Encrypted Query Processing for Improved Protection of Confidentiality?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 5)Publication Date: 2014-05-30
Authors : Sinu P S; M.Ananthi;
Page : 575-582
Keywords : Cloud computing; logging; privacy; security;
Abstract
A log is a collection of record of the events that occurs within an organization containing systems and networks. Logs are being composed of entries which are of its own syntax; each log entry has information that are related to a specific event which has been occurred inside a system or network. Actually, logs are used basically for problems like troubleshooting, but at present logs serve many functions almost in all organizations, for optimizing performance of the system and network, for recording all the actions of users, and for providing useful data for malicious activity investigation. Logs have been in use for containing information that are related to various forms of events that are occurring in the networks and systems. Inside an organization, there are much logs which do contain records that are related to the security of the system; some common examples of these computer security logs are logs that are related to audit that contains the track of user authentication attempts and logs of security device that record the possible types of attacks. In this paper, we focus on the challenges for a secure cloud-based log management service and do propose a framework for doing the above.
Other Latest Articles
- An Efficient VLSI Architecture for Removal of Impulse Noise in Images?
- Weighted Mean Scheme for PAPR Reduction of OFDM Signals?
- Code Optimization in Compilers using ANN?
- An Improved min - min Algorithm for Job Scheduling using Ant Colony Optimization
- Fault Tolerance Testing for Crash and Omission Transient Failure during Resource Scheduling of Grid Computing?
Last modified: 2014-05-25 16:16:03