International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Design of Secure Log Management Over Cloud

Harshal N. Kolhe, Imran R. Shaikh

A Log is consists of much helpful data regarding activities or events of systems and networks and these data having number of attributes and own syntax. These logs are made-up of events which has been done by users on systems or in networks. These information is very expensive for organizations. These logs are used for finding problems, to optimize performance, to record all events, and to investigate malicious activity in systems or networks. So, protection from attackers is required. Hence organization should maintained integrity, confidentiality, security of logs. The capital expenses will be very less to maintain logs for organizations for longer period. Hence in this paper, we propose more effective secure cloud based log management to decrease cost and provide security of logs from attackers. By using encryption and MAC provide secured log.

Keywords: Cloud computing, privacy, Integrity, security, log record management

Edition: Volume 3 Issue 12, December 2014

Pages: 44 - 48


How to Cite this Article?

Harshal N. Kolhe, Imran R. Shaikh, "Design of Secure Log Management Over Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14302, Volume 3 Issue 12, December 2014, 44 - 48

20 PDF Views | 18 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud computing'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 4, April 2020

Pages: 1517 - 1523

IT Infrastructure & Enterprise Applications - Organizations Strategy and Planning

Anshuman Awasthi

Share this article

Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 5, May 2020

Pages: 1472 - 1477

Cloud Computing Security Issues and their Data Privacy Concerns

Amal Matrouk Aljohani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2762 - 2766

Large Scale Data Shared by Peer to Peer Based System in Shared Network

Bhavsar Harshada V., Dr. S. V. Gumaste, Prof. Deokate Gajanan S.

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2037 - 2038

A Survey on Service Management Mechanisms in Service Oriented Computing

Anish Bhagwat

Share this article

Similar Articles with Keyword 'privacy'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 709 - 711

Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information

Pranali D. Desai, Vinod S. Wadne

Share this article

Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 5, May 2020

Pages: 1472 - 1477

Cloud Computing Security Issues and their Data Privacy Concerns

Amal Matrouk Aljohani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3273 - 3277

Homomorphic Encryption & A Novel Key Management Technique to Support Data Aggregation in Mobile Sensing

Farhat Afshan, Shameem Akther

Share this article

Similar Articles with Keyword 'Integrity'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1450 - 1453

Multi-Cloud Data Storing Strategy with Cost Efficiency and High Availability

Shilpa B Kodli, Pramila D Reshmi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1698 - 1704

Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation

V. Maruvoor Arasi, Carolene

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1285 - 1288

Integrity Attestation for Software-as-a Service Clouds

Chashu Mol R, Alfia A P

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

Pooja A Kulkarni, Harshal A Karande

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this article

Similar Articles with Keyword 'security'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this article

Top