10.5120/18992-0448 |
Rajebhosale Sagar S and Pawar Anil B. Article: Development of Highly Secured Cloud Rendered Log Management System. International Journal of Computer Applications 108(16):1-5, December 2014. Full text available. BibTeX
@article{key:article, author = {Rajebhosale Sagar S and Pawar Anil B}, title = {Article: Development of Highly Secured Cloud Rendered Log Management System}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {108}, number = {16}, pages = {1-5}, month = {December}, note = {Full text available} }
Abstract
A log is a collection of record of events that occurs within an organization containing systems and network. These logs are very important for any organization, because log file will able to record all user activities. As this log files plays vital role and also it contains sensitive information , it should be maintained highly secure. So, management and securely maintenance of log records are very tedious task. However, deploying such a system for high security and privacy of log records is an overhead for an organization and also it requires additional cost. Many techniques have been design so far for security of log records. The alternative solution is to maintaining log records over a cloud database. Log files over cloud environment leads to challenges about privacy, confidentiality and integrity of log files. In this paper, we propose highly secured cloud rendered log management and also use of some cryptographic algorithms for dealing the issues to access a cloud based data storage. To the best of knowledge, this is the strong work to provide a complete solution to the cloud based secure log management problem.
References
-
[1 ] Indrajit Ray, Kirill Belyaev, Mikhail Strizhov, Dieudonne
Mulamba, Mariappan Rajaram "Secure Logging As a
Service Delegating Log Management to the Cloud" in IEEE
SYSTEMS JOURNAL, VOL. 7, NO. 2, JUNE 2013
[2 ] Karen Kent ,Murugiah Souppaya "Guide to Computer
Security Log Management" in NIST Special Publication
800-92
[3 ] C. Lonvick, The BSD Syslog Protocol, Request for Comment
RFC 3164, Internet Engineering Task Force, NetworkWorking
Group, Aug. 2001.
[4 ] D. New and M. Rose, Reliable Delivery for Syslog, Request
for Comment RFC 3195, Internet Engineering Task Force,
Network Working Group, Nov. 2001[5 ] U. Flegel, "Pseudonymizing unix log file, in Proc. Int. Conf.
Infrastruture Security, LNCS 2437. Oct. 2002, pp. 162179
[6 ] M. Bellare and B. S. Yee, "Forward integrity for secure audit
logs", Dept. Comput. Sci. , Univ. California, San Diego, Tech.
Rep. , Nov. 1997.
[7 ] B. Schneier and J. Kelsey, "Security audit logs to support
computer forensics",in ACM Trans. Inform. Syst. Security,
vol. 2, no. 2, pp. 159-176, May 1999.
[8 ] A. Shamir, "How to share a secret", Commun. ACM, vol. 22,
no. 11, pp. 612-613, Nov. 1979.
[9 ] A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung,
"Proactive secret sharing or: How to cope with perpetual
leakage", in Proc. 15th Ann. Int. Cryptology Conf. , Aug.
1995, pp. 339-352.