Distributed Log System in Cloud Digital Forensics

Ci Bin Jiang, I. Hsien Liu, Chuan Gang Liu, Yi Chen Chen, Jung Shian Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Cloud computing in recent years has become very popular and, indeed, many current applications are served from the cloud. Because the cloud architecture is based on virtual machines, VMs and VM management are quite important. Monitoring a large number of virtual machines is an important research topic. Since the establishment of the Personal Information Protection Act, there has been more attention focused on cloud security. Among cloud security topics, log analysis allows insight into virtual machine operation. If there are incidents, they need to be reported instantly in order to maintain information security. Consequently, log collection and real time warning systems are necessary. In this paper, we propose a distributed management architecture and evaluate its system performance. We also discuss the effects on the system due to bandwidth and background traffic ratios, VM numbers and transmission time using a set of simulations. The results show the proposed architecture not only saves time, but also reduces the load of log transmission for monitoring cloud services.

Original languageEnglish
Title of host publicationProceedings - 2016 International Computer Symposium, ICS 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages258-263
Number of pages6
ISBN (Electronic)9781509034383
DOIs
Publication statusPublished - 2017 Feb 16
Event2016 International Computer Symposium, ICS 2016 - Chiayi, Taiwan
Duration: 2016 Dec 152016 Dec 17

Publication series

NameProceedings - 2016 International Computer Symposium, ICS 2016

Other

Other2016 International Computer Symposium, ICS 2016
CountryTaiwan
CityChiayi
Period16-12-1516-12-17

All Science Journal Classification (ASJC) codes

  • Computer Vision and Pattern Recognition
  • Hardware and Architecture
  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint Dive into the research topics of 'Distributed Log System in Cloud Digital Forensics'. Together they form a unique fingerprint.

Cite this