UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 2 Issue 7
July-2015
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1507021


Registration ID:
150645

Page Number

3105-3107

Share This Article


Jetir RMS

Title

Delegating Log Management to the Cloud Ensuring Secure Logging

Abstract

Many security issues are involved in log management. Integrity of the log file, and that of the logging process need to be ensured at all time. Main goal of a log manager is to provide high bandwidth and low level inactivity. In many real world applications and sensitive information must be kept in log files on an untreated machine. The event that an attacker captures this machine, and would like to guarantee that he will gain little or no information from the log files and to limit his ability to corrupt the log file. It describes a computationally cheap method for making all log entries generated prior to the logging machine's compromise impossible for the attacker to read and also impossible to undetectably modify or destroy. In this work, find out the challenges for a secure cloud based log management service. It Provide a comprehensive solution for storing and maintaining log records in a server operating in cloud-based environment. Also address security and integrity issues not only just during the log generation phase but also during other stage in the log management. It implement how to store secure log file in cloud and that file we can change read, write, delete, upload and download. Managing the Log Records is highly tedious and confidential in any organization. Even though Log Records contain Log Files, it should be protected from third party hackers. Since, Log Files contains privacy details and sensitive information. Delegating log management is cost saving measure.. In order to overcome from hackers we introduce a secure algorithm known as Advance Encryption Standard (AES). It provide secret key to both Client and Data Owners. It provides high Bandwidth & low level Inactivity. It’s the cheapest method where an attacker cannot read or modify/destroy the data’s. We can implement AES Algorithm for various Security Issues.

Key Words

Cloud computing, logging, privacy, Integrity, security.

Cite This Article

"Delegating Log Management to the Cloud Ensuring Secure Logging", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.2, Issue 7, page no.3105-3107, July-2015, Available :http://www.jetir.org/papers/JETIR1507021.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Delegating Log Management to the Cloud Ensuring Secure Logging", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.2, Issue 7, page no. pp3105-3107, July-2015, Available at : http://www.jetir.org/papers/JETIR1507021.pdf

Publication Details

Published Paper ID: JETIR1507021
Registration ID: 150645
Published In: Volume 2 | Issue 7 | Year July-2015
DOI (Digital Object Identifier):
Page No: 3105-3107
Country: THRISSUR, KERALA, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003214

Print This Page

Current Call For Paper

Jetir RMS