Generic placeholder image

International Journal of Sensors, Wireless Communications and Control

Editor-in-Chief

ISSN (Print): 2210-3279
ISSN (Online): 2210-3287

Research Article

Augmenting the Operations on Cloud Virtual Forensic Data by Employing Probabilistic Data Structures

Author(s): Gayatri S. Pandi*, Saurabh Shah and K.H. Wandra

Volume 10, Issue 5, 2020

Page: [677 - 691] Pages: 15

DOI: 10.2174/2210327909666190710120838

Price: $65

Abstract

Background: Gathering and scrutinizing the different types of logs are the vital steps in the forensic domain. Logs are commonly gathered by the cloud service providers or by some third party layers which are governed by the cloud service providers. Security of the logs is a crucial issue as the logs can be tampered accidentally or intentionally by an employee in the cloud service provider’s organization or by the forensic investigator.

Objective: The algorithm designed assists in verifying the tampering of the virtual instance logs which can be accidental or intentional. Verification process confirms that the confidentiality and integrity of the logs remains intact. Verification of the potential evidence for past logs is normally carried out by the forensic investigator and the auditor.

Methods: The uniqueness of the research conducted in this paper is a technique which employs the cuckoo filter, which is supportive in proving the integrity of the potential evidences for past logs at a faster pace. The probabilistic data structures cuckoo filter and the bloom filter also support the concealment of logs.

Results: The implemented system and the results observed in it, are very promising in the cloud forensic domain. The performance of the algorithm is better than the earlier system implemented with the log chain and the database.

Conclusion: The secure framework designed in this research paper aids in proving the integrity of the virtual instance logs. The evidence verification process supports concealment of data also.

Keywords: Cloud forensic, cuckoo filter, integrity, confidentiality, false positives, virtual instances.

Graphical Abstract


Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy