Abstract

User activity logs are important pieces of evidence in digital forensic investigations. In cloud forensics, it is difficult to collect user activity logs due to the fact of virtualization technologies and the multitenancy environment, which can infringe upon user privacy when collecting logs. Furthermore, the computing paradigm is shifting from conventional cloud computing toward edge computing, employing the advances of 5G network technology. This change in the computing paradigm has also brought about new challenges for digital forensics. Edge nodes that are close to users are exposed to security threats, and the collection of logs with limited computing resources is difficult. Therefore, this study proposes a logging scheme that considers log segmentation and distributed storage to collect logs from distributed edge nodes and to protect log confidentiality by taking into account edge-cloud characteristics. This scheme protects the integrity of log data collected by a multi-index chain network. To demonstrate the performance of the proposed scheme, edge nodes with three different capacity types were used, and the proposed log-segmentation method performed 29.4% to 64.2% faster than the Cloud-Log Assuring-Secrecy Scheme (CLASS) using 2048 bit Rivest-Shamir-Adleman (RSA) in three types of edge nodes for log-confidentiality protection. The log segmentation of edge CLASS (eCLASS) reduced the log size to approximately 58% less than CLASS log encryption, and edge-node CPU usage was also reduced from 14% to 28%.

Highlights

  • According to International Telecommunications Union Telecommunication (ITU-T) Study Group13 (SG13) [1] that is a group of international standardization organization that establishes cloud computing related standard technologies, an edge cloud is defined as “cloud computing deployed to the edge of the network accessed by cloud service customers (CSCs) with small-capacity resources enabling cloud service”

  • The edge CLASS (eCLASS) ensures log-data integrity and protects user privacy/service confidentiality for logs generated in edge nodes outside the geographic management scope

  • We proposed a secure logging scheme in edge clouds for digital forensics with features that facilitate the preservation of user privacy and confidentiality, ensure log data with a MIC

Read more

Summary

Introduction

According to International Telecommunications Union Telecommunication (ITU-T) Study Group. 13 (SG13) [1] that is a group of international standardization organization that establishes cloud computing related standard technologies, an edge cloud is defined as “cloud computing deployed to the edge of the network accessed by cloud service customers (CSCs) with small-capacity resources enabling cloud service”. The emergence of the edge-cloud paradigm has generated active efforts to redesign the network, increase coverage, boost network capacity, and cost-effectively bring content closer to the user. In 2017, attackers hacked into a thermometer installed in the aquarium of a casino hotel and infiltrated the Symmetry 2019, 11, 1192; doi:10.3390/sym11101192 www.mdpi.com/journal/symmetry. 22of attackers hacked into a thermometer installed in the aquarium of a casino hotel and infiltrated casino network. In May 2018, a company website was suspended for four days after an Internet of the casino network.

Problem Statement
Contributions
Edge Cloud
Conventional Cloud Logging Systems
Data Protection Techniques
Ensuring Data Integrity Technique
Edge-Cloud Threat Model and Security Properties
Terms and Definitions
General
Service-Extension Model
Edge-Federation Model
Threat Models
Security Properties
Overview
Log Collection Procedure
Log Verification Procedure
Performance and Security Evaluation
Implementation
12. Performance
Performance Analysis
Logging Processing Time
Computing Resource Allocation evaluation of CLASS RSA encryption and the data
Operation Cost
Summary
Security Analysis
Users or investigators can recover logs without cooperation with CSP
Findings
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.