Advanced SearchSearch Tips
Design of Secure Log System in Cloud Computing Environment
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Design of Secure Log System in Cloud Computing Environment
Lee, Byung-Do; Shin, Sang Uk;
  PDF(new window)
Cloud computing that provide a elastic computing service is more complex compared to the existing computing systems. Accordingly, it has become increasingly important to maintain the stability and reliability of the computing system. And troubleshooting and real-time monitoring to address these challenges must be performed essentially. For these goals, the handling of the log data is needed, but this task in cloud computing environment may be more difficult compared to the traditional logging system. In addition, there are another challenges in order to have the admissibility of the collected log data in court. In this paper, we design secure logging service that provides the management and reliability of log data in a cloud computing environment and then analyze the proposed system.
Cloud Computing;Secure Log;Log Data;Logging Service;
 Cited by
Gartner Identifies the Top 10 Strategic Technology Trends for 2015, (accessed Feb., 1, 2016).

F. Gens, IDC Predictions 2015: Accelerating Innovation - and Growth - on the 3rd Platform, Top 10 Predictions, IDC, 252700, 2014.

B. Burton and M.J. Walker, Hype Cycle for Emerging Technologies, 2015, Gartner's Hype Cycle Special Report for 2015, 3100227, Gartner, 2015.

R. Accorsi, "Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?," Proceeding of 33rd Annual IEEE International Computer Software and Applications Conference, Vol. 2, pp. 398-403, 2009.

P. Mell and T. Grance, Nist Cloud Computing Forensic Science Challenges, National Institute of Standards and Technology, U.S. Department of Commerce, 2014.

G. Palmer, A Road Map for Digital Forensics Research-report from the First Digital Forensics Research Workshop, Utica, New York, 2001.

R. McKemmish, What is Forensic Computing?, Australian Institute of Criminology, Canberra, 1999.

K. Kent, S. Chevalier, T. Grance, and H. Dang, Guide to Integrating Forensic Techniques into Incident Response, NIST Special Publication, U.S., 2006.

A. Pichan, M. Lazarescu, and S.T. Soh, “Cloud Forensics: Technical Challenges, Solutions and Comparative Analysis," Digital Investigation, Vol. 13, pp. 38-57, 2015. crossref(new window)

R. Marty, "Cloud Application Logging for Forensics," Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 178-184, 2011.

M. Dworkin, Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality, NIST SP. 800-38C, U.S., 2004.

K. Ruan, J. Carthy, T. Kechadi, and I. Baggili, “Cloud Forensics Definitions and Critical Criteria for Cloud Forensic Capability: An Overview of Survey Results," Digital Investigation, Vol. 10, No. 1, pp. 34-43, 2013. crossref(new window)

K. Ruan and J. Carthy, "Cloud Computing Reference Architecture and Its Forensic Implications: a Preliminary Analysis," Digital Forensics and Cyber Crime, LNICST, Vol. 114, pp. 1-21, 2013.

K. Ruan, J. James, J. Carthy, and T. Kechadi, "Key Terms for Service Level Agreements to Support Cloud Forensics," Advances in Digital Forensics VI II , IFIP AICT, Vol. 383, pp. 201-212, 2012.

K. Ruan and J. Carthy, "Cloud forensic maturity model," Digital Forensics and Cyber Crime, LNICST, Vol. 114, pp. 22-41, 2013.

Y. Chen, V. Paxson, and R.H. Katz, What's New about Cloud Computing Security, EECS Dept., University of California, Berkeley Tech., Rep., UCB/EECS- 2010-5, Jan., 2010.

H. Lee, and T. Kim, “High-Speed Search Mechanism based on B-Tree Index Vector for Huge Web Log Mining and Web Attack Detection,” Journal of Korea Multimedia Society, Vol. 11, No. 11, pp. 1601-1614, 2008.