메뉴 건너뛰기




Volumn 49, Issue 1, 2016, Pages

Cloud log forensics: Foundations, state of the art, and future directions

Author keywords

Authenticity; Big data; Cloud computing; Cloud log forensics; Confidentiality; Correlation of cloud logs; Integrity

Indexed keywords

BIG DATA; CLOUD COMPUTING; NETWORK SECURITY; TRANSPORTATION; WELL LOGGING;

EID: 84971268778     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/2906149     Document Type: Article
Times cited : (71)

References (107)
  • 3
    • 84901446600 scopus 로고    scopus 로고
    • A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing
    • A. Gani, G. M. Nayeem, M. Shiraz, M. Sookhak, M. Whaiduzzaman, and S. Khan. 2014. A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing. J. Network Comput. Appl. 43 (2014), 84-102.
    • (2014) J. Network Comput. Appl. , vol.43 , Issue.2014 , pp. 84-102
    • Gani, A.1    Nayeem, G.M.2    Shiraz, M.3    Sookhak, M.4    Whaiduzzaman, M.5    Khan, S.6
  • 5
    • 84863395085 scopus 로고    scopus 로고
    • Advances and challenges in log analysis
    • 2012
    • A. Oliner, A. Ganapathi, and W. Xu. 2012. Advances and challenges in log analysis. Commun. ACM 55, 2 (2012), 55-61.
    • (2012) Commun. ACM , vol.55 , Issue.2 , pp. 55-61
    • Oliner, A.1    Ganapathi, A.2    Xu, W.3
  • 7
    • 84928256466 scopus 로고    scopus 로고
    • Logging for cloud computing forensic systems
    • 2015
    • A. Patrascu and V. V. Patriciu. 2015. Logging for cloud computing forensic systems. Int. J. Comput. Commun. Control 10, 2 (2015), 222-229.
    • (2015) Int. J. Comput. Commun. Control , vol.10 , Issue.2 , pp. 222-229
    • Patrascu, A.1    Patriciu, V.V.2
  • 8
    • 84971331079 scopus 로고    scopus 로고
    • Extending access management to maintain audit logs in cloud computing
    • A. Prasad and P. Chakrabarti. 2014. Extending access management to maintain audit logs in cloud computing. Int. J. Adv. Comput. Sci. Appl. 5, 3 (2014), 144-147.
    • (2014) Int. J. Adv. Comput. Sci. Appl. , vol.5 , Issue.3 , pp. 144-147
    • Prasad, A.1    Chakrabarti, P.2
  • 9
    • 84875384473 scopus 로고    scopus 로고
    • Secure log architecture to support remote auditing
    • 2013
    • A. Rafael. 2013. Secure log architecture to support remote auditing. Math. Comput. Model. 57, 7 (2013), 1578-1591.
    • (2013) Math. Comput. Model. , vol.57 , Issue.7 , pp. 1578-1591
    • Rafael, A.1
  • 12
    • 84971331083 scopus 로고    scopus 로고
    • Amazon., 2015. Retrieved November 16, 2015, from
    • Amazon. 2015. Amazon Simple Notification Service. (2015). Retrieved November 16, 2015, from http://aws.amazon.com/sns/.
    • (2015) Amazon Simple Notification Service
  • 15
    • 33745203225 scopus 로고    scopus 로고
    • Risks of live digital forensic analysis
    • 2006
    • B. R. Carrier. 2006. Risks of live digital forensic analysis. Commun. ACM 49, 2 (2006), 56-61.
    • (2006) Commun. ACM , vol.49 , Issue.2 , pp. 56-61
    • Carrier, B.R.1
  • 17
    • 84971288385 scopus 로고    scopus 로고
    • 2009, Retrieved November 16, 2015, from
    • C. Oppenheimer. 2009. Loggly reveals what matters. (2009). Retrieved November 16, 2015, from https://www.loggly.com/.
    • (2009) Loggly Reveals What Matters
    • Oppenheimer, C.1
  • 18
    • 84874108116 scopus 로고    scopus 로고
    • Beyond lightning: A survey on security challenges in cloud computing
    • 2013
    • C. Rong, S. T. Nguyen, and M. G. Jaatun. 2013. Beyond lightning: A survey on security challenges in cloud computing. Comput. Electr. Eng. 39, 1 (2013), 47-54.
    • (2013) Comput. Electr. Eng. , vol.39 , Issue.1 , pp. 47-54
    • Rong, C.1    Nguyen, S.T.2    Jaatun, M.G.3
  • 20
    • 84865625452 scopus 로고    scopus 로고
    • Technical challenges of forensic investigations in cloud computing environments
    • Zurich, Switzerland
    • D. Birk. 2011. Technical challenges of forensic investigations in cloud computing environments. In Workshop on Cryptography and Security in Clouds. Zurich, Switzerland, 1-6.
    • (2011) Workshop on Cryptography and Security in Clouds , pp. 1-6
    • Birk, D.1
  • 23
    • 70349593268 scopus 로고    scopus 로고
    • Gramm-Leach-Bliley act, information privacy, and the limits of default rules
    • E. J. Janger and P.M. Schwartz. 2001. Gramm-Leach-Bliley act, information privacy, and the limits of default rules. The. Minn. L. Rev. 86 (2001), 1219.
    • (2001) The. Minn. L. Rev. , vol.86 , pp. 1219
    • Janger, E.J.1    Schwartz, P.M.2
  • 24
    • 84971331063 scopus 로고    scopus 로고
    • 2014. Retrieved November 16, 2015, from
    • E. Lindvall. 2014. How Papertrail makes life easier. (2014). Retrieved November 16, 2015, from https://papertrailapp.com/.
    • (2014) How Papertrail Makes Life Easier
    • Lindvall, E.1
  • 28
    • 84870254680 scopus 로고    scopus 로고
    • Digital forensic investigation of cloud storage services
    • H. Chung, J. Park, S. Lee, and C. Kang. 2012. Digital forensic investigation of cloud storage services. Digital Invest. 9, 2 (2012), 81-95.
    • (2012) Digital Invest. , vol.9 , Issue.2 , pp. 81-95
    • Chung, H.1    Park, J.2    Lee, S.3    Kang, C.4
  • 30
    • 84907325157 scopus 로고    scopus 로고
    • The rise of "big data" on cloud computing: Review and open research issues
    • I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. U. Khan. The rise of "big data" on cloud computing: Review and open research issues. Inform. Syst. 47 (2015), 98-115.
    • (2015) Inform. Syst. , vol.47 , pp. 98-115
    • Hashem, I.A.T.1    Yaqoob, I.2    Anuar, N.B.3    Mokhtar, S.4    Gani, A.5    Khan, S.U.6
  • 32
    • 84876811768 scopus 로고    scopus 로고
    • Secure logging as a service-delegating log management to the cloud
    • 2013
    • I. Ray, K. Belyaev, M. Strizhov, D. Mulamba, and M. Rajaram. 2013. Secure logging as a service-delegating log management to the cloud. IEEE Syst. J. 7 (2013), 323-334.
    • (2013) IEEE Syst. J. , vol.7 , pp. 323-334
    • Ray, I.1    Belyaev, K.2    Strizhov, M.3    Mulamba, D.4    Rajaram, M.5
  • 33
    • 84864612252 scopus 로고    scopus 로고
    • Understanding issues in cloud forensics: Two hypothetical case studies
    • J. Dykstra and A. T. Sherman. 2011. Understanding issues in cloud forensics: Two hypothetical case studies. J. Network Forens. 3, 1 (2011), 19-31.
    • (2011) J. Network Forens. , vol.3 , Issue.1 , pp. 19-31
    • Dykstra, J.1    Sherman, A.T.2
  • 37
    • 84971206231 scopus 로고    scopus 로고
    • 2014. Retrieved November 16, 2015, from
    • J. Sissel. 2014. Process any data, from any source. (2014). Retrieved November 16, 2015, from https://www.elastic.co/products/logstash.
    • (2014) Process Any Data, from Any Source
    • Sissel, J.1
  • 39
    • 79953653695 scopus 로고    scopus 로고
    • Monitoring cloud computing by layer, part 1
    • J. Spring. 2011. Monitoring cloud computing by layer, part 1. IEEE Security Privacy 9, 2 (2011), 66-68.
    • (2011) IEEE Security Privacy , vol.9 , Issue.2 , pp. 66-68
    • Spring, J.1
  • 40
    • 84971301533 scopus 로고    scopus 로고
    • Amazon. Retrieved November 16, 2015, from
    • J. Stoppelman. 2004. AWS Case Study: Yelp. Case Study. Amazon. Retrieved November 16, 2015, from https://aws.amazon.com/solutions/case-studies/yelp/.
    • (2004) AWS Case Study: Yelp. Case Study
    • Stoppelman, J.1
  • 41
    • 84971348067 scopus 로고    scopus 로고
    • Security and privacy controls for federal information systems and organizations
    • 2013
    • J. T. Force and T. Initiative. 2013. Security and privacy controls for federal information systems and organizations. NIST Spec. Publ. 800 (2013), 53.
    • (2013) NIST Spec. Publ. , vol.800 , pp. 53
    • Force, J.T.1    Initiative, T.2
  • 43
    • 84997698175 scopus 로고    scopus 로고
    • LISS: Log data integrity support scheme for reliable log analysis of osp
    • J. W. Joo, J. H. Park, S. K. Suk, and D. G. Lee. 2014. LISS: Log data integrity support scheme for reliable log analysis of osp. J. Converg. 5, 4 (2014), 1-5.
    • (2014) J. Converg. , vol.5 , Issue.4 , pp. 1-5
    • Joo, J.W.1    Park, J.H.2    Suk, S.K.3    Lee, D.G.4
  • 53
    • 84872709161 scopus 로고    scopus 로고
    • Key terms for service level agreements to support cloud forensics
    • Springer, Berlin
    • K. Ruan, J. James, J. Carthy, and T. Kechadi. 2012. Key terms for service level agreements to support cloud forensics. Advances in Digital Forensics VIII. Springer, Berlin, 201-212.
    • (2012) Advances in Digital Forensics VIII. , pp. 201-212
    • Ruan, K.1    James, J.2    Carthy, J.3    Kechadi, T.4
  • 56
  • 59
    • 84971208566 scopus 로고    scopus 로고
    • 2013. Retrieved November 16, 2015, from
    • M. Ellis. 2013. IBM Operations Analytics-Log Analysis. (2013). Retrieved November 16, 2015, from http://www-03.ibm.com/software/products/en/ibm-operations-analytics-log-analysis.
    • (2013) IBM Operations Analytics-Log Analysis
    • Ellis, M.1
  • 61
    • 84891910899 scopus 로고    scopus 로고
    • Secure log transfer by replacing a library in a virtual machine
    • Springer, Berlin
    • M. Sato and T. Yamauchi. 2013. Secure log transfer by replacing a library in a virtual machine. In Advances in Information and Computer Security. Springer, Berlin, 1-18.
    • (2013) Advances in Information and Computer Security. , pp. 1-18
    • Sato, M.1    Yamauchi, T.2
  • 62
    • 84925485658 scopus 로고    scopus 로고
    • Energy efficient computational offloading framework for mobile cloud computing
    • M. Shiraz, A. Gani, A. Shamim, S. Khan, and R. W. Ahmad. 2015. Energy efficient computational offloading framework for mobile cloud computing. J. Grid Comput. 13, 1 (2015), 1-18.
    • (2015) J. Grid Comput. , vol.13 , Issue.1 , pp. 1-18
    • Shiraz, M.1    Gani, A.2    Shamim, A.3    Khan, S.4    Ahmad, R.W.5
  • 63
    • 79954589576 scopus 로고    scopus 로고
    • Forensic investigation of cloud computing systems
    • M. Taylor, J. Haggerty, D. Gresty, and D. Lamb. 2011. Forensic investigation of cloud computing systems. Network Security 2011, 3 (2011), 4-10.
    • (2011) Network Security , vol.2011 , Issue.3 , pp. 4-10
    • Taylor, M.1    Haggerty, J.2    Gresty, D.3    Lamb, D.4
  • 65
    • 84971331318 scopus 로고    scopus 로고
    • Encrypted query processing based log management in the cloud for improved potential for confidentiality
    • N. Prabha, C. Timotta, T. Rajan, and A. Jaleef PK. 2014. Encrypted query processing based log management in the cloud for improved potential for confidentiality. Int. J. Comput. Appl. Technol. Res. 3, 5. (2014), 309-311.
    • (2014) Int. J. Comput. Appl. Technol. Res. , vol.3 , Issue.5 , pp. 309-311
    • Prabha, N.1    Timotta, C.2    Rajan, T.3    Jaleef, P.K.A.4
  • 67
    • 84971341739 scopus 로고    scopus 로고
    • 2014. Retrieved November 16, 2015, from
    • P. Heath. 2014. Monitor your apps every single second. (2014). Retrieved November 16, 2015, from http://www.bmc.com/truesightpulse/customers/.
    • (2014) Monitor Your Apps Every Single Second.
    • Heath, P.1
  • 70
    • 84927804589 scopus 로고    scopus 로고
    • Sierpinski triangle based data center architecture in cloud computing
    • Q. Han, M. Shiraz, A. Gani, M. Whaiduzzaman, and S. Khan. 2014. Sierpinski triangle based data center architecture in cloud computing. J. Supercomput. 69, 2 (2014), 887-907.
    • (2014) J. Supercomput. , vol.69 , Issue.2 , pp. 887-907
    • Han, Q.1    Shiraz, M.2    Gani, A.3    Whaiduzzaman, M.4    Khan, S.5
  • 73
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • (2009
    • R. Buyya, C. S. Yeo, S. Venugopalirk, J. Broberg, and I. Brandic. 2009. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Comput. Syst. 25, 6 (2009), 599-616.
    • (2009) Future Generation Comput. Syst. , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Yeo, C.S.2    Venugopalirk, S.3    Broberg, J.4    Brandic, I.5
  • 74
    • 84971292033 scopus 로고    scopus 로고
    • 2014. Retrieved November 16, 2015 from
    • R. Dahl. 2014. Node.js on the Road. (2014). Retrieved November 16, 2015 from https://www.joyent.com/noderoad.
    • (2014) Node.js on the Road
    • Dahl, R.1
  • 83
    • 84904646449 scopus 로고    scopus 로고
    • A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing
    • 2014), 27
    • S. Khan, M. Shiraz, A. W. A. Wahab, A. Gani, Q. Han, and Z. B. A. Rahman. 2014b. A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing. Sci. World J. 2014, 547062 (2014), 27.
    • (2014) Sci. World J. , vol.2014 , pp. 547062
    • Khan, S.1    Shiraz, M.2    Wahab, A.W.A.3    Gani, A.4    Han, Q.5    Rahman, Z.B.A.6
  • 86
  • 87
    • 84866017796 scopus 로고    scopus 로고
    • Flag commit: Supporting efficient transaction recovery in flash-based dbmss
    • 2012
    • S. T. On, J. Xu, B. Choi, H. Hu, and B. He. 2012. Flag commit: Supporting efficient transaction recovery in flash-based dbmss. IEEE Trans. Knowled. Data Eng. 24, 9 (2012), 1624-1639.
    • (2012) IEEE Trans. Knowled. Data Eng. , vol.24 , Issue.9 , pp. 1624-1639
    • On, S.T.1    Xu, J.2    Choi, B.3    Hu, H.4    He, B.5
  • 90
    • 79958195538 scopus 로고    scopus 로고
    • Enforcing data quality rules for a synchronized VM log audit environment using transformation mapping techniques
    • Springer, Berlin
    • S. Thorpe, I. Ray, and T. Grandison. 2011c. Enforcing data quality rules for a synchronized VM log audit environment using transformation mapping techniques. In Computational Intelligence in Security for Information Systems. Springer, Berlin, 265-271.
    • (2011) Computational Intelligence in Security for Information Systems. , pp. 265-271
    • Thorpe, S.1    Ray, I.2    Grandison, T.3
  • 92
    • 84881157523 scopus 로고    scopus 로고
    • Hypervisor event logs as a source of consistent virtual machine evidence for forensic cloud investigations
    • Springer, Berlin
    • S. Thorpe, I. Ray, T. Grandison, A. Barbir, and R. France. 2013b. Hypervisor event logs as a source of consistent virtual machine evidence for forensic cloud investigations. In Data and Applications Security and Privacy XXVII. Springer, Berlin, 97-112.
    • (2013) Data and Applications Security and Privacy , vol.27 , pp. 97-112
    • Thorpe, S.1    Ray, I.2    Grandison, T.3    Barbir, A.4    France, R.5
  • 93
    • 84971328814 scopus 로고    scopus 로고
    • A formal temporal log data model for the global synchronized virtual machine environment
    • S. Thorpe, I. Ray, I. Ray, and T. Grandison. 2011d. A formal temporal log data model for the global synchronized virtual machine environment. Int. J. Inform. Assur. Secur. 6, 2 (2011), 398-406.
    • (2011) Int. J. Inform. Assur. Secur. , vol.6 , Issue.2 , pp. 398-406
    • Thorpe, S.1    Ray, I.2    Ray, I.3    Grandison, T.4
  • 94
    • 84873957734 scopus 로고    scopus 로고
    • Formal parameterization of log synchronization events within a distributed forensic compute cloud database environment
    • Springer, Berlin
    • S. Thorpe, I. Ray, I. Ray, T. Grandison, A. Barbir, and R. France. 2012b. Formal parameterization of log synchronization events within a distributed forensic compute cloud database environment. In Digital Forensics and Cyber Crime. Springer, Berlin, 156-171.
    • (2012) Digital Forensics and Cyber Crime. , pp. 156-171
    • Thorpe, S.1    Ray, I.2    Ray, I.3    Grandison, T.4    Barbir, A.5    France, R.6
  • 97
    • 84971348030 scopus 로고    scopus 로고
    • (2014). Retrieved November 16th, 2015 from
    • T. R. Wyatt. 2009. Mission: Messaging: Circular Logs Vs Linear Logs. (2014). Retrieved November 16th, 2015 from http://www.ibm.com/developerworks/websphere/techjournal/0904-mismes.html.
    • (2009) Mission: Messaging: Circular Logs Vs Linear Logs
    • Wyatt, T.R.1
  • 100
    • 84944030615 scopus 로고    scopus 로고
    • Infrastructure Security. Springer, Berlin
    • U. Flegel. 2002. Pseudonymizing unix log files. In Infrastructure Security. Springer, Berlin, 162-179.
    • (2002) Pseudonymizing Unix Log Files , pp. 162-179
    • Flegel, U.1
  • 101
    • 85015519601 scopus 로고    scopus 로고
    • Hypervisor security in cloud computing systems
    • V. Wesley, T. Harris, L. Long Jr., and R. Green. 2014. Hypervisor security in cloud computing systems. ACM Comput. Surv. (2014), 1-22.
    • (2014) ACM Comput. Surv. , vol.2014 , pp. 1-22
    • Wesley, V.1    Harris, T.2    Long, L.3    Green, R.4
  • 105
    • 84923927275 scopus 로고    scopus 로고
    • Towards building a forensics aware language for secure logging
    • Z. Shams, M. Mernik, and R. Hasan. 2014. Towards building a forensics aware language for secure logging. Comput. Sci. Inform. Syst. 11, 4 (2014), 1291-1314.
    • (2014) Comput. Sci. Inform. Syst. , vol.11 , Issue.4 , pp. 1291-1314
    • Shams, Z.1    Mernik, M.2    Hasan, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.