ARCHIVES
A Tamper-Proof Logging System Using eBPF, Cryptographic Hash Chains, Merkle Trees, and Cloud- Based Integrity Verification
¹ ² ³ ⁴ ⁵ Department of Computer Science Engineering, Koneru Lakshmaiah Educational Foundation, Vaddeswaram, Guntur, Andhra Pradesh, India.
Published Online: May-August 2026
Pages: 44-51
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20260502005System logs are essential for security monitoring and digital forensics, but they remain vulnerable to tampering when attackers gain elevated privileges. Existing logging systems often fail to guarantee integrity, allowing adversaries to alter or delete critical evidence. This paper presents a lightweight tamper-proof logging system that ensures log integrity using kernel-level event capture with eBPF, cryptographic hash chains, Merkle tree-based verification, and cloud-based integrity anchoring. The proposed system enables real-time log collection, efficient integrity validation, and reliable detection of unauthorized modifications without relying on blockchain or specialized hardware.
Related Articles
2026
Artificial Intelligence in Learning and Teaching
2026
Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application
2026
Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach
2026
Eco-Genius: Power Up Smart, Power Down Waste
2026
Crowd-Sourced Disaster Response and Rescue Assistant
2026
Unveiling Deepfake Detection Using Vision Transformers: A Survey and Experimental Study
2026
A Novel Stateful Orchestration Pattern for Data Affinity and Transactional Integrity in Sharded Backend Architectures
2026
Legal Challenges of Agentic AI Systems in Education and Employment Decision-Making
2026
New-Hybrid Soft Computing Model for Stock Market Predictions
2026
Human Emotion Distribution Learning from Face Images Using CNN


