Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Distributed on Demand Logging using Secured Cloud Service

Print
PDF
IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications
© 2015 by IJCA Journal
ICACCTHPA 2014 - Number 4
Year of Publication: 2015
Authors:
Jesheela A. P
Sindhu S

Jesheela A.p and Sindhu S. Article: Distributed on Demand Logging using Secured Cloud Service. IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications ICACCTHPA 2014(4):18-25, February 2015. Full text available. BibTeX

@article{key:article,
	author = {Jesheela A.p and Sindhu S},
	title = {Article: Distributed on Demand Logging using Secured Cloud Service},
	journal = {IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications},
	year = {2015},
	volume = {ICACCTHPA 2014},
	number = {4},
	pages = {18-25},
	month = {February},
	note = {Full text available}
}

Abstract

Log records are important part of an organization. Maintaining log records securely for a longer period of time is important for proper functioning of any organization. Since log files contain record of system events, the confidentiality and privacy of log data should be maintained and also integrity of log data and logging process should be ensured. The log data are stored in the server with in an organization for a fixed time and sent to the cloud . There will be a great chance of attack when log data are stored in plain text in the server of an organization. However, deploying a secure logging framework is one of the main difficulties that an organization faces in this new era. In this paper, we present an approach for secure logging by which log data can be sent to the cloud directly at run time.

References

  • K. Kent and M. Souppaya. (1992). Guide to Computer Security Log Management, NIST Special Publication 800-92[Online]. Available: http://csrc. nist. gov/publications/nistpubs/800-92/SP800-92. pdf
  • C. Lonvick, The BSD Syslog Protocol, Request for Comment RFC 3164, Internet Engineering Task Force, Network Working Group, Aug. 2001.
  • M. Bellare and B. S. Yee, "Forward integrity for secure audit logs," Dept. Comput. Sci. , niv. California, San Diego, Tech. Rep. , Nov. 1997.
  • BalaBit IT Security (2011, Sep. ). Syslog-ng—Multiplatform Syslog Server and Logging Daemon [Online]. Available: http://www. balabit. com/network-security/syslog-ng
  • J. Kelsey, J. Callas, and A. Clemm, Signed Syslog Messages, Request for Comment RFC 5848, Internet Engineering Task Force, Network Working Group, May 2010.
  • D. New and M. Rose, Reliable Delivery for Syslog, Request for Comment RFC 3195, Internet Engineering Task Force, Network Working Group, Nov. 2001.
  • D. Ma and G. Tsudik, "A new approach to secure logging," ACM Trans. Storage, vol. 5, no. 1, pp. 2:1–2:21, Mar. 2009.
  • Shams Zawoad, Amit Kumar Dutta& Ragib Hasan "SecLaaS: Secure Logging-as-a-Service for Cloud Forensics", ACM Trans. Inform. Syst. Security, vol. 2, no. 2, pp. 159–176, May 1999.
  • J. Kelsey, J. Callas, and A. Clemm, Signed Syslog Messages, Request for Comment RFC 5848, Internet Engineering Task Force, Network Working Group, May 2010.
  • U. Flegel, "Pseudonymizing unix log file," in Proc. Int. Conf. Infrastruture Security, LNCS 2437. Oct. 2002, pp. 162–179.
  • C. Eckert and A. Pircher, "Internet anonymity: Problems and solutions,"in Proc. 16th IFIP TC-11 Int. Conf. Inform. Security, 2001, pp. 35–50 .
  • M. Rose, The Blocks Extensible Exchange Protocol Core, Request for Comment RFC 3080, Internet Engineering Task Force, Network Working Group, Mar. 2001.
  • M. Bellare and B. S. Yee, "Forward integrity for secure audit logs," Dept. Comput. Sci. , Univ. California, San Diego, Tech. Rep. , Nov. 1997.
  • B. Schneier and J. Kelsey, "Security audit logs to support computer forensics," ACM Trans. Inform. Syst. Security, vol. 2, no. 2, pp. 159–176, May 1999.
  • J. E. Holt, "Logcrypt : Forward security and public verification for secure audit logs," in Proc. 4th Australasian Inform. Security Workshop, 2006,pp. 203–211.
  • Indrajit Ray, Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, and Mariappan Rajaram" Secure Logging As a Service—Delegating Log Management to the Cloud" IEEE SYSTEMS JOURNAL, VOL. 7, NO. 2, JUNE 2013
  • http://en. wikipedia. org/wiki/Web_service
  • http://spf13. com/post/soap-vs-rest
  • http://en. wikipedia. org/wiki/Model%E2%80%93view%E2%80%93controller
  • http://viralpatel. net/blogs/tutorial-spring-3-mvc-introduction-spring-mvc-framework/
  • http://en. wikipedia. org/wiki/Jelastic
  • http://www. java-logging. com/
  • Log4J: http://logging. apache. org/log4j/1. 2/
  • http://en. wikipedia. org/wiki/Log4j