Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Development of Highly Secured Cloud Rendered Log Management System

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 108 - Number 16
Year of Publication: 2014
Authors:
Rajebhosale Sagar S
Pawar Anil B
10.5120/18992-0448

Rajebhosale Sagar S and Pawar Anil B. Article: Development of Highly Secured Cloud Rendered Log Management System. International Journal of Computer Applications 108(16):1-5, December 2014. Full text available. BibTeX

@article{key:article,
	author = {Rajebhosale Sagar S and Pawar Anil B},
	title = {Article: Development of Highly Secured Cloud Rendered Log Management System},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {108},
	number = {16},
	pages = {1-5},
	month = {December},
	note = {Full text available}
}

Abstract

A log is a collection of record of events that occurs within an organization containing systems and network. These logs are very important for any organization, because log file will able to record all user activities. As this log files plays vital role and also it contains sensitive information , it should be maintained highly secure. So, management and securely maintenance of log records are very tedious task. However, deploying such a system for high security and privacy of log records is an overhead for an organization and also it requires additional cost. Many techniques have been design so far for security of log records. The alternative solution is to maintaining log records over a cloud database. Log files over cloud environment leads to challenges about privacy, confidentiality and integrity of log files. In this paper, we propose highly secured cloud rendered log management and also use of some cryptographic algorithms for dealing the issues to access a cloud based data storage. To the best of knowledge, this is the strong work to provide a complete solution to the cloud based secure log management problem.

References

    [1 ] Indrajit Ray, Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, Mariappan Rajaram "Secure Logging As a Service Delegating Log Management to the Cloud" in IEEE SYSTEMS JOURNAL, VOL. 7, NO. 2, JUNE 2013 [2 ] Karen Kent ,Murugiah Souppaya "Guide to Computer Security Log Management" in NIST Special Publication 800-92 [3 ] C. Lonvick, The BSD Syslog Protocol, Request for Comment RFC 3164, Internet Engineering Task Force, NetworkWorking Group, Aug. 2001. [4 ] D. New and M. Rose, Reliable Delivery for Syslog, Request for Comment RFC 3195, Internet Engineering Task Force, Network Working Group, Nov. 2001[5 ] U. Flegel, "Pseudonymizing unix log file, in Proc. Int. Conf. Infrastruture Security, LNCS 2437. Oct. 2002, pp. 162179 [6 ] M. Bellare and B. S. Yee, "Forward integrity for secure audit logs", Dept. Comput. Sci. , Univ. California, San Diego, Tech. Rep. , Nov. 1997. [7 ] B. Schneier and J. Kelsey, "Security audit logs to support computer forensics",in ACM Trans. Inform. Syst. Security, vol. 2, no. 2, pp. 159-176, May 1999. [8 ] A. Shamir, "How to share a secret", Commun. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979. [9 ] A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive secret sharing or: How to cope with perpetual leakage", in Proc. 15th Ann. Int. Cryptology Conf. , Aug. 1995, pp. 339-352.