CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics

0
1351
CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics

CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics

Abstract

In cloud forensic investigations, user activity logs can be a valuable source of information; thus ensuring the reliability and integrity of such logs is crucial. CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics Most of the existing secure logging solutions are designed for conventional systems rather than cloud environment complexity. In this paper, we propose the process of Cloud Log Assuring Soundness and Secrecy (CLASS) as an alternative scheme for securing logs in a cloud environment.
 

CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics In CLASS, logs are encrypted using the public key of the individual user, so that only the user can decrypt the content. To prevent unauthorized log modification, we use Rabin’s fingerprint and Bloom filter to generate proof of past log (PPL). Such an approach significantly reduces verification time. In a real-world context, findings from our experiments deploying CLASS in OpenStack demonstrate the utility of CLASS.

System Configuration

H/W System Configuration
Speed                   : 1.1 GHz
 
RAM                      : 256 MB(min)
 
Hard Disk              : 20 GB
 
Floppy Drive          : 1.44 MB
 
Key Board             : Standard Windows Keyboard
 
Mouse                  : Two or Three Button Mouse
 
Monitor                : SVGA
 
S/W System Configuration
 
 
Platform                     :  cloud computing

 
Operating system       : Windows Xp,7,
 
Server                       : WAMP/Apache
 
Working on                : Browser Like Firefox, IE

Conclusion

In this paper, we proposed a secure logging scheme (CLASS) for cloud computing with features that facilitate user privacy preservation and mitigate the harmful effects of collusion among other parties. CLASS preserves the privacy of cloud users by encrypting cloud logs with the respective user’s public key while also facilitating log retrieval in the event of an investigation. It also ensures the accountability of the cloud server by allowing the user to identify any log changes.