Abstract
Cloud computing is one of the most recent advancements in the field of distributed computing. It has gained a lot of attention due to its on demand, pay-per-use service, and all time availability, reliability, and scalability. Although it offers numerous advantages, but due to its multi-tenant architecture, it is prone to various malicious attacks and illegal activities. Cloud service provider (CSP) takes the responsibility to secure customers’ data against such attacks. In the event of such malicious activities, CSP aims to trace the intruder. Cloud forensic techniques help in identifying the attacker along with proper evidence in cloud platform. Components of clouds such as log records are then analyzed to track for such detrimental activities. In this paper, some existing log-based cloud forensic techniques have been widely studied. The detailed comparative analysis has been done for the various techniques based on their advantages and limitations. By exploring the limitations and advantages of the existing approaches, future research areas have been identified.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. In: Future Generation computer systems, 25(6), 599–616 (2009).
Mell, P., Grance, T.: The NIST definition of cloud computing (2011).
Birk, D., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: IEEE Sixth International Workshop In Systematic Approaches to Digital Forensic Engineering, 1–10 (2011).
Ruan, K., Carthy, J., Kechadi, T.: Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis. In: Proceedings of the Conference on Digital Forensics, Security and Law. (2011).
Zawoad, S., Dutta, A. K., Hasan, R: SecLaaS: secure logging-as-a-service for cloud forensics. In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 219–230 (2013).
Zargari, S., Benford, D.: Cloud forensics: Concepts, issues, and challenges. In: IEEE 2012 Third International Conference on Emerging Intelligent Data and Web Technologies, 236–243 (2012).
Sang, T: A log based approach to make digital forensics easier on cloud computing. In: Intelligent System Design and Engineering Applications (ISDEA), Third International Conference. 91–94 (2013).
Patrascu, A., & Patriciu, V. V.: Logging framework for cloud computing forensic environments. In: Communications (COMM), 10th International Conference, 1–4 (2014).
Rajalakshmi, J. R., Rathinraj, M., Braveen, M.: Anonymizing log management process for secure logging in the cloud. In: Circuit, Power and Computing Technologies (ICCPCT), 2014 International Conference, 1559–1564 (2014).
Lantz, B., Hall, R., Couraud, J.:Locking Down Log Files: Enhancing Network Security By Protecting Log Files. Issues in Information Systems, 7(2) (2006).
Fontaine, C., Galand, F: A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security, (2007).
Iyengar, N. C. S., Banerjee, A., Ganapathy, G.: A fuzzy logic based defense mechanism against distributed denial of service attack in cloud computing environment. In: International Journal of Communication Networks and Information Security, 6(3), 233 (2014).
Kim, J. S., Kim, D. G., & Noh, B. N.: A fuzzy logic based expert system as a network forensics. In Fuzzy Systems, 2004. Proceedings. 2004 IEEE International Conference (2), 879–884 (2004).
Idquantiquecom. (2015). IDQ. Retrieved 24 May, 2016, from http://www.idquantique.com/securing-the-cloud-with-quantum-safe-cryptography/.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Santra, P., Roy, A., Midya, S., Majumder, K., Phadikar, S. (2018). Log-Based Cloud Forensic Techniques: A Comparative Study. In: Perez, G., Mishra, K., Tiwari, S., Trivedi, M. (eds) Networking Communication and Data Knowledge Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 4. Springer, Singapore. https://doi.org/10.1007/978-981-10-4600-1_5
Download citation
DOI: https://doi.org/10.1007/978-981-10-4600-1_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-4599-8
Online ISBN: 978-981-10-4600-1
eBook Packages: EngineeringEngineering (R0)