An Open Framework for Foundational Security and Public Verification for Secure Audit Logs

Abstract

Data handling and Security in cloud goes through a dynamic and complex hierarchical service chain. Secure Logging is a service that helps to maintain and store the log records more securely in the server operating in cloud based environment. Log is a record of events occurring within an organization’s system or network. Log file usually contains more sensitive and confidential information so it should be maintained more securely. In this project we discuss the security issues involved in log management for a Secure Logging as a service and present a design and implementation of a prototype delegating secure log manager. Here we secure the log records by encrypting it in a JAR file. The JAR file here will include a group of access management rule specifying whether or not and the way cloud servers and most likely different knowledge stakeholder’s square measures approved to access the contents itself. When the authentication succeeds, the service providers are allowed to access the information present within the JAR. Reckoning based on configuration settings that is set during the time of creation, the JAR will offer usage management related to the work, or can offer the solely work practicality. As for the work, every time there's correlate access to the information, the JAR can automatically generate a log records. In this paper, to provide the data security in the cloud and to address integrity and confidentiality issues while storing, maintaining, and querying log records JAR file encryption is used.

Authors and Affiliations

K. N. Jawahar, R. Nallakumar, R. Shylendar

Keywords

Related Articles

Two Level Authentication System Based on Pair Based Authentication and Image Selection

This paper presents a two level authentication using pair based authentication and image selection. The most common method for authentication is textual passwords. Though textual passwords are easy to remember, they are...

Enhanced Remote Authentication System Based On Certificateless Cryptography in Wireless Body Area Network

As a subgroup of Wireless sensor network, Wireless Body Area Network (WBAN) has been recognized as one of the emerging techniques for improving the healthcare service. However the security and privacy of user’s physiolo...

Spatio Temporal Dynamic Routing Protocol for Wireless Rechargeable Sensor Network using Heuristic based Jointly Coupling of Link and Battery Constrainst

The velocity control of the mobile chargers travelling the irregular 2D Trajectories is optimized using the Spatio Temporal Dynamic Routing (STDR) Technique to Rechargeable Wireless Sensor Network in order to extend the...

Optimization of Steering Knuckle for Off-Road Vehicle

Steering Knuckle is a non-standard component linking the suspension, steering & braking systems and the wheel hub to the chassis of a vehicle. This study aims to redesign the steering knuckle in order to reduce the weig...

slugSuffix to Prefix Rule and Substring Matching Rules of Sting Matching Algorithms: An Analytical study and Correlations

String matching is a profound problem in various fields and becomes a great challenge for running a program for pattern matching quickly and effectively with less or no complexities. The application of string matching o...

Download PDF file
  • EP ID EP20058
  • DOI -
  • Views 278
  • Downloads 5

How To Cite

K. N. Jawahar, R. Nallakumar, R. Shylendar (2015). An Open Framework for Foundational Security and Public Verification for Secure Audit Logs. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(4), -. https://europub.co.uk/articles/-A-20058