A Novel Real Time Offline Patching Scheme with Secured Logging Over Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 108 | Monthly Hits: ⮙12

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014

A Novel Real Time Offline Patching Scheme with Secured Logging Over Cloud

Sunita, Shridevi Soma

Modern day software systems are updated online through an update server. A metadata file is installed at the update server that exposes the information about current version, build, software changes, system requirement, information about fixes, priority and also a URL to the software bundle offered as update. The software installed in client machine checks for this metadata as and when it is scheduled to check for update and has an internet connection. Once the software finds out that there are updates available, it asks the user for permission to update. In update process it silently downloads the patch or the bundle file and updates the software. Once updated the new version is launched. This technique has certain disadvantages that it is not centralized and is not suitable for patching software in a cloud architecture where several virtual machines collaborates to provide service. The update and patching information is stored locally as a log file which does not provide any security. In this paper we propose a unique patching scheme to overcome the aforementioned drawback of current OPS in which metadata of the image and the patching and update information is stored as a secured file which is encrypted using symmetric key encryption using AES and Rijndael. It is also demonstrated the feasibility of the system on real windows updates by enabling centralized offline updating the windows updates. In the offline scheme, updates and patches are downloaded using a background agent without the need for the software to be running. Once patches are available, they can be scheduled to be applied at a later instance. This provides better bandwidth utilization. Results show that the complexity of the process is O (k+1/n) and that the system does not add any significant overhead for security extension. Index Terms Offline patching, Cloud Computing, AES, Secured Log Access

Keywords: Offline patching, Cloud Computing, AES, Secured Log Access

Edition: Volume 3 Issue 10, October 2014

Pages: 2225 - 2229

Share this Article

How to Cite this Article?

Sunita, Shridevi Soma, "A Novel Real Time Offline Patching Scheme with Secured Logging Over Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT14643, Volume 3 Issue 10, October 2014, 2225 - 2229

Enter Your Registered Email Address





Similar Articles with Keyword 'Cloud Computing'

Downloads: 179 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 98 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Downloads: 99 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Downloads: 99 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 99 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Similar Articles with Keyword 'AES'

Downloads: 99 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2084 - 2088

A Survey on Learning Crowdsourced User Preferences for Visual Summarization of Image Collections

Rupali Tanaji Waghmode, Nikita J. Kulkarni

Share this Article

Downloads: 102 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1398 - 1401

A Review on Encryption Techniques to Secure a Cloud

Ramandeep Kaur, Ashish Verma

Share this Article

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2033 - 2036

A Survey Work on ETC System for an Efficient Image Encryption and Compression

Gauri Chavan, Prashant Kumbharkar

Share this Article



Top