ARCHIVES

Original Article

A Tamper-Proof Logging System Using eBPF, Cryptographic Hash Chains, Merkle Trees, and Cloud- Based Integrity Verification

J Veda Suhas Kulkarni1Dhiravathu Bhargav Sai2S Sanjay3Bikkina Jeswanth4Jonnalagadda Surya Kiran5

¹ ² ³ ⁴ ⁵ Department of Computer Science Engineering, Koneru Lakshmaiah Educational Foundation, Vaddeswaram, Guntur, Andhra Pradesh, India.

Published Online: May-August 2026

Pages: 44-51

Abstract

System logs are essential for security monitoring and digital forensics, but they remain vulnerable to tampering when attackers gain elevated privileges. Existing logging systems often fail to guarantee integrity, allowing adversaries to alter or delete critical evidence. This paper presents a lightweight tamper-proof logging system that ensures log integrity using kernel-level event capture with eBPF, cryptographic hash chains, Merkle tree-based verification, and cloud-based integrity anchoring. The proposed system enables real-time log collection, efficient integrity validation, and reliable detection of unauthorized modifications without relying on blockchain or specialized hardware.

Related Articles

2026

Artificial Intelligence in Learning and Teaching

2026

Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application

2026

Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach

2026

Eco-Genius: Power Up Smart, Power Down Waste

2026

Crowd-Sourced Disaster Response and Rescue Assistant

2026

Unveiling Deepfake Detection Using Vision Transformers: A Survey and Experimental Study

2026

A Novel Stateful Orchestration Pattern for Data Affinity and Transactional Integrity in Sharded Backend Architectures

2026

Legal Challenges of Agentic AI Systems in Education and Employment Decision-Making

2026

New-Hybrid Soft Computing Model for Stock Market Predictions

2026

Human Emotion Distribution Learning from Face Images Using CNN