Secure Logging as a Service In Cloud

Authors(4) :-T. Sakthisree, Kumaresan S, Manisha D, Prathapkannan M

Data and authorization security are needed everywhere. In case dealing with huge number of data in a cloud server, secured logging is must. This is because cloud servers are easily accessible and any one can access anywhere at any time. This is because intruders may have knowledge about the network where they are going to intrude. So data should be preserved well for intruders, hackers and unauthorised user. The main objective of this paper is to develop a secured logging as a service in cloud architecture. So in the proposed method, privacy and preservation methods are implemented. The secured logging contains six major functionalities to ensure more securities: Correctness, Confidentiality, data logs, Privacy, Preservation and VPS (Virtual proxy server). Confidentiality deals with sensitive information not displaying during search. Data logs deals with the data history for identifying appropriate users. Privacy scheme deals with file linking and data access history. So that secured logging as a service is much important for all kind of cloud server environment in order to provide proper login for authorized user and triggers out the unauthorized users.Preservation deals with enhanced colour code. Hackers can be avoided and intruders are canít be avoided.

Authors and Affiliations

T. Sakthisree
Computer Science and Engineering, Kathir College of Engineering, Coimbatore, Tamil Nadu, India
Kumaresan S
Computer Science and Engineering, Kathir College of Engineering, Coimbatore, Tamil Nadu, India
Manisha D
Computer Science and Engineering, Kathir College of Engineering, Coimbatore, Tamil Nadu, India
Prathapkannan M
Computer Science and Engineering, Kathir College of Engineering, Coimbatore, Tamil Nadu, India

Secure Logging, Cloud Server, Virtual Proxy Serve, Network Security, Cloud Computing, SLAS, IaaS, PaaS, NAT

  1. U. Flegel, "Pseudonymizing unix log file," inProc. Int. Conf. Infrastru-ture Security, LNCS 2437. Oct. 2002, pp. 162–179.
  2. C. Eckert and A. Pircher, "Internet anonymity: Problems and solutions," in Proc. 16th IFIP TC-11 Int. Conf. Inform. Security, 2001, pp. 35–50 .
  3. M. Rose, The Blocks Extensible Exchange Protocol Core, Request for Comment RFC 3080, Internet Engineering Task Force, Network Working Group, Mar. 2001.
  4. B. Schneier and J. Kelsey, "Security audit logs to support computer forensics," ACM Trans. Inform. Syst. Security, vol. 2, no. 2, pp. 159– 176, May 1999.
  5. J. E. Holt, "Logcrypt: Forward security and public verification for secure audit logs," inProc. 4th Australasian Inform. Security Workshop, 2006, pp. 203–211.
  6. R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The second-generation onion router," inProc. 12th Ann. USENIX Security Symp., Aug. 2004, pp. 21–21.
  7. The Tor Project, Inc. (2011, Sep.) Tor: Anonymity Online Online]. Available: http://www.torproject.org
  8. D. Dolev and A. Yao, "On the security of public key protocols," IEEE Trans. Inform. Theory, vol. 29, no. 2, pp. 198–208, Mar. 1983.
  9. A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979.
  10. G. R. Blakley, "Safeguarding cryptographic keys," inProc. Nat. Comput. Conf., Jun. 1979, p. 313.
  11. R. Ostrovsky and M. Yung, "How to withstand mobile virus attack," in Proc. 10th Ann. ACM Symp. Principles Distributed Comput., Aug. 1991, pp. 51–59.
  12. A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive secret sharing or: How to cope with perpetual leakage," inProc. 15th Ann. Int. Cryptology Conf., Aug. 1995, pp. 339–352.
  13. I. Teranishi, J. Furukawa, and K. Sako, "k-times anonymous authen-tication (extended abstract)," in Proc. 10th Int. Conf. Theor. Appl. Cryptology Inform. Security, LNCS 3329. 2004, pp. 308–322.
  14. D. L. Wells, J. A. Blakeley, and C. W. Thompson, "Architecture of an open object-oriented database management system,"IEEE Comput., vol. 25, no. 10, pp. 74–82, Oct. 1992.
  15. K. Nørv˚ ag, O. Sandst˚ a, and K. Bratbergsengen, "Concurrency control in distributed object oriented database systems," in Proc. 1st East-Eur. Symp. Adv. Databases Inform. Syst., Sep. 1997, pp. 32–32.

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2017
Date of Publication : 2017-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 499-503
Manuscript Number : CSEIT1722156
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

T. Sakthisree, Kumaresan S, Manisha D, Prathapkannan M, "Secure Logging as a Service In Cloud", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.499-503, March-April-2017.
Journal URL : http://ijsrcseit.com/CSEIT1722156

Article Preview

Follow Us

Contact Us