A Complete System To Securely Outsource Log Records To A Cloud Provider
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 12
Abstract
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They Turn Out To Be An Important Target For Malicious Attackers. An Attacker Breaking Into A System Normally Would Try Not To Leave Traces Of His Or Her Activities Behind. As A Result The First Thing An Attacker Often Does Is To Harm Log Files Or Break Off The Logging Services. In Addition The Sensitive Information Contained In Log Files Often Directly Contributes To Confidentiality Breaches. An Illustration Of This Is When Logs Contain Database Transaction Data. Regularly Log Information Can Be Cooperative To An Attacker In Attainment Unauthorized Access To System. One Example Of This Is The Case When A User Incorrectly Enters Her Password In The Username Field While Logging Into A System. Logging Programs Will Store Up The Password As The User-Id To Evidence The Information That A User Has Failed To Log In. Last But Not Least Information In Log File Can Also Be Used To Cause Privacy Breaches For Users In The System Since The Log File Contains Record Of All Events In The System. It Is Extremely Significant That Logging Be Provided In A Protected Manner And That The Log Records Are Effectively Protected For A Predetermined Amount Of Time Maybe Even Indefinitely. Traditional Logging Protocols That Are Based On Syslog Have Not Been Designed With Such Security Features In Mind.
Authors and Affiliations
kodari Shravan Kumar| Balaji Institute Of Technology & Science Narsampet Warangal, kodarishravan514@Gmail.Com, Vishnuprasad Goranthala| Balaji Institute Of Technology & Science Narsampet Warangal
Performance Improvement of IUPQC in Distribution System under Abnormal Conditions Using PID
To improve the performance of feeders in the distribution system a new topology is introduced in this paper based on the interline unified power quality conditioner (IUPQC). This IUPQC consists of both series and shu...
Secrecy Stabilizing for Cloud Storage With Assessing Of Third Party
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage...
Optimizing Architecture of DSRC Device By Using Component Reuse
Devoted short-extend correspondence (DSRC) is a developing method to push the keen transportation framework into our day by day life. The DSRC norms for the most part receive FM0 and Manchester codes to achieve dc-ad...
A New Approach for Node Replica Detection in WSN
Wireless sensor networks are a collection of sensor nodes scattered over the area for data collection. But the main problem is it is in danger to the node clone. To identify Node clone proposing distributed hash table...
Ladderal Structure Of Super Resolution With Support Of Inpainting
Inpainting is the process of reconstructing lost or deteriorated part of images based on the background information. i. e. image Inpainting fills the missing or damaged region in an image utilizing spatial informatio...