Distributed Log System in Cloud Digital Forensics

Cloud computing in recent years has become very popular and, indeed, many current applications are served from the cloud. Because the cloud architecture is based on virtual machines, VMs and VM management are quite important. Monitoring a large number of virtual machines is an important research topic. Since the establishment of the Personal Information Protection Act, there has been more attention focused on cloud security. Among cloud security topics, log analysis allows insight into virtual machine operation. If there are incidents, they need to be reported instantly in order to maintain information security. Consequently, log collection and real time warning systems are necessary. In this paper, we propose a distributed management architecture and evaluate its system performance. We also discuss the effects on the system due to bandwidth and background traffic ratios, VM numbers and transmission time using a set of simulations. The results show the proposed architecture not only saves time, but also reduces the load of log transmission for monitoring cloud services.

[1]  Shreyas Sundaram,et al.  Topological Conditions for In-Network Stabilization of Dynamical Systems , 2013, IEEE Journal on Selected Areas in Communications.

[2]  D. Manjunath,et al.  Efficient Flow Allocation Algorithms for In-Network Function Computation , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[3]  Zafar Jafarov Notice of Violation of IEEE Publication PrinciplesArchitecture of an intelligent system for information security management , 2013, 2013 7th International Conference on Application of Information and Communication Technologies.

[4]  Mark Ryan,et al.  Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..

[5]  J. Uddin,et al.  Impact of background utilization and background traffic on the foreground applications in a wide area network , 2012 .

[6]  Ruoqing Zhang,et al.  An efficient scheme for log integrity check in security monitoring system , 2013 .

[7]  Baldev Singh An Analysis of Cloud Computing Security Issues , 2016 .

[8]  Ioannis N. Athanasiadis,et al.  Privacy-preserving computation of participatory noise maps in the cloud , 2014, J. Syst. Softw..

[9]  Anil Rawat,et al.  User and Device Tracking in Private Networks by Correlating Logs: A System for Responsive Forensic Analysis , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[10]  Jeffrey D. Case,et al.  Simple Network Management Protocol (SNMP) , 1989, RFC.

[11]  Panganamala Ramana Kumar,et al.  Toward a theory of in-network computation in wireless sensor networks , 2006, IEEE Communications Magazine.

[12]  Shaojie Tang,et al.  Data gathering in wireless sensor networks through intelligent compressive sensing , 2012, 2012 Proceedings IEEE INFOCOM.

[13]  Naruemon Wattanapongsakorn,et al.  A centralized management framework of network-based Intrusion Detection and Prevention System , 2013, The 2013 10th International Joint Conference on Computer Science and Software Engineering (JCSSE).

[14]  Wei Wang,et al.  Notice of RetractionA Campus Network Security Emergency Response Technical System Based on Emergency Log , 2010, 2010 2nd International Conference on E-business and Information System Security.

[15]  Moses Moyo,et al.  Information security risk management in small-scale organisations: A case study of secondary schools computerised information systems , 2013, 2013 Information Security for South Africa.

[16]  Bashar Nuseibeh,et al.  Protecting Privacy in the Cloud: Current Practices, Future Directions , 2016, Computer.

[17]  William Stallings,et al.  SNMP, SNMPv2, SNMPv3, and RMON 1 and 2 , 1999 .

[18]  Chi-Tsun Cheng,et al.  A Delay-Aware Network Structure for Wireless Sensor Networks With In-Network Data Fusion , 2013, IEEE Sensors Journal.

[19]  Gerald Keller Statistics for Management and Economics: Abbreviated , 2003 .

[20]  Amin Vahdat,et al.  Evaluating Distributed Systems: Does Background Traffic Matter? , 2008, USENIX Annual Technical Conference.

[21]  Indrajit Ray,et al.  Secure Logging as a Service—Delegating Log Management to the Cloud , 2013, IEEE Systems Journal.

[22]  Robert Shorten,et al.  Adaptive tuning of drop-tail buffers for reducing queueing delays , 2006, IEEE Communications Letters.

[23]  A. Behl,et al.  An analysis of cloud computing security issues , 2012, 2012 World Congress on Information and Communication Technologies.

[24]  Shrisha Rao,et al.  A Mechanism Design Approach to Resource Procurement in Cloud Computing , 2014, IEEE Transactions on Computers.

[25]  Xinbing Wang,et al.  Energy and latency analysis for in-network computation with compressive sensing in wireless sensor networks , 2012, 2012 Proceedings IEEE INFOCOM.

[26]  Jianping Wu,et al.  A scalable, Web-based architecture for hierarchical network management , 1999, Seamless Interconnection for Universal Services. Global Telecommunications Conference. GLOBECOM'99. (Cat. No.99CH37042).