Blockchain-based Automated Container Cloud Security Enhancement System

Author(s):  
Jiahao Sun ◽  
Chengrong Wu ◽  
Jiawei Ye

Multisource cloud log forensics (MCLF) strengthens the investigation method by means of detecting the malicious behavior of hackers thru deep cloud log evaluation. But, the accessibility attributes of cloud logs thwarts accomplishing the purpose to analyze cloud logs. Accessibility consists of the productions of cloud log get admission to, selection of suitable cloud log file, cloud log information integrity, and cloud logs trustworthiness. Hence, forensic investigators of cloud log files are dependent on cloud provider vendors (CSPs) to get entry to of diverse cloud logs. Accessing cloud logs from outside the cloud without depending at the CSPs is once more a hard, whereas the boom in cloud assaults has improved the need for MCLF to research the malicious activities of attackers. Criminals are easily hiding incriminating files within the cloud system and altering the log contents. Hence lock mechanism has been added to MCLF technique. This paper reviews the MCLF with lock technique and highlights diverse challenges and issues involved in examining cloud log data. The logging mode, the importance of MCLF, and cloud multisource-log-as-a-service are introduced. The MCLF security necessities, weakness points, and experiments are recognized to tolerate altered cloud log susceptibilities. This paper represents the design and analysis details of MCLF with Lock technique.


Author(s):  
Tiejun Jia ◽  
Ximing Xiao ◽  
Fujie Zhang ◽  
Zhaohong Feng

2019 ◽  
Vol 7 (2) ◽  
pp. 342-348
Author(s):  
Vaishali Singh ◽  
Kavita Bhatia ◽  
S. K. Pandey

2018 ◽  
Vol 6 (5) ◽  
pp. 473-478
Author(s):  
K. K. Chauhan ◽  
◽  
◽  
A. K. S. Sanger

2014 ◽  
Vol 1 (1) ◽  
pp. 1-5
Author(s):  
Poonam Rawat ◽  
◽  
Neha Rawat ◽  
Shikha Singh ◽  
Awantika . ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document