Implementation of Secure Log Management Over Cloud

Main Article Content

Mr. Kolhe Harshal Narayan, Prof. Imran R. Shaikh


A Log records are very important information which is related to activities of systems, applications or networks and these log records having various fields and their syntax. Actually logs are automatically generated on activities that are done and doing by user on system, or on any Applications such as Google Chrome or in networks. These logs are costly and need to any organization for future references such as to identify or finding any problems, to record all events, to find performance, and to investigate malicious activities in systems or networks or in application. So, protection of logs from attackers is required. Hence organization should maintain integrity, confidentiality, and security of logs. The cost to maintain logs for organizations for longer period is very less. Hence, we developed secure log management over cloud to decrease cost as well as provide security of log from attackers. To achieve this, we have done this with the help of Blowfish algorithm to Encrypt log records then SHA-1 is used to provide confidentiality while transmitting and at end point security purpose we used Shamir’s Secret sharing algorithm.
DOI: 10.17762/ijritcc2321-8169.1505118

Article Details

How to Cite
, M. K. H. N. P. I. R. S. (2015). Implementation of Secure Log Management Over Cloud. International Journal on Recent and Innovation Trends in Computing and Communication, 3(5), 3042–3048.