We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Development of Highly Secured Cloud Rendered Log Management System

by Rajebhosale Sagar S, Pawar Anil B
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 16
Year of Publication: 2014
Authors: Rajebhosale Sagar S, Pawar Anil B
10.5120/18992-0448

Rajebhosale Sagar S, Pawar Anil B . Development of Highly Secured Cloud Rendered Log Management System. International Journal of Computer Applications. 108, 16 ( December 2014), 1-5. DOI=10.5120/18992-0448

@article{ 10.5120/18992-0448,
author = { Rajebhosale Sagar S, Pawar Anil B },
title = { Development of Highly Secured Cloud Rendered Log Management System },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 16 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number16/18992-0448/ },
doi = { 10.5120/18992-0448 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:43:06.778774+05:30
%A Rajebhosale Sagar S
%A Pawar Anil B
%T Development of Highly Secured Cloud Rendered Log Management System
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 16
%P 1-5
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A log is a collection of record of events that occurs within an organization containing systems and network. These logs are very important for any organization, because log file will able to record all user activities. As this log files plays vital role and also it contains sensitive information , it should be maintained highly secure. So, management and securely maintenance of log records are very tedious task. However, deploying such a system for high security and privacy of log records is an overhead for an organization and also it requires additional cost. Many techniques have been design so far for security of log records. The alternative solution is to maintaining log records over a cloud database. Log files over cloud environment leads to challenges about privacy, confidentiality and integrity of log files. In this paper, we propose highly secured cloud rendered log management and also use of some cryptographic algorithms for dealing the issues to access a cloud based data storage. To the best of knowledge, this is the strong work to provide a complete solution to the cloud based secure log management problem.

References
  1. <ul style="text-align: justify;"> [1 ] Indrajit Ray, Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, Mariappan Rajaram "Secure Logging As a Service Delegating Log Management to the Cloud" in IEEE SYSTEMS JOURNAL, VOL. 7, NO. 2, JUNE 2013 [2 ] Karen Kent ,Murugiah Souppaya "Guide to Computer Security Log Management" in NIST Special Publication 800-92 [3 ] C. Lonvick, The BSD Syslog Protocol, Request for Comment RFC 3164, Internet Engineering Task Force, NetworkWorking Group, Aug. 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Confidentiality Privacy Integrity Cryptographic algorithms