ARCHIVES

Original Article

A Tamper-Proof Logging System Using eBPF, Cryptographic Hash Chains, Merkle Trees, and Cloud- Based Integrity Verification

J Veda Suhas Kulkarni1 Dhiravathu Bhargav Sai2 S Sanjay3 Bikkina Jeswanth4 Jonnalagadda Surya Kiran5
1 2 3 4 5 Department of Computer Science Engineering, Koneru Lakshmaiah Educational Foundation, Vaddeswaram, Guntur, Andhra Pradesh, India.

Published Online: May-August 2026

Pages: 44-51

References

1. Qiang Song, Weihong Zhang, Xiaojia Jia, Zheng Jiang, Wenbo Jiang, Heqing Huang, Yong Liu, Dan Meng. Efficient and Verifiable Causality
Analysis for Cloud- based Endpoint Auditing. USENIX. 2026.
2. Abdullah LM, Al-Hashemi. Auditable LLM: A Hash-Chain-Backed Framework. Electronics (MDPI). 2025.
3. Md Shariful Islam, M. Sohel Rahman. LogStamp: Blockchain Log Auditing Framework. Research Paper / Academic Publication. 2025.
4. Kenji Saito. Proof of Authenticity of General IoT Information with Tamper-Evident Sensors and Blockchain. IEEE Region 10 HTC. 2025.
5. Belare. Decentralized and Secure Blockchain Solution for Tamper-Proof Logging Events. IEEE / Elsevier. 2025.
6. Andreas Almutairi, Robert Duncan, Simon Lieb, Matthias Sollner. A Secure and Privacy-Friendly Logging Scheme. Cloud Computing
Conference / ArXiv. 2024.
7. Oleksandr Kuznetsov et al. Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities. Cryptography. 2024.
8. Oleksandr Kuznetsov et al. Merkle Trees in Blockchain: A Study of Collision Probability and Security Implications. Internet of Things. 2024.
9. David Koisser, Ahmad-Reza Sadeghi. Accountability of Things: Large-Scale Tamper-Evident Logging for Smart Devices. TU Darmstadt.
2023.
10. Jimmy Joseph. Trust, but Verify: Audit-Ready Logging for Clinical AI. World Journal of Advanced Engineering Technology and Sciences.
2023.
11. Mingwei Xu, Yingjun Zhang. Faster Yet Safer: Logging System via Fixed-Key Block Cipher (QuickLog). USENIX Security Symposium.
2023.
12. Gunnar Hartung. Secure Audit Logs with Verifiable Excerpts. Karlsruhe Institute of Technology. 2022.
13. Seongmin Kim, Byoungyoung Lee. HARDLOG: Practical Tamper-Proof System Auditing. IEEE Symposium on Security and Privacy (S&P).
2022.
14. Enrique Soriano, Gorka Guardia. SealFS: Storage-based Tamper-Evident Logging. Computers & Security. 2021.
15. Andrei Sabelfeld, Anjo Vahldiek-Oberwagner. CUSTOS: Practical Tamper-Evident Auditing of Operating Systems. USENIX Security
Symposium. 2020.
16. Analysis.

Related Articles

2026

Artificial Intelligence in Learning and Teaching

2026

Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application

2026

Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach

2026

Eco-Genius: Power Up Smart, Power Down Waste

2026

Crowd-Sourced Disaster Response and Rescue Assistant

2026

Unveiling Deepfake Detection Using Vision Transformers: A Survey and Experimental Study

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20260502005

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.