International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 115 - Number 10 |
Year of Publication: 2015 |
Authors: Gurpreet Kaundal, Sheveta Vashisht |
10.5120/20190-2418 |
Gurpreet Kaundal, Sheveta Vashisht . A Novel Approach using XMI Log Generation Cryptography and Mining Techniques for to Enhance Security of Data. International Journal of Computer Applications. 115, 10 ( April 2015), 25-32. DOI=10.5120/20190-2418
Security is the major issue in IT sector because data of an organization is an important asset for them. The information can be there client or customer contacts or it may be the information about their accounts, in short that information is very confidential information that they never want to disclose. But because of security attacks an attacker i. e. Hackers can access this information. Securities are required for network data and the database data. The all information is stores in the databases and the log of this information is also generated by the server. In the log files all information of users is stored, so the security of the log files is required. The log contains the all information of the users such as IP address, Mac address, Session time, Operating System etc. The hacker can hack the log and steal all the users' information and edit it and upload on the server to avoid intrusion detection. So, in this research work proposes an idea for to prevent these types of attacks of the hacker. This work proposes the security of log files with the XMI file because the XMI file is a secured file. Retrieving the contents of XMI file is not easy because the XMI file contains the very big library of the java named XMI. Java. The log file data converting it into XMI file then encrypt the XMI file data again; it provides the more security of data. This makes the information more secure.