Downloads: 113 | Views: 248
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015 | Popularity: 6.8 / 10
Implementation of Highly Secured Log Management System over Cloud
Rajebhosale Sagar S., Pawar Anil B.
Abstract: A log is an assortment of record of events that happens at an organization containing systems and network. These logs are very important for any organization, as a result of log file can in a position to record all user activities. As this log files plays important role and also it contains sensitive data, it ought to be maintained highly secure. So, management and firmly maintenance of log records are terribly tedious task. However, for privacy and high security of these log records, it may increase the overhead and additionally it needs further value to deploying such system for an organization. Several techniques have been design up to now for security of log records. Another solution is to maintaining log records over a cloud. Log files over cloud, results in challenges regarding integrity, confidentiality and privacy of log files. During this paper, we propose log management system over cloud in highly secured manner and additionally for dealing the problems to access a cloud based storage, some cryptographic algorithms is used. To overcome the drawbacks of cloud based log management system, this can be the strong work as complete solution.
Keywords: Cloud Computing, Privacy, Confidentiality, Integrity, Cryptographic algorithms
Edition: Volume 4 Issue 3, March 2015
Pages: 1360 - 1365
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Review Papers, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023
Pages: 899 - 902Pharmaceutical Supply Chain Using Blockchain Technology
Shivangi Sharma, Meenu
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2267 - 2274Two Accounts of Solitude in Online Communal Networks
Alla Venu Gopal, G. Srinivasa Reddy