원문정보
초록
영어
Today cloud computing has been the buzzword among many communities. Many users are using the cloud to ensure cost effectiveness towards their hardware resources. As cloud may seem tempting there are many security issues relating to the cloud. One the issue is the activities performed on the data, which are monitored by logs. These logs are used as evidence to the forensic investigators. But due to the emerging technologies the hackers are able to modify the log data. When the hackers modify the data, it is a painful task for the forensic investigators to rebuild the evidence. So to address this issue we are developing a mechanism to generate the log files, ensure security to log files and making the log files interoperable to the Cloud Service Provider (CSP).
목차
1. Introduction
1.1. Cloud Architecture
1.2. Five Essential Physiognomies of Cloud Computing Are
1.3. Three Service Models Are
1.4. Four Deployment Models Are
2. Provenance
3. Related Work
3.1. Rule-based provenance tracing algorithms
3.2. S2 Logger
3.3. PASS (Provenance Aware Storage Systems)
4. JAR (Java Archive Files)
5. AES (Advanced Encryption Standard)
6. Proposed Approach
7. Results
8. Conclusion
References