ARCHIVES
A Tamper-Proof Logging System Using eBPF, Cryptographic Hash Chains, Merkle Trees, and Cloud- Based Integrity Verification
Published Online: May-August 2026
Pages: 44-51
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20260502005Abstract
System logs are essential for security monitoring and digital forensics, but they remain vulnerable to tampering when attackers gain elevated privileges. Existing logging systems often fail to guarantee integrity, allowing adversaries to alter or delete critical evidence. This paper presents a lightweight tamper-proof logging system that ensures log integrity using kernel-level event capture with eBPF, cryptographic hash chains, Merkle tree-based verification, and cloud-based integrity anchoring. The proposed system enables real-time log collection, efficient integrity validation, and reliable detection of unauthorized modifications without relying on blockchain or specialized hardware.
Related Articles
2026
Artificial Intelligence in Learning and Teaching
2026
Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application
2026
Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach
2026
Eco-Genius: Power Up Smart, Power Down Waste
2026
Crowd-Sourced Disaster Response and Rescue Assistant
2026