1. Secure Cloud Log:
Security, Privacy, Admissibility
M A Manazir Ahsan
Supervisor: Dr. Ainuddin Wahid Bin Abdul Wahab
Co supervisor: Dr. Mohd Yamani Idna Bin Idris
2.
3. Malicious users misuse cloud computingIn case of occurence :
Traditional digital forensics: ??Confiscate devices then investigate
Cloud forensics: can not confiscate
Multi tenancy
Out of Jurisdiction
11. Challenges
Modification of log by CSP before publishing
Modification of log by CSP after publishing
Repudiation by cloud user
Privacy demolishing by investigator before investigation
Privacy demolishing by cloud employee investigator collaboration
Modification of log by investigator after publishing
12. Benchmark Paper
S. Zawoad, A. K. Dutta and R. Hasan, "Towards Building Forensics Enabled Cloud Through Secure
Logging-as-a-Service," in IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp.
148-162, March-April 1 2016.
Modification of log by CSP before publishing
Modification of log by CSP after publishing
Repudiation by cloud user
Privacy demolishing by investigator before investigation
Privacy demolishing by cloud employee and investigator collaboration
Modification of log by investigator after publishing
√
X
√
√
X
X