Design and Analysis of Multisource Logs Forensic With Lock Technique for Cloud Security Enhancement
Kalyan Bamane1, Dinesha H.A2
1Kalyan Devappa Bamane, Department of Computer Science and Engg. VTU Belgavi India.
2Dr. Dinesha H.A, Department of Computer Science and Engg. VTU Belgavi India.
Manuscript received on 25 August 2019. | Revised Manuscript received on 05 September 2019. | Manuscript published on 30 September 2019. | PP: 3912-3916 | Volume-8 Issue-11, September 2019. | Retrieval Number: K15100981119/2019©BEIESP | DOI: 10.35940/ijitee.K1510.0981119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Multisource cloud log forensics (MCLF) strengthens the investigation method by means of detecting the malicious behavior of hackers thru deep cloud log evaluation. But, the accessibility attributes of cloud logs thwarts accomplishing the purpose to analyze cloud logs. Accessibility consists of the productions of cloud log get admission to, selection of suitable cloud log file, cloud log information integrity, and cloud logs trustworthiness. Hence, forensic investigators of cloud log files are dependent on cloud provider vendors (CSPs) to get entry to of diverse cloud logs. Accessing cloud logs from outside the cloud without depending at the CSPs is once more a hard, whereas the boom in cloud assaults has improved the need for MCLF to research the malicious activities of attackers. Criminals are easily hiding incriminating files within the cloud system and altering the log contents. Hence lock mechanism has been added to MCLF technique. This paper reviews the MCLF with lock technique and highlights diverse challenges and issues involved in examining cloud log data. The logging mode, the importance of MCLF, and cloud multisource-log-as-a-service are introduced. The MCLF security necessities, weakness points, and experiments are recognized to tolerate altered cloud log susceptibilities. This paper represents the design and analysis details of MCLF with Lock technique.
Keywords: Cloud, Forensic, Logs, Multisource, Security
Scope of the Article: Cloud Resources Utilization in IoT