resources. Researchers have proposed using log API or cloud management console to mitigate the challenges of collecting logs from cloud infrastructure. However, there has been no concrete work, which shows how to provide cloud logs to investigator while preserving users' privacy and integrity of the logs. In this paper, we introduce Secure-Logging-as-a-Service (SecLaaS), which stores virtual machines' logs and provides access to forensic investigators ensuring the confidentiality of the cloud users. Additionally, SeclaaS preserves proofs of past log and thus protects the integrity of the logs from dishonest investigators or cloud providers. Finally, we evaluate the feasibility of the scheme by implementing SecLaaS for network access logs in OpenStack -- a popular open source cloud platform.