Downloading: Design of Secure Log Management Over Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


To prevent Server Overload, Your Article PDF will be Downloaded in Next Seconds

Design of Secure Log Management Over Cloud

Harshal N. Kolhe, Imran R. Shaikh

Abstract: A Log is consists of much helpful data regarding activities or events of systems and networks and these data having number of attributes and own syntax. These logs are made-up of events which has been done by users on systems or in networks. These information is very expensive for organizations. These logs are used for finding problems, to optimize performance, to record all events, and to investigate malicious activity in systems or networks. So, protection from attackers is required. Hence organization should maintained integrity, confidentiality, security of logs. The capital expenses will be very less to maintain logs for organizations for longer period. Hence in this paper, we propose more effective secure cloud based log management to decrease cost and provide security of logs from attackers. By using encryption and MAC provide secured log.

Keywords: Cloud computing, privacy, Integrity, security, log record management


Amazon Sale


Top