Current - Issue
Original Article
A Tamper-Proof Logging System Using eBPF, Cryptographic Hash Chains, Merkle Trees, and Cloud- Based Integrity Verification
J Veda Suhas Kulkarni1
Dhiravathu Bhargav Sai2
S Sanjay3
Bikkina Jeswanth4
Jonnalagadda Surya Kiran5
1 2 3 4 5 Department of Computer Science Engineering, Koneru Lakshmaiah Educational Foundation, Vaddeswaram, Guntur, Andhra Pradesh, India.
Published Online: May-August 2026
Pages: 44-51
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20260502005References
1. Qiang Song, Weihong Zhang, Xiaojia Jia, Zheng Jiang, Wenbo Jiang, Heqing Huang, Yong Liu, Dan Meng. Efficient and Verifiable Causality
Analysis for Cloud- based Endpoint Auditing. USENIX. 2026.
2. Abdullah LM, Al-Hashemi. Auditable LLM: A Hash-Chain-Backed Framework. Electronics (MDPI). 2025.
3. Md Shariful Islam, M. Sohel Rahman. LogStamp: Blockchain Log Auditing Framework. Research Paper / Academic Publication. 2025.
4. Kenji Saito. Proof of Authenticity of General IoT Information with Tamper-Evident Sensors and Blockchain. IEEE Region 10 HTC. 2025.
5. Belare. Decentralized and Secure Blockchain Solution for Tamper-Proof Logging Events. IEEE / Elsevier. 2025.
6. Andreas Almutairi, Robert Duncan, Simon Lieb, Matthias Sollner. A Secure and Privacy-Friendly Logging Scheme. Cloud Computing
Conference / ArXiv. 2024.
7. Oleksandr Kuznetsov et al. Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities. Cryptography. 2024.
8. Oleksandr Kuznetsov et al. Merkle Trees in Blockchain: A Study of Collision Probability and Security Implications. Internet of Things. 2024.
9. David Koisser, Ahmad-Reza Sadeghi. Accountability of Things: Large-Scale Tamper-Evident Logging for Smart Devices. TU Darmstadt.
2023.
10. Jimmy Joseph. Trust, but Verify: Audit-Ready Logging for Clinical AI. World Journal of Advanced Engineering Technology and Sciences.
2023.
11. Mingwei Xu, Yingjun Zhang. Faster Yet Safer: Logging System via Fixed-Key Block Cipher (QuickLog). USENIX Security Symposium.
2023.
12. Gunnar Hartung. Secure Audit Logs with Verifiable Excerpts. Karlsruhe Institute of Technology. 2022.
13. Seongmin Kim, Byoungyoung Lee. HARDLOG: Practical Tamper-Proof System Auditing. IEEE Symposium on Security and Privacy (S&P).
2022.
14. Enrique Soriano, Gorka Guardia. SealFS: Storage-based Tamper-Evident Logging. Computers & Security. 2021.
15. Andrei Sabelfeld, Anjo Vahldiek-Oberwagner. CUSTOS: Practical Tamper-Evident Auditing of Operating Systems. USENIX Security
Symposium. 2020.
16. Analysis.
Analysis for Cloud- based Endpoint Auditing. USENIX. 2026.
2. Abdullah LM, Al-Hashemi. Auditable LLM: A Hash-Chain-Backed Framework. Electronics (MDPI). 2025.
3. Md Shariful Islam, M. Sohel Rahman. LogStamp: Blockchain Log Auditing Framework. Research Paper / Academic Publication. 2025.
4. Kenji Saito. Proof of Authenticity of General IoT Information with Tamper-Evident Sensors and Blockchain. IEEE Region 10 HTC. 2025.
5. Belare. Decentralized and Secure Blockchain Solution for Tamper-Proof Logging Events. IEEE / Elsevier. 2025.
6. Andreas Almutairi, Robert Duncan, Simon Lieb, Matthias Sollner. A Secure and Privacy-Friendly Logging Scheme. Cloud Computing
Conference / ArXiv. 2024.
7. Oleksandr Kuznetsov et al. Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities. Cryptography. 2024.
8. Oleksandr Kuznetsov et al. Merkle Trees in Blockchain: A Study of Collision Probability and Security Implications. Internet of Things. 2024.
9. David Koisser, Ahmad-Reza Sadeghi. Accountability of Things: Large-Scale Tamper-Evident Logging for Smart Devices. TU Darmstadt.
2023.
10. Jimmy Joseph. Trust, but Verify: Audit-Ready Logging for Clinical AI. World Journal of Advanced Engineering Technology and Sciences.
2023.
11. Mingwei Xu, Yingjun Zhang. Faster Yet Safer: Logging System via Fixed-Key Block Cipher (QuickLog). USENIX Security Symposium.
2023.
12. Gunnar Hartung. Secure Audit Logs with Verifiable Excerpts. Karlsruhe Institute of Technology. 2022.
13. Seongmin Kim, Byoungyoung Lee. HARDLOG: Practical Tamper-Proof System Auditing. IEEE Symposium on Security and Privacy (S&P).
2022.
14. Enrique Soriano, Gorka Guardia. SealFS: Storage-based Tamper-Evident Logging. Computers & Security. 2021.
15. Andrei Sabelfeld, Anjo Vahldiek-Oberwagner. CUSTOS: Practical Tamper-Evident Auditing of Operating Systems. USENIX Security
Symposium. 2020.
16. Analysis.
Related Articles
2026
Artificial Intelligence in Learning and Teaching
2026
Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application
2026
Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach
2026
Eco-Genius: Power Up Smart, Power Down Waste
2026
Crowd-Sourced Disaster Response and Rescue Assistant
2026