Design of Secure Log Management Over Cloud
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 12)Publication Date: 2014-12-05
Authors : Harshal N. Kolhe; Imran R. Shaikh;
Page : 44-48
Keywords : Cloud computing; privacy; Integrity; security; log record management;
Abstract
A Log is consists of much helpful data regarding activities or events of systems and networks and these data having number of attributes and own syntax. These logs are made-up of events which has been done by users on systems or in networks. These information is very expensive for organizations. These logs are used for finding problems, to optimize performance, to record all events, and to investigate malicious activity in systems or networks. So, protection from attackers is required. Hence organization should maintained integrity, confidentiality, security of logs. The capital expenses will be very less to maintain logs for organizations for longer period. Hence in this paper, we propose more effective secure cloud based log management to decrease cost and provide security of logs from attackers. By using encryption and MAC provide secured log.
Other Latest Articles
- Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis
- Effect of Alcoholic Molecules (2-Propanol) Blending on Exfoliation of Graphite Flakes
- Antagonistic Compounds Produced by Consortium of Probiotic Bacteria against Fish Pathogens
- Birds Biodiversity and Conservation Status of Keshopur Community Reserve, Gurdaspur, Punjab
- Lattice Points on the Cone X^2+9Y^2=50Z^2
Last modified: 2021-06-30 21:15:01