SECURE LOG FORENSICS AS A SERVICE IN CLOUD COMPUTING

Main Article Content

Varsha Tak
Rajendra Kachhwaha
Ram Niwash Mahia

Abstract

With the advent of internet and technology, cloud computing is globally acceptable for each and every service in the industry. With this huge escalation in implementation, the cloud environment is exposed to an attacker with a large attack surface. So there is an emergent requirement to facilitate forensic investigators to collect, analyze and produce evidence from the cloud environment, which can be used in court cases. Logs maintain useful data regarding activities or events of system, network. This information is very expensive to prove attacks in court cases. So, protection is required and also maintained integrity, confidentially, security of logs. To collect and analyze log messages from different sources like a router, switch, virtual machine, firewalls, operating system. These logs are categorized with a regular expression and to store in particular encrypted format. To overcome threads cost and improve security, an organization should be moved towards the cloud. Using cloud-based log forensics, investigator easily gathers the log and conduct investigation. In cloud computing environment they also used in forensics to prove attacks and increase confidentiality.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biographies

Varsha Tak, Sardar Patel University of Police, Security and Criminal Justice, Jodhpur

Department of Computer Science and Engineering Student

Rajendra Kachhwaha, MBM Engineering College, Jai Narain Vyas University, Jodhpur.

Department of Computer Science and Engineering. Guest Faculty

Ram Niwash Mahia, MBM Engineering College, Jai Narain Vyas University, Jodhpur.

Department of Computer Science and Engineering. Guest Faculty