Creating an Immutable Database for Secure Cloud Audit Trail and System Logging

Robert Anderson Keith Duncan, Mark Whittington

Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

6 Downloads (Pure)

Abstract

Conventional web based systems present a multiplicity of attack vectors. One of the main components, the database, is frequently configured incorrectly, often using default settings, which leave the system wide open to attack. Once a system has been attacked, valuable audit trail and system log data is usually deleted to cover the trail of the perpetrator. Given the average industry time between breach and discovery, there is often little forensic trail left to follow. Of equal importance is that in cloud settings, where new instances are automatically spooled and shut down to follow the demand curve, any data stored on the running instance before shut down is lost. We demonstrate how the configuration of a simple immutable database, running on a separate private system can go a long way to resolving this problem.
Original languageEnglish
Title of host publicationEighth International Conference on Cloud Computing, GRIDs, and Virtualization, 19 February 2017 - 23 February 2017, Athens, Greece
Place of PublicationAthens, Greece
PublisherIARIA
Pages54-59
Number of pages6
ISBN (Print)978-1-61208-529-6
Publication statusPublished - 20 Feb 2017
EventEighth International Conference on Cloud Computing, GRIDs, and Virtualization, 19 February 2017 - 23 February 2017, Athens, Greece - Novotel Athens Hotel, Athens, Greece
Duration: 19 Feb 201723 Mar 2017
http://www.iaria.org/conferences2017/ProgramCLOUDCOMPUTING17.html

Publication series

Name
ISSN (Print)2308-4294

Conference

ConferenceEighth International Conference on Cloud Computing, GRIDs, and Virtualization, 19 February 2017 - 23 February 2017, Athens, Greece
Abbreviated titleCloud Computing
Country/TerritoryGreece
CityAthens
Period19/02/1723/03/17
Internet address

Bibliographical note

Archived in the free access ThinkMindTM Digital Library, not CC

Keywords

  • Cloud security and privacy
  • immutable database
  • forensic trail

Fingerprint

Dive into the research topics of 'Creating an Immutable Database for Secure Cloud Audit Trail and System Logging'. Together they form a unique fingerprint.

Cite this