ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Design of Secure Log Management Over Cloud

Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 12)

Publication Date:

Authors : ; ;

Page : 44-48

Keywords : Cloud computing; privacy; Integrity; security; log record management;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

A Log is consists of much helpful data regarding activities or events of systems and networks and these data having number of attributes and own syntax. These logs are made-up of events which has been done by users on systems or in networks. These information is very expensive for organizations. These logs are used for finding problems, to optimize performance, to record all events, and to investigate malicious activity in systems or networks. So, protection from attackers is required. Hence organization should maintained integrity, confidentiality, security of logs. The capital expenses will be very less to maintain logs for organizations for longer period. Hence in this paper, we propose more effective secure cloud based log management to decrease cost and provide security of logs from attackers. By using encryption and MAC provide secured log.

Last modified: 2021-06-30 21:15:01