A Complete System To Securely Outsource Log Records To A Cloud Provider
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 12
Abstract
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They Turn Out To Be An Important Target For Malicious Attackers. An Attacker Breaking Into A System Normally Would Try Not To Leave Traces Of His Or Her Activities Behind. As A Result The First Thing An Attacker Often Does Is To Harm Log Files Or Break Off The Logging Services. In Addition The Sensitive Information Contained In Log Files Often Directly Contributes To Confidentiality Breaches. An Illustration Of This Is When Logs Contain Database Transaction Data. Regularly Log Information Can Be Cooperative To An Attacker In Attainment Unauthorized Access To System. One Example Of This Is The Case When A User Incorrectly Enters Her Password In The Username Field While Logging Into A System. Logging Programs Will Store Up The Password As The User-Id To Evidence The Information That A User Has Failed To Log In. Last But Not Least Information In Log File Can Also Be Used To Cause Privacy Breaches For Users In The System Since The Log File Contains Record Of All Events In The System. It Is Extremely Significant That Logging Be Provided In A Protected Manner And That The Log Records Are Effectively Protected For A Predetermined Amount Of Time Maybe Even Indefinitely. Traditional Logging Protocols That Are Based On Syslog Have Not Been Designed With Such Security Features In Mind.
Authors and Affiliations
kodari Shravan Kumar| Balaji Institute Of Technology & Science Narsampet Warangal, kodarishravan514@Gmail.Com, Vishnuprasad Goranthala| Balaji Institute Of Technology & Science Narsampet Warangal
Direct Torque Control for Matrix Converter Driven PMSM
This paper carries work on application of direct torque control for Five-Phase permanent magnet synchronous motor drives. In recent years, only voltage source inverters (VSIs) have been used to supply five-phase driv...
Strewn Effective Hiding In Shared Wireless Networks
This paper introduces cooperative caching techniques for reducing electronic content provisioning cost in Social Wireless Networks (SWNET).SWNETs are formed by mobile devices, such as modern cell phones etc. sharing...
Design of an Optical Blood Pressure Sensor for Noninvasive monitoring of blood pressure
In modern society, patients often have access to a wealth of electronic data concerning their social networks and surroundings, but have little personalized insight into their own health. Our plan is to distribute a...
Secure Database as a Service for Cloud Tenants With no Exposure Of Unencrypted Data
We propose a novel engineering that incorporates cloud database administrations with data mystery and the probability of executing concurrent operations on mixed data. This is the main course of action supporting ge...
Defeating Ddos Attack By Using Software Puzzle Scheme
Denial of-administration and passed on DoS are among the genuine dangers to cutting edge security, and customer bewilder, which requests a customer to perform computationally exorbitant operations before being yielde...