Cloud Based Secured Log Retrieval Using Fully Homomorphic Encryption
DOI:
https://doi.org/10.51983/ajeat-2020.9.1.1084Keywords:
Cloud Security, Logging, Fully Homomorphic Encryption, DeciphermentAbstract
Cloud computing provides a scalable platform for growing amount of data and processes that work on various applications and services by means of on-demand service providing. The storage services offered by clouds have become a new profit growth by providing a comparably cheapest, scalable, location-independent platform for managing users’ data. Client uses the cloud storage and enjoys the high-quality applications and services from a shared pool of configurable computing resources using cloud services. It reduces the trouble of local data storage and maintenance. But it gives severe security threats toward users’ outsourced data. Maintaining the log record securely over extended period is very crucial to the proper functioning of any organization. Log holds the record of system events specially user activities. It is the main target for malicious attackers. An attacker, breaking into a system would not try to leave traces of his or her activities behind. This proposed work mainly concentrates on the problem of log security in cloud computing system and using fully homomorphism encryption algorithm in the cloud computing log data.
References
K. Kent and M. Souppaya, "Guide to Computer Security Log Management," NIST Special Publication.
F. Zhao, C. Li, and C.F. Liu, "A cloud computing security solution based on Fully Homomorphic Encryption," in ICACT2014, February 2014.
V. Varadharajan and U. Tupakula, "Security as a Service Model for Cloud Environment," IEEE Transactions on Network and Service Management, vol. 11, no. 1, March 2014.
I. Ray, K. Belyaev, M. Strizhov, D. Mulamba, and M. Rajaram, "Secure Logging as a Service-Delegating Log Management to the Cloud," IEEE Systems Journal, vol. 7, no. 2, June 2013.
S. Bajpal and P. Srivastava, "A Fully Homomorphic Encryption Implementation on Cloud Computing," International Journal of Information & Computation Technology, vol. 4, no. 8, 2014.
M. Tebaa, S. El Hajji, and A. El Ghazi, "Homomorphic Encryption Applied to the Cloud Computing Security," in World Congress on Engineering, 2012.
B. Rajeswari and B. Suneel Kumar, "CLASS: Cloud Log Assuring Soundness and Secrecy scheme for cloud Forensics," International Journal of Engineering Technology Science and Research, vol. 6, no. 7, July 2019.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.