An Open Framework for Foundational Security and Public Verification for Secure Audit Logs
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Data handling and Security in cloud goes through a dynamic and complex hierarchical service chain. Secure Logging is a service that helps to maintain and store the log records more securely in the server operating in cloud based environment. Log is a record of events occurring within an organization’s system or network. Log file usually contains more sensitive and confidential information so it should be maintained more securely. In this project we discuss the security issues involved in log management for a Secure Logging as a service and present a design and implementation of a prototype delegating secure log manager. Here we secure the log records by encrypting it in a JAR file. The JAR file here will include a group of access management rule specifying whether or not and the way cloud servers and most likely different knowledge stakeholder’s square measures approved to access the contents itself. When the authentication succeeds, the service providers are allowed to access the information present within the JAR. Reckoning based on configuration settings that is set during the time of creation, the JAR will offer usage management related to the work, or can offer the solely work practicality. As for the work, every time there's correlate access to the information, the JAR can automatically generate a log records. In this paper, to provide the data security in the cloud and to address integrity and confidentiality issues while storing, maintaining, and querying log records JAR file encryption is used.
Authors and Affiliations
K. N. Jawahar, R. Nallakumar, R. Shylendar
A Study on Error Coding Techniques
There are numerous error coding techniques in the field of digital communication. They are utilized to detect/correct single bit or multiple bit errors. In this paper commonly used codes like Hamming codes, CRC and Reed...
slugReduction of Non Conformative Rate of Bearing Rings Using Six Sigma Methodology
The fast changing economic condition such as global competition declining profit margin ,customer demand for high quality product ,product variety and reduced lead time etc had a major impact on manufacturing industries...
Optical and Structural Properties of Zinc Oxide Nanowires Fabricated by Hydrothermal Method
Nanocrystalline film of Zinc Oxide (ZnO) nanowires were prepared on glass substrate at a low temperature using a low cost, simple hydrothermal method. We used different concentration of ZnO nanowires precursor solution...
A Review Report For Study of Drilling For Different Materials In Machining
Metal drilling processes are important due to increased consumer demands for quality metal drilling related products reduce tool wear and better product surface roughness that has driven the metal drilling industry to c...
Exogenous Foliar Application of Phenolic Acids on Quality Constituents of Tea
Exogenous foliar application of phenolic acid could alter the biochemical composition and enhance the antioxidant potential there by protect the living organisms from oxidative injuries. Though the reports on foliar app...