A Survey on Delegating Log Management to The Cloud
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 2)Publication Date: 2014-02-28
Authors : Sinu P S M.Ananthi;
Page : 15-20
Keywords : Cloud computing; logging; privacy; security;
Abstract
A log is a collection of record of the events that occurs within an organization containing systems and networks. Logs are being composed of entries which are of its own syntax; each log entry has information that are related to a specific event which has been occurred inside a system or network. Actually, logs are used basically for problems like troubleshooting, but at present logs serve many functions almost in all organizations, for optimizing performance of the system and network, for recording all the actions of users, and for providing useful data for malicious activity investigation. Logs have been in use for containing information that are related to various forms of events that are occurring in the networks and systems. Inside an organization, there are much logs which do contain records that are related to the security of the system; some common examples of these computer security logs are logs that are related to audit that contains the track of user authentication attempts and logs of security device that record the possible types of attacks. In this paper, we focus on the challenges for a secure cloud-based log management service and do propose a framework for doing the above.
Other Latest Articles
- A Survey Conducted on E-Agriculture with Indian Farmers?
- Giant bladder diverticulum in a boy
- A rare cause of inguinal mass in a female child: Hydrocele or cyst of the canal of Nuck
- Persistent mullerian duct syndrome in a child: case report and review of literature
- Proximal hypospadias in a male patient with 5α-reductase deficiency: A case reports
Last modified: 2014-02-01 23:41:39