{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T19:12:08Z","timestamp":1769713928691,"version":"3.49.0"},"reference-count":22,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,8,24]]},"abstract":"<jats:p>Preserving the integrity of log data and using the same for forensic analysis is one of the prime concerns of cloud-oriented applications. Since log data collates sensitive information, providing confidentiality and privacy is of at most importance. For data auditors, maintaining the integrity of the log data is a prime concern. Existing models focus on providing models and frameworks that relies on any third-party entity or the cloud service provider (CSP) to handle the logs, which lacks in securing the integrity due to the presence of the external entities. Sole dependence on CSP is a major flaw together with a drawback, since the CSP itself is prone to data theft alliance. In this paper, we instantiate a mechanism which maintains the integrity of the log without compromising the performance efficiency of the system. The influence of machine learning classification techniques is leveraged in order to efficiently classify the log data before it is processed. Progressively the log data integrity is maintained through the proposed Propagated Chain of Log Blocks (PCLB), the Hybrid Vector Committed BST (HVCBST) and lightweight Multikey Hybrid Storage (MKHS) structures. The results of the implemented systems have proven to be efficient and tamper proof compared to the existing systems and can be easily rendered in any private or public cloud deployments.<\/jats:p>","DOI":"10.3233\/jifs-224585","type":"journal-article","created":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T10:52:27Z","timestamp":1688727147000},"page":"4669-4687","source":"Crossref","is-referenced-by-count":2,"title":["Efficient classification and preservation of log integrity through propagated chain in cloud"],"prefix":"10.1177","volume":"45","author":[{"given":"L. Remegius Praveen","family":"Sahayaraj","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Loyola-ICAM College of Engineering and Technology, Chennai, Tamil Nadu, India"}]},{"given":"S.","family":"Muthurajkumar","sequence":"additional","affiliation":[{"name":"Department of Computer Technology, Madras Institute of Technology (MIT) Campus, Anna University, Chennai, Tamil Nadu, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-224585_ref1","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1016\/j.procs.2017.06.103","article-title":"Secure Logging as a Service Using Reversible Watermarking","volume":"110","author":"Khan","year":"2017","journal-title":"Procedia Computer Science"},{"issue":"6","key":"10.3233\/JIFS-224585_ref2","doi-asserted-by":"crossref","first-page":"4049","DOI":"10.1109\/TII.2021.3085960","article-title":"Blockchain-Enabled Federated Learning Data Protection Aggregation Scheme with Differential Privacy and Homomorphic Encryption in IIoT","volume":"18","author":"Jia","year":"2022","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10.3233\/JIFS-224585_ref3","doi-asserted-by":"crossref","unstructured":"Birk D. and Wegener C. , Technical challenges of forensics investigation in cloud computing environment, in: Proceedings of the Sixth international workshop on systematic approaches to digital forensic engineering (SADFE) (2011), pp. 1\u201310.","DOI":"10.1109\/SADFE.2011.17"},{"issue":"2","key":"10.3233\/JIFS-224585_ref4","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"10.3233\/JIFS-224585_ref5","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1109\/TR.2020.3047833","article-title":"Blockchain Assisted Secure Data Sharing Model for Internet of Things Based Smart Industries","volume":"71","author":"Manogaran","year":"2022","journal-title":"IEEE Transactions on Reliability"},{"issue":"5","key":"10.3233\/JIFS-224585_ref6","first-page":"2379","article-title":"Blockchain-Based Private Provable Data Possession","volume":"18","author":"Wang","year":"2021","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"2","key":"10.3233\/JIFS-224585_ref7","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1109\/JSYST.2012.2221958","article-title":"Secure Logging as a Service\u2014Delegating Log Management to the Cloud","volume":"7","author":"Ray","year":"2013","journal-title":"IEEE Systems Journal"},{"key":"10.3233\/JIFS-224585_ref8","first-page":"19","article-title":"Understanding issues in cloud forensics: two hypothetical case studies","volume":"3","author":"Dykstra","year":"2011","journal-title":"Journal of Network Forensics"},{"key":"10.3233\/JIFS-224585_ref9","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.diin.2012.05.001","article-title":"Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques","author":"Dykstra","year":"2012","journal-title":"Digital Invest"},{"issue":"5","key":"10.3233\/JIFS-224585_ref10","first-page":"2438","article-title":"DeepChain: Auditable andrivacy-Preserving Deep Learning with Blockchain-Based Incentive","volume":"18","author":"Weng","year":"2021","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"10.3233\/JIFS-224585_ref11","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.compeleceng.2017.02.006","article-title":"Forensics framework for cloud computing","volume":"60","author":"Alex","year":"2017","journal-title":"Computers & Electrical Engineering"},{"key":"10.3233\/JIFS-224585_ref12","doi-asserted-by":"crossref","unstructured":"Kobayashi M. , Himura Y. and Yasuda Y. , Discovering Cloud Operation History through Log Analysis, in: IFIP\/IEEE Symposium on Integrated Network and Service Management (IM) 2017, pp. 959\u2013964.","DOI":"10.23919\/INM.2017.7987423"},{"key":"10.3233\/JIFS-224585_ref13","doi-asserted-by":"crossref","unstructured":"Lemoudden M. and Ouahidi B.E. , Managing cloud-generated logs using big data technologies, in: International Conference on Wireless Networks and Mobile Communications (WINCOM), Marrakech, Morocco 2015, pp. 1\u20137.","DOI":"10.1109\/WINCOM.2015.7381334"},{"key":"10.3233\/JIFS-224585_ref14","doi-asserted-by":"crossref","unstructured":"Sandikkaya M.T. and Harmanci A.E. , Security Problems of Platform-as-a-Service (PaaS) Clouds and Practical Solutions to the Problems, in: IEEE 31st Symposium on Reliable Distributed Systems 2012, pp. 463\u2013468.","DOI":"10.1109\/SRDS.2012.84"},{"issue":"3","key":"10.3233\/JIFS-224585_ref15","doi-asserted-by":"crossref","first-page":"2013","DOI":"10.1109\/TII.2019.2933482","article-title":"A Blockchain-Based Trusted Data Management Scheme in Edge Computing","volume":"16","author":"Zhaofeng","year":"2021","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10.3233\/JIFS-224585_ref16","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.jisa.2018.07.008","article-title":"Towards a practical cloud forensics logging framework","volume":"42","author":"Pichan","year":"2018","journal-title":"Journal of Information Security and Applications"},{"key":"10.3233\/JIFS-224585_ref17","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1145\/1982185.1982226","article-title":"Cloud application logging for forensics","author":"Marty","year":"2011","journal-title":"Proceedings of the 2011 ACM symposium on applied computing"},{"key":"10.3233\/JIFS-224585_ref18","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/IMF.2009.21","article-title":"Overcast: forensic discovery in cloud environments","author":"Wolthusen","year":"2009","journal-title":"Proceedings of the fifth international conference on IT security incident management and IT forensics (IMF)"},{"key":"10.3233\/JIFS-224585_ref19","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1049\/iet-ifs.2014.0625","article-title":"Design and formal verification of a cloud compliant secure logging mechanism","volume":"10","author":"Sandikkaya","year":"2016","journal-title":"IET Information Security"},{"key":"10.3233\/JIFS-224585_ref20","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1109\/TIFS.2019.2928256","article-title":"SDTE: A Secure Blockchain-Based Data Trading Ecosystem","volume":"15","author":"Dai","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.3233\/JIFS-224585_ref21","first-page":"280","article-title":"Immutable Log Storage as a Service","author":"Pourmajidi","year":"2019","journal-title":"IEEE\/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), Montreal, QC, Canada"},{"key":"10.3233\/JIFS-224585_ref22","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/FIT.2011.28","article-title":"Digital forensics for eucalyptus","author":"Zafarullah","year":"2011","journal-title":"Frontiers of information technology (FIT)"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-224585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T08:24:10Z","timestamp":1769675050000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-224585"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,24]]},"references-count":22,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/jifs-224585","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,24]]}}}