A Complete System To Securely Outsource Log Records To A Cloud Provider
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 12
Abstract
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They Turn Out To Be An Important Target For Malicious Attackers. An Attacker Breaking Into A System Normally Would Try Not To Leave Traces Of His Or Her Activities Behind. As A Result The First Thing An Attacker Often Does Is To Harm Log Files Or Break Off The Logging Services. In Addition The Sensitive Information Contained In Log Files Often Directly Contributes To Confidentiality Breaches. An Illustration Of This Is When Logs Contain Database Transaction Data. Regularly Log Information Can Be Cooperative To An Attacker In Attainment Unauthorized Access To System. One Example Of This Is The Case When A User Incorrectly Enters Her Password In The Username Field While Logging Into A System. Logging Programs Will Store Up The Password As The User-Id To Evidence The Information That A User Has Failed To Log In. Last But Not Least Information In Log File Can Also Be Used To Cause Privacy Breaches For Users In The System Since The Log File Contains Record Of All Events In The System. It Is Extremely Significant That Logging Be Provided In A Protected Manner And That The Log Records Are Effectively Protected For A Predetermined Amount Of Time Maybe Even Indefinitely. Traditional Logging Protocols That Are Based On Syslog Have Not Been Designed With Such Security Features In Mind.
Authors and Affiliations
kodari Shravan Kumar| Balaji Institute Of Technology & Science Narsampet Warangal, kodarishravan514@Gmail.Com, Vishnuprasad Goranthala| Balaji Institute Of Technology & Science Narsampet Warangal
Recursive Approach to the Design of a Parallel Self Timed Adder
As innovation scales down into the lower nanometer values control, postpone region and recurrence gets to be im¬portant parameters for the examination and plan of any circuits. This short exhibits a parallel single-...
Analyzation of Multistoried Building Strengthening in Seismic Region within fills and Using Etabs
Current building codes for seismic design and evaluation in Europe and American component execution based criteria that involve the estimation of inelastic reaction of the building because of seismic. These seismic r...
Anonymous Asserts Profile Protection In Mobile Social Networks
In The Current Environment Through Social Network People Can Find Others And Make Their Own Network. An Individual User Can Have Multiple Accounts Of Social Networking Sites. In This Paper We Proposed An Algorithm Fo...
Boost Interleaved Converter Integrated Voltage Multiplier Module for Renewable Energy System
This document presents a high step-up converter, which is apt for renewable energy system. Through a voltage multiplier unit composed of switched capacitors and coupled inductors, a conventional interleaved boost con...
DC-DC Energy Conversion with Novel loaded Resonant Converter
This paper presents the direct current (dc)-to-dc energy conversion with novel loaded-resonant converter. Energy shortages and increasing oil prices have created the demand for a high energy conversion efficiency and...