{"title":"Secure Log Scheme for Cloud Forensics","authors":"Shweta Joshi, Geetha R. Chillarge","doi":"10.1109/I-SMAC49090.2020.9243428","DOIUrl":null,"url":null,"abstract":"Nowadays organization use the cloud infrastructure to store data as no local setup needed in the user system. To retrieve files from the cloud, the user needs internet service. When the internet comes into the picture, a lot of attacks happens on the cloud, and to detect & prevent those attacks, cloud forensics is used. Secure user log file on the cloud is also important as the cloud log contains valuable information which helps in forensics investigation. Previously designed logging systems have some drawbacks for providing security to the cloud user. The existing system provides security on user files which is uploaded by the user or they provide login authentication of the user. In this secure logging, the scheme is provided by encrypting cloud logs (sensitive information of the user) using encryption techniques and it identifies DDoS (distributed denial of service) assault on the cloud framework. It is distinguished through investigating accessible cloud logs in the cloud server. Encryption algorithms will be utilized to build the security of the logging system and to keep up secrecy and protection of client information.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SMAC49090.2020.9243428","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Nowadays organization use the cloud infrastructure to store data as no local setup needed in the user system. To retrieve files from the cloud, the user needs internet service. When the internet comes into the picture, a lot of attacks happens on the cloud, and to detect & prevent those attacks, cloud forensics is used. Secure user log file on the cloud is also important as the cloud log contains valuable information which helps in forensics investigation. Previously designed logging systems have some drawbacks for providing security to the cloud user. The existing system provides security on user files which is uploaded by the user or they provide login authentication of the user. In this secure logging, the scheme is provided by encrypting cloud logs (sensitive information of the user) using encryption techniques and it identifies DDoS (distributed denial of service) assault on the cloud framework. It is distinguished through investigating accessible cloud logs in the cloud server. Encryption algorithms will be utilized to build the security of the logging system and to keep up secrecy and protection of client information.