SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 151
A SURVEY ON SECURED LOGGING IN THE CLOUD
Prasad P Kharade1
, S.B.Natikar2
1
ME Student, Computer Engineering, VACOE, Maharashtra, India
2
Asst .Professor, Computer Engineering, VACOE, Maharashtra, India
Abstract
Log is a group of different types of actions that take place in organization. Logs are often compromised by an attacker so
providing security to the log record is challenging task. Log record generally contains some sensitive information so
confidentiality and integrity are important as the privacy is concerned. So there is need to protect the log records for the proper
functioning of any organization. It is observed that over extended period of time introducing the secured logging techniques
involves great capital that finds every organization irresistible. Appointing the logs record to the cloud environment saves the cost
In this paper we are suggesting the homo morphic encryption scheme that provides a strong security.
Keywords: cloud computing, Logging, Security.
-------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
A log is a collection of events that take place in any
organization and all activities are recorded in a log file. Log
records are helpful to track all the user actions. Logging is
essential because log record can be used to rectify the
troubles and to improve the system’s performance. log
records are the main target of attacker because attacker don’t
want to leave any footprint of any action performed by him
at the time of attack. In this way first target of attacker is to
have access to the log files therefore after having access to
log file the first thing that attacker want to do is to damage
the files and threaten to the confidentiality and second thing
is that to discontinue the logging service to confused the
loggers. Furthermore there are chances of outsourcing the
personal information to others in this way violating the
security. One example is that when user wrongly put his
password in the username filed at that time when he logged
into system then logging program take password as
username in this way breaches the security. From above
scenario it is mandatory that logging should be done in
secure manner and log files are sufficiently protected for
long amount of time.
2. DESIRABLE PROPERTIES TO SECURE
LOGGING
1. Correctness: Log record is important because it shows
the true history of the system so that collected log record
should be correct. It should be same when it was generated.
2. Verifiability: It must be able to check that all the entries
in the log record are available or not and it must be ensured
that data in log record have not been altered.
3. Confidentiality: Log records should not be easily
searchable to collect the personal information of others.
Access should be provided to only legitimate users.
4. Privacy: While in transit log records should not be track
able to unauthorized persons.
5. Tamper Resistance: A log should be provided security
in such a way that only log generators are allowed to
introduce valid entries.
3. LITERATURE SURVEY
In this section we are going to review different types of
secure logging techniques along with their major
disadvantages. Different techniques used for secure logging
are shown below.
Table 1secured Logging Method Review
Sr.N
o
Scientist’s Name Proposed
Models
disadvantages
1 C
Lonvick,Aug200
1
Syslog
Protocol
Uses UDP
protocol so
unreliable
delivery and it
can’t protect
log records in
transit
2 Balabit,2011 Syslog-ng It can’t
protect
against log
data
modification
when it stored
in system.
3 J. Kelsey & J.
Callas, May 2010
Syslog-sign It doesn’t
provides data
confidentialit
y and privacy
during transit
of data.
4 U. Flegel, Oct
2002
Syslog-
pseudo
This protocol
doesn’t ensure
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 152
exactness of
logs.
5 D. New & M.
Rose, Nov 2001
Reliable-
syslog
Not prevent
against
confidentialit
y and privacy
of data.
6 M. Bellare and
Yee, Nov 1997
Forward
Integrity
This protocol
requires
online trusted
servers.
7 D. Ma and
Tsudik, March
2009
Forward
secure
sequential
authenticatio
n
Competent
method but
requires more
capital.
8 Indrajit Ray & K.
Belyaev, June
2013
Secure
Logging As
A Service-
Delegating
Log
Management
to the Cloud
Most
competent
And secured
method but
loosely
coupled
architecture.
3.1 DISCUSSION ON SURVEY PAPERS
3.1 The BSD Syslog Protocol
D. New and M. Rose declared in their work as: The BSD
Syslog Protocol[1][2] defines a number of service associated
options and also relate to inseminating event messages. This
message also describes the two mappings of the syslog
protocol to TCP connections, both which are helpful for
transmitting trustworthy delivery of event messages. This
administers a trivial mapping maximizing backward
compatibility and also helps in supplying a more entire
mapping. Both provides a degree of sturdiness and security
in message delivery that is engaged to the usual UDP-based
syslog protocol, by providing encryption and authentication
over a connection-oriented protocol.
3.2 Forward Integrity for Secure Audit Logs
M. Bellare and B. S. Yee[3] explaining as: Applications
incorporate more secure audit logs (e.g., syslogd data) for
intrusion exposure or accountability, communications
security, and authenticating incomplete results of
computation for mobile agents. Computer audit logs
including descriptions of notable events which crashes of
system programs, system resource consumption, failed login
attempts, etc. Many of these events are serious for
investigating analysis after a break-in. The rst aim of an
experienced attacker will be the audit log system: the
attacker desires to remove traces of the compromise, to
avoid detection as well as to maintain the method of attack
undisclosed so that the security gap broken will not be
detected by the system administrator. To construct the audit
log secure, we must avoid the attacker from modifying the
audit log data.
3.3 Logcrypt: Forward Security and Public
Verification for Secure Audit Logs
J. E. Holt[9] predictable as: The famous application
Tripwire manages cryptographic fingerprints of all files on a
computer granting the administrators to identify when
attackers compromise the system and modify the essential
system files. But Tripwire is incompatible for system logs
and other files that alters often, since the fingerprints
generates affect to files in their intactness. A number of
peoples have projected cryptographic techniques which
permit each new log entry to be fingerprinted, blocking
attackers from discarding proof of their attacks from system
logs.
3.4 Secure Audit Logs to Support Computer
Forensics
B. Schneier and J. Kelsey[8] discussed on the following: In
many real-world applications, sensitive data are put in logs
which are fewer on an un trusted machine. When an incident
takes place as an attacker controls this machine, it is assured
that the attacker will achieve tiny or no information from the
log less and to bound his ability to damage the log files.
Here the projected system shows a computationally
inexpensive method for making all log entries generated
earlier to the logging machine's compromise unfeasible for
the attacker to read and also unfeasible to unnoticeably
change or destroy. A computer that uses logs of different
kinds of network activity wishes to have log entries of an
attack undeletable and not alterable, even in the occasion
that an attacker takes over the logging machine over the
network. An intrusion-detection system that logs the starting
access and exit of people into a secured region desires to
oppose attempts to scrub out or alter logs, even after the
machine on which the logging takes place has been taken
over by an attacker.
3.5 A New Approach to Secure Logging
D. Ma and G. Tsudik[6] stated as :The necessity for secure
logging is well-understood by the security professionals,
counting both researchers and practitioners. The capability
to professionally validate all log entries is more essential to
any purpose handling secure logging techniques. In this
paper, we start by investigating state-of-the-art in secure
logging and recognize some troubles inborn to systems
based on trusted third-party servers. They suggest a very
dissimilar approach to secure logging based upon newly
developed Forward-Secure Sequential Aggregate
authentication techniques.
3.6 On the Security of Public Key Protocols
D. Dolev and A. Yao[10] explained as: newly the use of
public key encryption was to offer a secure network
communication which has established a significant attention.
Such public key systems are frequently useful in providing
against the passive eavesdroppers, who regularly try to
strike the lines and try to decode the message. It has been
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 153
pointed out, that an inappropriate designed procedure could
be susceptible to an active behavior like that, one who may
imitate another user or change the message being
transmitted. numerous models have been prepared in which
the security of protocols are discussed accurately.
Algorithms and characterizations are used in finding
protocol security in these models which have been given.
The use of public key encryption was to offer a secure
network communication which has established substantial
attention.
4. PROPOSED WORK
The increasing popularity of cloud-based data and mobile
devices has led to the appearance of a number of latest
information services to meet people's needs. At the same
time, there is an increasing attentiveness of the problem of
personal information becoming public and of the require to
be proficient to use personal data while keeping it private. In
this paper we are introducing the concept of homo morphic
encryption. Homo morphic encryption means it is a form of
encryption which allows particular types of computations to
be takes place on cipher text and produce an encrypted
result which, when decrypted, matches the result of
operations carried out on the plaintext in this way security
achieved is more.
Encryption is an helpful way to defend data, although in
most encryption methods, data needs to be temporarily
decrypted in order to perform calculations such as totals.
This is problematic because the data becomes exposed the
moment it is decrypted. Homo morphic encryption,
however, allows for calculations to be performed on data in
an encrypted manner, making it a talented technique for
delivering new cloud services.
Fig 1.System Architecture
5. CONCLUSIONS
In this project, a comprehensive system to securely contract
out log records to a cloud service provider. It analyzed
presented results and recognized troubles in the present
operating system based logging services such as syslog and
practical difficulties in some of the existing secure logging
methods and discover the challenges for a secure cloud
based log management service.
Homo morphic implementation of log management system
to carry out the implementation of encrypted query
operating on encrypted data. We discussed a simple homo
morphic encryption scheme as a orientation model. The
basic homo morphic scheme will not get a efficient
processing of queries over encrypted log records and also
have drawbacks. In Future to remove drawback there is need
to developed sophisticated homo morphic encryption
method.
REFERENCES
[1]. C. Lonvick, The BSD Syslog Protocol, Request for
Comment RFC 3164, Internet Engineering Task Force,
Network Working Group, Aug. 2001.
[2]. D. New and M. Rose, Reliable Delivery for Syslog,
Request for Comment RFC 3195, Internet Engineering Task
Force, Network Working Group, Nov. 2001.
[3]. M. Bell are and B. S. Yee, ―Forward integrity for secure
audit logs,‖ Dept. Computer. Sci., Univ. California, San
Diego, Tech. Rep., Nov. 1997.
[4]. Bala Bit IT Security (2011, Sep.). Syslog-ng—
Multiplatform Syslog Server and Logging Daemon [Online].
Available: http://www.balabit. Com /network-security /
syslog-ng
[5]. J. Kelsey, J. Callas, and A. Clemm, Signed Syslog
Messages, Request for Comment RFC 5848, Internet
Engineering Task Force, Network Working Group, May
2010.
[6]. D. Ma and G. Tsudik, ―A new approach to secure
logging,‖ ACM Trans .Storage, vol. 5, no. 1, pp. 2:1–2:21,
Mar. 2009.
[7]. U. Flegel, ―Pseudonymizing unix log file,‖ in Proc. Int.
Conf. Infrastructure Security, LNCS 2437. Oct. 2002, pp.
162–179.
[8]. B. Schneier and J. Kelsey, ―Security audit logs to
support computer forensics,‖ ACM Trans. Inform. Syst.
Security, vol. 2, no. 2, pp. 159–176, May 1999.
[9]. J. E. Holt, ―Logcrypt: Forward security and public
verification for secure audit logs,‖ in Proc. 4th Australasian
Inform. Security Workshop, 2006,pp. 203–211.
[10]. D. Dolev and A. Yao, ―On the security of public key
protocols,‖ IEEE Trans. Inform. Theory, vol. 29, no. 2, pp.
198–208, Mar. 1983.
[11]. K. Kent and M. Souppaya. (1992). Guide to Computer
Security Log Management, NIST Special Publication 800-
92
[Online].Available:http://csrc.nist.gov/publications/nistpubs/
800-92/SP800-92.pdf

More Related Content

What's hot

A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...eSAT Journals
 
A Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber SecurityA Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber Securityrahulmonikasharma
 
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationImproving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationAM Publications,India
 
Detection and prevention of keylogger spyware attacks
Detection and prevention of keylogger spyware attacksDetection and prevention of keylogger spyware attacks
Detection and prevention of keylogger spyware attacksIAEME Publication
 
A New Research and Design for Grid Portal Security System
A New Research and Design for Grid Portal Security SystemA New Research and Design for Grid Portal Security System
A New Research and Design for Grid Portal Security Systemijfcstjournal
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationPeter Choi
 
Keyloggers A Malicious Attack
Keyloggers A Malicious AttackKeyloggers A Malicious Attack
Keyloggers A Malicious Attackijtsrd
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAijp2p
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsIDES Editor
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
 
Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Editor IJCATR
 
Securing information in wireless sensor networks
Securing information in wireless sensor networksSecuring information in wireless sensor networks
Securing information in wireless sensor networkseSAT Publishing House
 
enhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudenhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudINFOGAIN PUBLICATION
 
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesPattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesIJNSA Journal
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...IRJET Journal
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iinventionjournals
 
Website vulnerability to session fixation attacks
Website vulnerability to session fixation attacksWebsite vulnerability to session fixation attacks
Website vulnerability to session fixation attacksAlexander Decker
 

What's hot (20)

Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...
 
A Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber SecurityA Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber Security
 
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationImproving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and Authentication
 
Detection and prevention of keylogger spyware attacks
Detection and prevention of keylogger spyware attacksDetection and prevention of keylogger spyware attacks
Detection and prevention of keylogger spyware attacks
 
A New Research and Design for Grid Portal Security System
A New Research and Design for Grid Portal Security SystemA New Research and Design for Grid Portal Security System
A New Research and Design for Grid Portal Security System
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
Keyloggers A Malicious Attack
Keyloggers A Malicious AttackKeyloggers A Malicious Attack
Keyloggers A Malicious Attack
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer Systems
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption
 
Securing information in wireless sensor networks
Securing information in wireless sensor networksSecuring information in wireless sensor networks
Securing information in wireless sensor networks
 
enhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudenhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloud
 
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesPattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
Website vulnerability to session fixation attacks
Website vulnerability to session fixation attacksWebsite vulnerability to session fixation attacks
Website vulnerability to session fixation attacks
 

Viewers also liked

Identification of dynamic rigidity for high speed
Identification of dynamic rigidity for high speedIdentification of dynamic rigidity for high speed
Identification of dynamic rigidity for high speedeSAT Publishing House
 
Preparation, characterization and application of
Preparation, characterization and application ofPreparation, characterization and application of
Preparation, characterization and application ofeSAT Publishing House
 
Comparative analysis of dynamic programming
Comparative analysis of dynamic programmingComparative analysis of dynamic programming
Comparative analysis of dynamic programmingeSAT Publishing House
 
Pilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaPilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaeSAT Publishing House
 
The compensatation of unbalanced 3 phase currents in transmission systems on ...
The compensatation of unbalanced 3 phase currents in transmission systems on ...The compensatation of unbalanced 3 phase currents in transmission systems on ...
The compensatation of unbalanced 3 phase currents in transmission systems on ...eSAT Publishing House
 
Gsm or x10 based scada system for industrial
Gsm or x10 based scada system for industrialGsm or x10 based scada system for industrial
Gsm or x10 based scada system for industrialeSAT Publishing House
 
Formulating a trip production prediction model for
Formulating a trip production prediction model forFormulating a trip production prediction model for
Formulating a trip production prediction model foreSAT Publishing House
 
3 d mrf based video tracking in the compressed domain
3 d mrf based video tracking in the compressed domain3 d mrf based video tracking in the compressed domain
3 d mrf based video tracking in the compressed domaineSAT Publishing House
 
Scour investigation around single and two piers
Scour investigation around single and two piersScour investigation around single and two piers
Scour investigation around single and two pierseSAT Publishing House
 
Partial encryption of compresed video
Partial encryption of compresed videoPartial encryption of compresed video
Partial encryption of compresed videoeSAT Publishing House
 
An experimental study of square footing resting on geo grid reinforced sand
An experimental study of square footing resting on geo grid reinforced sandAn experimental study of square footing resting on geo grid reinforced sand
An experimental study of square footing resting on geo grid reinforced sandeSAT Publishing House
 
Effect of project cost and time monitoring on
Effect of project cost and time monitoring onEffect of project cost and time monitoring on
Effect of project cost and time monitoring oneSAT Publishing House
 
Biosynthesis and characterization of silver nanoparticles using ficus benghal...
Biosynthesis and characterization of silver nanoparticles using ficus benghal...Biosynthesis and characterization of silver nanoparticles using ficus benghal...
Biosynthesis and characterization of silver nanoparticles using ficus benghal...eSAT Publishing House
 
An overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions forAn overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions foreSAT Publishing House
 
Testing of memory using franklin method
Testing of memory using franklin methodTesting of memory using franklin method
Testing of memory using franklin methodeSAT Publishing House
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocoleSAT Publishing House
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationseSAT Publishing House
 
Hierarchal clustering and similarity measures along
Hierarchal clustering and similarity measures alongHierarchal clustering and similarity measures along
Hierarchal clustering and similarity measures alongeSAT Publishing House
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageeSAT Publishing House
 
A virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann withA virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann witheSAT Publishing House
 

Viewers also liked (20)

Identification of dynamic rigidity for high speed
Identification of dynamic rigidity for high speedIdentification of dynamic rigidity for high speed
Identification of dynamic rigidity for high speed
 
Preparation, characterization and application of
Preparation, characterization and application ofPreparation, characterization and application of
Preparation, characterization and application of
 
Comparative analysis of dynamic programming
Comparative analysis of dynamic programmingComparative analysis of dynamic programming
Comparative analysis of dynamic programming
 
Pilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaPilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdma
 
The compensatation of unbalanced 3 phase currents in transmission systems on ...
The compensatation of unbalanced 3 phase currents in transmission systems on ...The compensatation of unbalanced 3 phase currents in transmission systems on ...
The compensatation of unbalanced 3 phase currents in transmission systems on ...
 
Gsm or x10 based scada system for industrial
Gsm or x10 based scada system for industrialGsm or x10 based scada system for industrial
Gsm or x10 based scada system for industrial
 
Formulating a trip production prediction model for
Formulating a trip production prediction model forFormulating a trip production prediction model for
Formulating a trip production prediction model for
 
3 d mrf based video tracking in the compressed domain
3 d mrf based video tracking in the compressed domain3 d mrf based video tracking in the compressed domain
3 d mrf based video tracking in the compressed domain
 
Scour investigation around single and two piers
Scour investigation around single and two piersScour investigation around single and two piers
Scour investigation around single and two piers
 
Partial encryption of compresed video
Partial encryption of compresed videoPartial encryption of compresed video
Partial encryption of compresed video
 
An experimental study of square footing resting on geo grid reinforced sand
An experimental study of square footing resting on geo grid reinforced sandAn experimental study of square footing resting on geo grid reinforced sand
An experimental study of square footing resting on geo grid reinforced sand
 
Effect of project cost and time monitoring on
Effect of project cost and time monitoring onEffect of project cost and time monitoring on
Effect of project cost and time monitoring on
 
Biosynthesis and characterization of silver nanoparticles using ficus benghal...
Biosynthesis and characterization of silver nanoparticles using ficus benghal...Biosynthesis and characterization of silver nanoparticles using ficus benghal...
Biosynthesis and characterization of silver nanoparticles using ficus benghal...
 
An overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions forAn overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions for
 
Testing of memory using franklin method
Testing of memory using franklin methodTesting of memory using franklin method
Testing of memory using franklin method
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 
Hierarchal clustering and similarity measures along
Hierarchal clustering and similarity measures alongHierarchal clustering and similarity measures along
Hierarchal clustering and similarity measures along
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storage
 
A virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann withA virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann with
 

Similar to Secure Logging in the Cloud Survey

A survey on encryption algorithms for data security
A survey on encryption algorithms for data securityA survey on encryption algorithms for data security
A survey on encryption algorithms for data securityeSAT Journals
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
 
IRJET- A Survey for an Efficient Secure Guarantee in Network Flow
IRJET-  	  A Survey for an Efficient Secure Guarantee in Network FlowIRJET-  	  A Survey for an Efficient Secure Guarantee in Network Flow
IRJET- A Survey for an Efficient Secure Guarantee in Network FlowIRJET Journal
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKINGDATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKINGIJNSA Journal
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security FrameworkMaria Perkins
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKijcsit
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdfDr. Shivashankar
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Publishing House
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDIJNSA Journal
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionCSCJournals
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudIJSRD
 
IRJET- A Survey on Cryptography, Encryption and Compression Techniques
IRJET- A Survey on Cryptography, Encryption and Compression TechniquesIRJET- A Survey on Cryptography, Encryption and Compression Techniques
IRJET- A Survey on Cryptography, Encryption and Compression TechniquesIRJET Journal
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...IRJET Journal
 

Similar to Secure Logging in the Cloud Survey (20)

A survey on encryption algorithms for data security
A survey on encryption algorithms for data securityA survey on encryption algorithms for data security
A survey on encryption algorithms for data security
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
 
IRJET- A Survey for an Efficient Secure Guarantee in Network Flow
IRJET-  	  A Survey for an Efficient Secure Guarantee in Network FlowIRJET-  	  A Survey for an Efficient Secure Guarantee in Network Flow
IRJET- A Survey for an Efficient Secure Guarantee in Network Flow
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKINGDATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security Framework
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORK
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdf
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 
Paper2
Paper2Paper2
Paper2
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
 
IRJET- A Survey on Cryptography, Encryption and Compression Techniques
IRJET- A Survey on Cryptography, Encryption and Compression TechniquesIRJET- A Survey on Cryptography, Encryption and Compression Techniques
IRJET- A Survey on Cryptography, Encryption and Compression Techniques
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 

Secure Logging in the Cloud Survey

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 151 A SURVEY ON SECURED LOGGING IN THE CLOUD Prasad P Kharade1 , S.B.Natikar2 1 ME Student, Computer Engineering, VACOE, Maharashtra, India 2 Asst .Professor, Computer Engineering, VACOE, Maharashtra, India Abstract Log is a group of different types of actions that take place in organization. Logs are often compromised by an attacker so providing security to the log record is challenging task. Log record generally contains some sensitive information so confidentiality and integrity are important as the privacy is concerned. So there is need to protect the log records for the proper functioning of any organization. It is observed that over extended period of time introducing the secured logging techniques involves great capital that finds every organization irresistible. Appointing the logs record to the cloud environment saves the cost In this paper we are suggesting the homo morphic encryption scheme that provides a strong security. Keywords: cloud computing, Logging, Security. -------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION A log is a collection of events that take place in any organization and all activities are recorded in a log file. Log records are helpful to track all the user actions. Logging is essential because log record can be used to rectify the troubles and to improve the system’s performance. log records are the main target of attacker because attacker don’t want to leave any footprint of any action performed by him at the time of attack. In this way first target of attacker is to have access to the log files therefore after having access to log file the first thing that attacker want to do is to damage the files and threaten to the confidentiality and second thing is that to discontinue the logging service to confused the loggers. Furthermore there are chances of outsourcing the personal information to others in this way violating the security. One example is that when user wrongly put his password in the username filed at that time when he logged into system then logging program take password as username in this way breaches the security. From above scenario it is mandatory that logging should be done in secure manner and log files are sufficiently protected for long amount of time. 2. DESIRABLE PROPERTIES TO SECURE LOGGING 1. Correctness: Log record is important because it shows the true history of the system so that collected log record should be correct. It should be same when it was generated. 2. Verifiability: It must be able to check that all the entries in the log record are available or not and it must be ensured that data in log record have not been altered. 3. Confidentiality: Log records should not be easily searchable to collect the personal information of others. Access should be provided to only legitimate users. 4. Privacy: While in transit log records should not be track able to unauthorized persons. 5. Tamper Resistance: A log should be provided security in such a way that only log generators are allowed to introduce valid entries. 3. LITERATURE SURVEY In this section we are going to review different types of secure logging techniques along with their major disadvantages. Different techniques used for secure logging are shown below. Table 1secured Logging Method Review Sr.N o Scientist’s Name Proposed Models disadvantages 1 C Lonvick,Aug200 1 Syslog Protocol Uses UDP protocol so unreliable delivery and it can’t protect log records in transit 2 Balabit,2011 Syslog-ng It can’t protect against log data modification when it stored in system. 3 J. Kelsey & J. Callas, May 2010 Syslog-sign It doesn’t provides data confidentialit y and privacy during transit of data. 4 U. Flegel, Oct 2002 Syslog- pseudo This protocol doesn’t ensure
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 152 exactness of logs. 5 D. New & M. Rose, Nov 2001 Reliable- syslog Not prevent against confidentialit y and privacy of data. 6 M. Bellare and Yee, Nov 1997 Forward Integrity This protocol requires online trusted servers. 7 D. Ma and Tsudik, March 2009 Forward secure sequential authenticatio n Competent method but requires more capital. 8 Indrajit Ray & K. Belyaev, June 2013 Secure Logging As A Service- Delegating Log Management to the Cloud Most competent And secured method but loosely coupled architecture. 3.1 DISCUSSION ON SURVEY PAPERS 3.1 The BSD Syslog Protocol D. New and M. Rose declared in their work as: The BSD Syslog Protocol[1][2] defines a number of service associated options and also relate to inseminating event messages. This message also describes the two mappings of the syslog protocol to TCP connections, both which are helpful for transmitting trustworthy delivery of event messages. This administers a trivial mapping maximizing backward compatibility and also helps in supplying a more entire mapping. Both provides a degree of sturdiness and security in message delivery that is engaged to the usual UDP-based syslog protocol, by providing encryption and authentication over a connection-oriented protocol. 3.2 Forward Integrity for Secure Audit Logs M. Bellare and B. S. Yee[3] explaining as: Applications incorporate more secure audit logs (e.g., syslogd data) for intrusion exposure or accountability, communications security, and authenticating incomplete results of computation for mobile agents. Computer audit logs including descriptions of notable events which crashes of system programs, system resource consumption, failed login attempts, etc. Many of these events are serious for investigating analysis after a break-in. The rst aim of an experienced attacker will be the audit log system: the attacker desires to remove traces of the compromise, to avoid detection as well as to maintain the method of attack undisclosed so that the security gap broken will not be detected by the system administrator. To construct the audit log secure, we must avoid the attacker from modifying the audit log data. 3.3 Logcrypt: Forward Security and Public Verification for Secure Audit Logs J. E. Holt[9] predictable as: The famous application Tripwire manages cryptographic fingerprints of all files on a computer granting the administrators to identify when attackers compromise the system and modify the essential system files. But Tripwire is incompatible for system logs and other files that alters often, since the fingerprints generates affect to files in their intactness. A number of peoples have projected cryptographic techniques which permit each new log entry to be fingerprinted, blocking attackers from discarding proof of their attacks from system logs. 3.4 Secure Audit Logs to Support Computer Forensics B. Schneier and J. Kelsey[8] discussed on the following: In many real-world applications, sensitive data are put in logs which are fewer on an un trusted machine. When an incident takes place as an attacker controls this machine, it is assured that the attacker will achieve tiny or no information from the log less and to bound his ability to damage the log files. Here the projected system shows a computationally inexpensive method for making all log entries generated earlier to the logging machine's compromise unfeasible for the attacker to read and also unfeasible to unnoticeably change or destroy. A computer that uses logs of different kinds of network activity wishes to have log entries of an attack undeletable and not alterable, even in the occasion that an attacker takes over the logging machine over the network. An intrusion-detection system that logs the starting access and exit of people into a secured region desires to oppose attempts to scrub out or alter logs, even after the machine on which the logging takes place has been taken over by an attacker. 3.5 A New Approach to Secure Logging D. Ma and G. Tsudik[6] stated as :The necessity for secure logging is well-understood by the security professionals, counting both researchers and practitioners. The capability to professionally validate all log entries is more essential to any purpose handling secure logging techniques. In this paper, we start by investigating state-of-the-art in secure logging and recognize some troubles inborn to systems based on trusted third-party servers. They suggest a very dissimilar approach to secure logging based upon newly developed Forward-Secure Sequential Aggregate authentication techniques. 3.6 On the Security of Public Key Protocols D. Dolev and A. Yao[10] explained as: newly the use of public key encryption was to offer a secure network communication which has established a significant attention. Such public key systems are frequently useful in providing against the passive eavesdroppers, who regularly try to strike the lines and try to decode the message. It has been
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 153 pointed out, that an inappropriate designed procedure could be susceptible to an active behavior like that, one who may imitate another user or change the message being transmitted. numerous models have been prepared in which the security of protocols are discussed accurately. Algorithms and characterizations are used in finding protocol security in these models which have been given. The use of public key encryption was to offer a secure network communication which has established substantial attention. 4. PROPOSED WORK The increasing popularity of cloud-based data and mobile devices has led to the appearance of a number of latest information services to meet people's needs. At the same time, there is an increasing attentiveness of the problem of personal information becoming public and of the require to be proficient to use personal data while keeping it private. In this paper we are introducing the concept of homo morphic encryption. Homo morphic encryption means it is a form of encryption which allows particular types of computations to be takes place on cipher text and produce an encrypted result which, when decrypted, matches the result of operations carried out on the plaintext in this way security achieved is more. Encryption is an helpful way to defend data, although in most encryption methods, data needs to be temporarily decrypted in order to perform calculations such as totals. This is problematic because the data becomes exposed the moment it is decrypted. Homo morphic encryption, however, allows for calculations to be performed on data in an encrypted manner, making it a talented technique for delivering new cloud services. Fig 1.System Architecture 5. CONCLUSIONS In this project, a comprehensive system to securely contract out log records to a cloud service provider. It analyzed presented results and recognized troubles in the present operating system based logging services such as syslog and practical difficulties in some of the existing secure logging methods and discover the challenges for a secure cloud based log management service. Homo morphic implementation of log management system to carry out the implementation of encrypted query operating on encrypted data. We discussed a simple homo morphic encryption scheme as a orientation model. The basic homo morphic scheme will not get a efficient processing of queries over encrypted log records and also have drawbacks. In Future to remove drawback there is need to developed sophisticated homo morphic encryption method. REFERENCES [1]. C. Lonvick, The BSD Syslog Protocol, Request for Comment RFC 3164, Internet Engineering Task Force, Network Working Group, Aug. 2001. [2]. D. New and M. Rose, Reliable Delivery for Syslog, Request for Comment RFC 3195, Internet Engineering Task Force, Network Working Group, Nov. 2001. [3]. M. Bell are and B. S. Yee, ―Forward integrity for secure audit logs,‖ Dept. Computer. Sci., Univ. California, San Diego, Tech. Rep., Nov. 1997. [4]. Bala Bit IT Security (2011, Sep.). Syslog-ng— Multiplatform Syslog Server and Logging Daemon [Online]. Available: http://www.balabit. Com /network-security / syslog-ng [5]. J. Kelsey, J. Callas, and A. Clemm, Signed Syslog Messages, Request for Comment RFC 5848, Internet Engineering Task Force, Network Working Group, May 2010. [6]. D. Ma and G. Tsudik, ―A new approach to secure logging,‖ ACM Trans .Storage, vol. 5, no. 1, pp. 2:1–2:21, Mar. 2009. [7]. U. Flegel, ―Pseudonymizing unix log file,‖ in Proc. Int. Conf. Infrastructure Security, LNCS 2437. Oct. 2002, pp. 162–179. [8]. B. Schneier and J. Kelsey, ―Security audit logs to support computer forensics,‖ ACM Trans. Inform. Syst. Security, vol. 2, no. 2, pp. 159–176, May 1999. [9]. J. E. Holt, ―Logcrypt: Forward security and public verification for secure audit logs,‖ in Proc. 4th Australasian Inform. Security Workshop, 2006,pp. 203–211. [10]. D. Dolev and A. Yao, ―On the security of public key protocols,‖ IEEE Trans. Inform. Theory, vol. 29, no. 2, pp. 198–208, Mar. 1983. [11]. K. Kent and M. Souppaya. (1992). Guide to Computer Security Log Management, NIST Special Publication 800- 92 [Online].Available:http://csrc.nist.gov/publications/nistpubs/ 800-92/SP800-92.pdf