Skip to main content

Log-Based Cloud Forensic Techniques: A Comparative Study

  • Conference paper
  • First Online:
Networking Communication and Data Knowledge Engineering

Abstract

Cloud computing is one of the most recent advancements in the field of distributed computing. It has gained a lot of attention due to its on demand, pay-per-use service, and all time availability, reliability, and scalability. Although it offers numerous advantages, but due to its multi-tenant architecture, it is prone to various malicious attacks and illegal activities. Cloud service provider (CSP) takes the responsibility to secure customers’ data against such attacks. In the event of such malicious activities, CSP aims to trace the intruder. Cloud forensic techniques help in identifying the attacker along with proper evidence in cloud platform. Components of clouds such as log records are then analyzed to track for such detrimental activities. In this paper, some existing log-based cloud forensic techniques have been widely studied. The detailed comparative analysis has been done for the various techniques based on their advantages and limitations. By exploring the limitations and advantages of the existing approaches, future research areas have been identified.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. In: Future Generation computer systems, 25(6), 599–616 (2009).

    Google Scholar 

  2. Mell, P., Grance, T.: The NIST definition of cloud computing (2011).

    Google Scholar 

  3. Birk, D., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: IEEE Sixth International Workshop In Systematic Approaches to Digital Forensic Engineering, 1–10 (2011).

    Google Scholar 

  4. Ruan, K., Carthy, J., Kechadi, T.: Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis. In: Proceedings of the Conference on Digital Forensics, Security and Law. (2011).

    Google Scholar 

  5. Zawoad, S., Dutta, A. K., Hasan, R: SecLaaS: secure logging-as-a-service for cloud forensics. In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 219–230 (2013).

    Google Scholar 

  6. Zargari, S., Benford, D.: Cloud forensics: Concepts, issues, and challenges. In: IEEE 2012 Third International Conference on Emerging Intelligent Data and Web Technologies, 236–243 (2012).

    Google Scholar 

  7. Sang, T: A log based approach to make digital forensics easier on cloud computing. In: Intelligent System Design and Engineering Applications (ISDEA), Third International Conference. 91–94 (2013).

    Google Scholar 

  8. Patrascu, A., & Patriciu, V. V.: Logging framework for cloud computing forensic environments. In: Communications (COMM), 10th International Conference, 1–4 (2014).

    Google Scholar 

  9. Rajalakshmi, J. R., Rathinraj, M., Braveen, M.: Anonymizing log management process for secure logging in the cloud. In: Circuit, Power and Computing Technologies (ICCPCT), 2014 International Conference, 1559–1564 (2014).

    Google Scholar 

  10. Lantz, B., Hall, R., Couraud, J.:Locking Down Log Files: Enhancing Network Security By Protecting Log Files. Issues in Information Systems, 7(2) (2006).

    Google Scholar 

  11. Fontaine, C., Galand, F: A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security, (2007).

    Google Scholar 

  12. Iyengar, N. C. S., Banerjee, A., Ganapathy, G.: A fuzzy logic based defense mechanism against distributed denial of service attack in cloud computing environment. In: International Journal of Communication Networks and Information Security, 6(3), 233 (2014).

    Google Scholar 

  13. Kim, J. S., Kim, D. G., & Noh, B. N.: A fuzzy logic based expert system as a network forensics. In Fuzzy Systems, 2004. Proceedings. 2004 IEEE International Conference (2), 879–884 (2004).

    Google Scholar 

  14. Idquantiquecom. (2015). IDQ. Retrieved 24 May, 2016, from http://www.idquantique.com/securing-the-cloud-with-quantum-safe-cryptography/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Koushik Majumder .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Santra, P., Roy, A., Midya, S., Majumder, K., Phadikar, S. (2018). Log-Based Cloud Forensic Techniques: A Comparative Study. In: Perez, G., Mishra, K., Tiwari, S., Trivedi, M. (eds) Networking Communication and Data Knowledge Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 4. Springer, Singapore. https://doi.org/10.1007/978-981-10-4600-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4600-1_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4599-8

  • Online ISBN: 978-981-10-4600-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics