Full Paper View Go Back

Multi-Level and Mutual Log Integrity Preservation Approach for Cloud Forensics using Public Key Infrastructure

Siva Rama Krishna Tummalapalli1 , A.S.N. Chakravarthy2

Section:Research Paper, Product Type: Journal
Vol.9 , Issue.1 , pp.8-16, Feb-2021

Online published on Feb 28, 2021


Copyright © Siva Rama Krishna Tummalapalli, A.S.N. Chakravarthy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Siva Rama Krishna Tummalapalli, A.S.N. Chakravarthy, “Multi-Level and Mutual Log Integrity Preservation Approach for Cloud Forensics using Public Key Infrastructure,” International Journal of Scientific Research in Network Security and Communication, Vol.9, Issue.1, pp.8-16, 2021.

MLA Style Citation: Siva Rama Krishna Tummalapalli, A.S.N. Chakravarthy "Multi-Level and Mutual Log Integrity Preservation Approach for Cloud Forensics using Public Key Infrastructure." International Journal of Scientific Research in Network Security and Communication 9.1 (2021): 8-16.

APA Style Citation: Siva Rama Krishna Tummalapalli, A.S.N. Chakravarthy, (2021). Multi-Level and Mutual Log Integrity Preservation Approach for Cloud Forensics using Public Key Infrastructure. International Journal of Scientific Research in Network Security and Communication, 9(1), 8-16.

BibTex Style Citation:
@article{Tummalapalli_2021,
author = {Siva Rama Krishna Tummalapalli, A.S.N. Chakravarthy},
title = {Multi-Level and Mutual Log Integrity Preservation Approach for Cloud Forensics using Public Key Infrastructure},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {2 2021},
volume = {9},
Issue = {1},
month = {2},
year = {2021},
issn = {2347-2693},
pages = {8-16},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=406},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=406
TI - Multi-Level and Mutual Log Integrity Preservation Approach for Cloud Forensics using Public Key Infrastructure
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Siva Rama Krishna Tummalapalli, A.S.N. Chakravarthy
PY - 2021
DA - 2021/02/28
PB - IJCSE, Indore, INDIA
SP - 8-16
IS - 1
VL - 9
SN - 2347-2693
ER -

642 Views    347 Downloads    185 Downloads
  
  

Abstract :
The increasing growth of cloud computing makes the forensic investigation complex. It is very significant to collect and preserve the admissible evidences of different actions happened in the cloud environment in spite of collusion problem. The forensic investigation of logs poses a great challenge to make sure that the investigated logs are not tampered and consistent. Various integrity preservation methods are developed to secure the trustworthy evidences of cloud, but storing the logs of user actions and to ensure the trustworthiness with respect to forensic investigation still result a challenging issue in cloud. Hence, an effective multi-level and mutual log integrity preservation method is developed to assure the integrity of log evidence using public key infrastructure. The integrity preservation mechanism is modelled by employing the security mechanisms, such as hashing, encryption, decryption, and walsh transform. The communication between the entities is achieved by generating the keys using the hashing and encryption function with the concatenation operator. However, the public key and the random number is used to generate the message that can be exchanged between the cloud entities. The investigation process is done by the investigator for transferring the encrypted log file to the server. The proposed method achieved higher performance by considering the 500 number of cloud users in terms of detection rate, memory, and time with the values of 0.9828, 2185 bytes, and 7287 ms, respectively.

Key-Words / Index Term :
Cloud Security, Cloud Forensics, Evidence Integrity, Log Analysis, Public Key

References :
[1] Reilly D., Wren C. and Berry T., “Cloud computing: Forensic challenges for law enforcement”, IEEE International Conference for Internet Technology and Secured Transactions, pp. 1-7, November 2010.
[2] RightScale R., “State of the cloud report”, 2015.
[3] Tian J. and Jing X., “Cloud data integrity verification scheme for associated tags”, Computers & Security, pp.101847, 2020.
[4] Ashok Kumar C., Vimala R., "Load Balancing in Cloud Environment Exploiting Hybridization of Chicken Swarm and Enhanced Raven Roosting Optimization Algorithm", Multimedia Research, vol.3, no.1, pp. 45-55, 2020.
[5] Huang P., Fan K., Yang H., Zhang K., Li H. and Yang Y., “A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System”, IEEE Access, vol. 8, pp. 94780-94794, 2020.
[6] Pichan A., Lazarescu M. and Soh S.T., “Towards a practical cloud forensics logging framework”, Journal of Information Security and Applications, vol. 42, pp. 18-28, 2018.
[7] Balduzzi M., Zaddach J., Balzarotti D., Kirda E. and Loureiro S., “A security analysis of amazon`s elastic compute cloud service”, In Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1427-1434, March 2012.
[8] Subashini S. and Kavitha V., “A survey on security issues in service delivery models of cloud computing”, Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1-11, 2011.
[9] Zawoad S. and Hasan R., “Towards building proofs of past data possession in cloud forensics”, ASE Science Journal, vol. 1, no. 4, pp. 195-207, 2012.
[10] Birk D. and Wegener C., “Technical issues of forensic investigations in cloud computing environments”, In Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 1-10, May 2011.
[11] Grispos G., Storer T. and Glisson W.B., “Calm before the storm: The challenges of cloud computing in digital forensics”, International Journal of Digital Crime and Forensics (IJDCF), vol. 4, no. 2, pp. 28-48, 2012.
[12] Lokhande P. and Mane V., “Log based privacy preservation in cloud forensic”, 3rd International Conference on Electrical, Electronics, Engineering Trends, Communication, Optimization and Sciences (EEECOS 2016), Tadepalligudem, 2016, pp. 1-6, doi: 10.1049/cp.2016.1513.
[13] Zawoad S., Dutta A.K. and Hasan R., “Towards building forensics enabled cloud through secure logging-as-a-service”, IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp. 148-162, 2015.
[14] Goodin D., “Amazon cloud hosts nasty banking Trojan”, The Register, 2011.
[15] Zamani M., Safkhani M., Daneshpour N. and Abbasian A., “A New Searchable Encryption Scheme with Integrity Preservation Property”, Wireless Personal Communications, pp. 1-24, 2020.
[16] Jain P., “Decentralize Log File Storage and Integrity Preservation using Blockchain”, International Journal of Computer Science and Information Technologies, vol. 11, no. 2, pp. 21-30, 2020,
[17] Jayaraman I. and Panneerselvam A.S., “A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud”, Journal of Ambient Intelligence and Humanized Computing, pp.1-14, 2020.
[18] Dykstra, Josiah. "Seizing Electronic Evidence from Cloud Computing Environments." In Cloud Technology: Concepts, Methodologies, Tools, and Applications, IGI Global, Hershey, PA, pp. 2033-2062, 2015.
[19] Bellare, M. and Yee, B., “Forward-security in private-key cryptography”, In Cryptographers’ Track at the RSA Conference, Springer, Berlin, Heidelberg, pp. 1-18, April 2003.
[20] Garg, N., Bawa, S. and Kumar, N., “An efficient data integrity auditing protocol for cloud computing”, Future Generation Computer Systems, 2020.
[21] Devagnanam J, Elango N M, "Optimal Resource Allocation of Cluster using Hybrid Grey Wolf and Cuckoo Search Algorithm in Cloud Computing", Journal of Networking and Communication Systems, vol.3, no.1, pp. 31-40, 2020.
[22] Birk, D. and Wegener, C., “Technical issues of forensic investigations in cloud computing environments”, In Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 1-10, May 2011.
[23] Holt, J.E., “Logcrypt: forward security and public verification for secure audit logs”, In ACM international conference proceeding series, vol. 167, pp. 203-211, January 2006.
[24] Ma, D. and Tsudik, G., “A new approach to secure logging”, ACM Transactions on Storage (TOS), vol. 5, no. 1, pp. 1-21, 2009.
[25] Vhatkar Kapil Netaji, Bhole G P, "Optimal Container Resource Allocation Using Hybrid SA-MFO Algorithm in Cloud Architecture", Multimedia Research, vol.3, no.1, pp. 11-20, 2020.
[26] Rane, S., Wagh, S. and Dixit, A., “Securing Trustworthy Evidences for Robust Forensic Cloud in Spite of Multi-stakeholder Collusion Problem”, In International Conference on Hybrid Intelligent Systems, Springer, Cham, pp. 376-386, December 2019.
[27] Singh, K.D., Sharma, A., Singh, S., Singh, V. and Rane, S., “Integrity and confidentiality preservation in cloud”, In IEEE International conference of Electronics, Communication and Aerospace Technology (ICECA), vol. 2, pp. 419-424, April 2017.
[28] Dalezios, N., Shiaeles, S., Kolokotronis, N. and Ghita, B., “Digital forensics cloud log unification: Implementing CADF in Apache CloudStack”, Journal of Information Security and Applications, vol. 54, pp. 102555, 2020.
[29] Khan, M.N.A. and Ullah, S., “A log aggregation forensic analysis framework for cloud computing environments”, Computer Fraud & Security, no. 7, pp. 11-16, 2017.
[30] Patidar, M. and Bansal, P., “Log-Based Approach for Security Implementation in Cloud CRM’s”, In Data, Engineering and Applications, Springer, Singapore, pp. 33-43, 2019.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation