Title :
Anonymizing log management process for secure logging in the cloud
Author :
Rajalakshmi, J. Ramya ; Rathinraj, M. ; Braveen, M.
Author_Institution :
Dept. of Comput. Sci. & Eng., Dr. S.J.S. Paul Memorial Coll. of Eng. & Technol., Puducherry, India
Abstract :
Log files helps cyber forensic process in inquiring and seizing computer, obtaining electronic evidence for criminal investigations and maintaining computer records for the federal rules of evidence. So it can be said that logging is closely related to Forensic Computing. To make the logs permissible for the use in court, there is a stipulation to prove that the logs have not been modified after being generated. Moreover, since the logs contain private information, they must be protected strictly. Therefore a secure logging scheme that ensures the integrity and confidentiality of the logs is needed. And, deploying a secure logging infrastructure involves ample capital expenses that many organizations may find devastating. Delegating log management to the cloud appears to be a feasible cost saving measure. The challenges for a secure cloud-based log management service are identified and Homomorphic Encryption Scheme is proposed for doing the same.
Keywords :
cloud computing; criminal law; cryptography; digital forensics; computer records; criminal investigations; cyber forensic process; electronic evidence; federal evidence rules; forensic computing; homomorphic encryption scheme; log files; log management process anonymization; secure cloud-based log management service; secure logging infrastructure; Ciphers; Cloud computing; Computers; Encryption; Public key; Fully Homomorphic Algorithm Tor Network; Homomorphic Encryption; Log Management; Logging;
Conference_Titel :
Circuit, Power and Computing Technologies (ICCPCT), 2014 International Conference on
Print_ISBN :
978-1-4799-2395-3
DOI :
10.1109/ICCPCT.2014.7055014