International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113 | Views: 248

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015 | Popularity: 6.8 / 10


     

Implementation of Highly Secured Log Management System over Cloud

Rajebhosale Sagar S., Pawar Anil B.


Abstract: A log is an assortment of record of events that happens at an organization containing systems and network. These logs are very important for any organization, as a result of log file can in a position to record all user activities. As this log files plays important role and also it contains sensitive data, it ought to be maintained highly secure. So, management and firmly maintenance of log records are terribly tedious task. However, for privacy and high security of these log records, it may increase the overhead and additionally it needs further value to deploying such system for an organization. Several techniques have been design up to now for security of log records. Another solution is to maintaining log records over a cloud. Log files over cloud, results in challenges regarding integrity, confidentiality and privacy of log files. During this paper, we propose log management system over cloud in highly secured manner and additionally for dealing the problems to access a cloud based storage, some cryptographic algorithms is used. To overcome the drawbacks of cloud based log management system, this can be the strong work as complete solution.


Keywords: Cloud Computing, Privacy, Confidentiality, Integrity, Cryptographic algorithms


Edition: Volume 4 Issue 3, March 2015


Pages: 1360 - 1365



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Rajebhosale Sagar S., Pawar Anil B., "Implementation of Highly Secured Log Management System over Cloud", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 1360-1365, https://www.ijsr.net/getabstract.php?paperid=SUB152241, DOI: https://www.doi.org/10.21275/SUB152241



Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023

Pages: 899 - 902

Pharmaceutical Supply Chain Using Blockchain Technology

Shivangi Sharma, Meenu

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article



Top