Open Access   Article Go Back

Efficient and Secure Cloud Log Secrecy Scheme for Cloud Forensics

Vijeth M1 , Vikas H R2 , Vishwas B S3 , Vishwas N4 , Prasanna Kumar M5

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-15 , Page no. 183-186, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si15.183186

Online published on May 16, 2019

Copyright © Vijeth M, Vikas H R, Vishwas B S,Vishwas N, Prasanna Kumar M . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vijeth M, Vikas H R, Vishwas B S,Vishwas N, Prasanna Kumar M, “Efficient and Secure Cloud Log Secrecy Scheme for Cloud Forensics,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.183-186, 2019.

MLA Style Citation: Vijeth M, Vikas H R, Vishwas B S,Vishwas N, Prasanna Kumar M "Efficient and Secure Cloud Log Secrecy Scheme for Cloud Forensics." International Journal of Computer Sciences and Engineering 07.15 (2019): 183-186.

APA Style Citation: Vijeth M, Vikas H R, Vishwas B S,Vishwas N, Prasanna Kumar M, (2019). Efficient and Secure Cloud Log Secrecy Scheme for Cloud Forensics. International Journal of Computer Sciences and Engineering, 07(15), 183-186.

BibTex Style Citation:
@article{M_2019,
author = {Vijeth M, Vikas H R, Vishwas B S,Vishwas N, Prasanna Kumar M},
title = {Efficient and Secure Cloud Log Secrecy Scheme for Cloud Forensics},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {15},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {183-186},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1223},
doi = {https://doi.org/10.26438/ijcse/v7i15.183186}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i15.183186}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1223
TI - Efficient and Secure Cloud Log Secrecy Scheme for Cloud Forensics
T2 - International Journal of Computer Sciences and Engineering
AU - Vijeth M, Vikas H R, Vishwas B S,Vishwas N, Prasanna Kumar M
PY - 2019
DA - 2019/05/16
PB - IJCSE, Indore, INDIA
SP - 183-186
IS - 15
VL - 07
SN - 2347-2693
ER -

           

Abstract

Client action logs can be a profitable wellspring of data in cloud legal examinations .thus, guaranteeing the unwavering quality and security of such logs is significant. Most existing proposition for secure logging is intended for conventional environment as opposed to the perplexing condition of the cloud. The log documents present in the log records ought to be protected from aggressors and outsider associations. Log Files contains private data about the association`s action. So as to conquer the assaults from outside elements, In this paper, we propose the Efficient and secure log secrecy schemefor cloud forensics process as an elective plan for the verifying of logs in a cloud domain. In Efficient and secure log secrecy scheme for cloud forensics, logs are encrypted utilizing the individual client`s public key with the goal that just the client can decrypt the substance. So as to avert unapproved change of the log, we produce proof of past log (PPL) using cryptography techniques.

Key-Words / Index Term

Logs,Cloud,cryptography

References

[1] X. Liu, R. H. Deng, K.-K. R. Choo, and J. Weng, "An efficient privacy-preserving outsourced calculation toolkit with multiple keys," IEEE Transactions on Information Forensics and Security, vol. 11, pp. 2401-2414,2016.
[2] Y. Mansouri, A. N. Toosi, and R. Buyya, "Data storage management in cloud environments: Taxonomy, survey, and future directions," ACM Computing Surveys(CSUR), vol. 50, p. 91, 2017.
[3] M. Tao, J. Zuo, Z. Liu, A. Castiglione, and F. Palmieri, "Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes,"Future Generation Computer Systems, vol. 78, pp. 1040-1051,2018.
[4] Z. Xia, Y. Zhu, X. Sun, Z. Qin, and K. Ren, "Towards privacy-preserving content-based image retrieval in cloud computing," IEEE TransactionsonCloudComputing,pp.276-286, 2018.
[5] L. Zhou, Y. Zhu, and A. Castiglione, "Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner," Computers&Security,vol.69,pp.84-96,2017.
[6] Q. Alam, S. U. Malik, A. Akhunzada, K.-K. R. Choo, S. Tabbasum, and M. Alam, "A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification,"IEEETransactionsonInformation Forensics and Security, vol. 12, pp. 1259-1268, 2017.
[7] L.Li,R.Lu,K.-K.R.Choo,A.Datta,andJ.Shao, "Privacy-preserving-outsourced association rule mining on vertically partitioned databases," IEEE Transactions on Information Forensics and Security, vol. 11, pp. 1847-1861, 2016.
[8] F.Anwar and Z.Anwar "Digital forensics for eucalyptus," in Frontiers of Information Technology (FIT), 2011, 2011, pp.110-116.
[9] A. Patrascu and V.-V. Patriciu, "Loggingsystem for cloud computing forensic environments," Journal of Control Engineering and Applied Informatics, vol. 16, pp. 80-88,2014.
[10] M. Bellare and B. Yee, "Forward integrity for secure audit logs," Technical report, Computer Science and Engineering Department, University of California at SanDiego1997.
[11] B. Schneier and J. Kelsey, "Secure audit logs to support computer forensics," ACM Transactions on Information and System Security (TISSEC), vol. 2, pp. 159-176,1999.
[12] S. Zawoad, A. K. Dutta, and R. Hasan, "Towards building forensics enabled cloud through secure logging-as-a-service," IEEE Transactions on Dependable and Secure Computing, vol. 13, pp. 148-162,2016.