Abstract: Implementation of Highly Secured Log Management System over Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 113

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

Implementation of Highly Secured Log Management System over Cloud

Rajebhosale Sagar S., Pawar Anil B.

A log is an assortment of record of events that happens at an organization containing systems and network. These logs are very important for any organization, as a result of log file can in a position to record all user activities. As this log files plays important role and also it contains sensitive data, it ought to be maintained highly secure. So, management and firmly maintenance of log records are terribly tedious task. However, for privacy and high security of these log records, it may increase the overhead and additionally it needs further value to deploying such system for an organization. Several techniques have been design up to now for security of log records. Another solution is to maintaining log records over a cloud. Log files over cloud, results in challenges regarding integrity, confidentiality and privacy of log files. During this paper, we propose log management system over cloud in highly secured manner and additionally for dealing the problems to access a cloud based storage, some cryptographic algorithms is used. To overcome the drawbacks of cloud based log management system, this can be the strong work as complete solution.

Keywords: Cloud Computing, Privacy, Confidentiality, Integrity, Cryptographic algorithms

Edition: Volume 4 Issue 3, March 2015

Pages: 1360 - 1365

Share this Article

How to Cite this Article?

Rajebhosale Sagar S., Pawar Anil B., "Implementation of Highly Secured Log Management System over Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152241, Volume 4 Issue 3, March 2015, 1360 - 1365

Enter Your Email Address


Similar Articles with Keyword 'Cloud Computing'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 5

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 613 - 616

Categorize & Compare Cloud Automation & Devops Tools

Pardeep Singh Virdi

Share this Article

Similar Articles with Keyword 'Privacy'

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Similar Articles with Keyword 'Confidentiality'

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Similar Articles with Keyword 'Integrity'

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 84

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Similar Articles with Keyword 'Cryptographic algorithms'

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1087 - 1091

Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud

Kavitha K, Manjula R

Share this Article

Downloads: 109

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2536 - 2539

Crypto View: Visual Representation of Cryptographic Algorithms

Surumi Basheer, Sreena Sreedhar

Share this Article

Similar Articles with Keyword 'Cloud'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 5

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 613 - 616

Categorize & Compare Cloud Automation & Devops Tools

Pardeep Singh Virdi

Share this Article

Similar Articles with Keyword 'Computing'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article
Top