Current - Issue

Original Article

A Tamper-Proof Logging System Using eBPF, Cryptographic Hash Chains, Merkle Trees, and Cloud- Based Integrity Verification

J Veda Suhas Kulkarni1 Dhiravathu Bhargav Sai2 S Sanjay3 Bikkina Jeswanth4 Jonnalagadda Surya Kiran5
1 2 3 4 5 Department of Computer Science Engineering, Koneru Lakshmaiah Educational Foundation, Vaddeswaram, Guntur, Andhra Pradesh, India.

Published Online: May-August 2026

Pages: 44-51

Abstract

System logs are essential for security monitoring and digital forensics, but they remain vulnerable to tampering when attackers gain elevated privileges. Existing logging systems often fail to guarantee integrity, allowing adversaries to alter or delete critical evidence. This paper presents a lightweight tamper-proof logging system that ensures log integrity using kernel-level event capture with eBPF, cryptographic hash chains, Merkle tree-based verification, and cloud-based integrity anchoring. The proposed system enables real-time log collection, efficient integrity validation, and reliable detection of unauthorized modifications without relying on blockchain or specialized hardware.

Related Articles

2026

Artificial Intelligence in Learning and Teaching

2026

Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application

2026

Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach

2026

Eco-Genius: Power Up Smart, Power Down Waste

2026

Crowd-Sourced Disaster Response and Rescue Assistant

2026

Unveiling Deepfake Detection Using Vision Transformers: A Survey and Experimental Study

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20260502005

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.