An Open Framework for Foundational Security and Public Verification for Secure Audit Logs
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Data handling and Security in cloud goes through a dynamic and complex hierarchical service chain. Secure Logging is a service that helps to maintain and store the log records more securely in the server operating in cloud based environment. Log is a record of events occurring within an organization’s system or network. Log file usually contains more sensitive and confidential information so it should be maintained more securely. In this project we discuss the security issues involved in log management for a Secure Logging as a service and present a design and implementation of a prototype delegating secure log manager. Here we secure the log records by encrypting it in a JAR file. The JAR file here will include a group of access management rule specifying whether or not and the way cloud servers and most likely different knowledge stakeholder’s square measures approved to access the contents itself. When the authentication succeeds, the service providers are allowed to access the information present within the JAR. Reckoning based on configuration settings that is set during the time of creation, the JAR will offer usage management related to the work, or can offer the solely work practicality. As for the work, every time there's correlate access to the information, the JAR can automatically generate a log records. In this paper, to provide the data security in the cloud and to address integrity and confidentiality issues while storing, maintaining, and querying log records JAR file encryption is used.
Authors and Affiliations
K. N. Jawahar, R. Nallakumar, R. Shylendar
A Novel Design of Low Power Comparator through Differential Amplifier in 90nm CMOS Technology Using Cadence Tool
In digital world, Speed, area, power are very vital parameters for high speed devices like analog to digital converters. The comparator circuit with preamplifier increases the power consumption, as it requires large amo...
Kinetic and Thermodynamic Studies on the Adsorption Behavior of Crocein Orange G Dye Using Casuarina Equisetifolia Bark Carbon
The adsorption behavior of crocein orange G dye from aqueous solution was investigated using Casuarina equisetifolia bark carbon. The effect of various experimental factors such as pH, adsorbent dose, initial dye concen...
QUADCOPTER: Four Rotor Copter
Recently, many studies are being done for providing a proper detecting method which can track the persons in different situations with high efficiency. Although, several studies have been done for detect and tracking hu...
A Survey on Handwritten Devanagari Character Recognition using Neural Network
Handwritten character can be converted in to the digital information using handwritten character Recognition, which is the ability of a computer to receive and interpret handwritten input from documents. Handwritten Dev...
Efficient Array Based Approximate Arithmetic Computing Multiplier and Squarer
Power consumption is one of the most important challenges in arithmetic circuit designs. Exact multiplier produces exact result but it consumes more power which is the main drawback of exact multipliers. The results of...