Submit Paper

Article Processing Fee

Pay Online

           

Crossref logo

  DOI Prefix   10.20431


 

International Journal of Research Studies in Computer Science and Engineering
Volume 2, Issue 7, 2015, Page No: 1-6

Secure Log Data Storage in Cloud by Using AES Algorithm

G.Sindhuja1, G.Prabhakar1, G.Bhanu Prasad1

1.Dept of Computer Science and Engineering ,Malla Reddy Engineering College For Women, Hyderabad, India.

Citation : G.Sindhuja, G.Prabhakar, G.Bhanu Prasad, Secure Log Data Storage in Cloud by Using AES Algorithm International Journal of Research Studies in Computer Science and Engineering 2015, 2(7) : 1-6

Abstract

Cloud computing permits very ascendible services to be merely consumed over the online on associate as-needed basis. A serious feature of the cloud services is that users' information area unit typically processed remotely in unknown machines that users don't own or operate. whereas enjoying the convenience brought by this new rising technology, users' fears of losing management of their own information (particularly, monetary and health data) can become a giant barrier to the wide adoption of cloud services. To handle this drawback, during this paper, we have a tendency to tend to propose a very distinctive very suburbanized info answerableness framework to remain track of the actual usage of the users' knowledge among the cloud. Significantly, we have a tendency to tend to propose associate object-centered approach that allows insertion our work mechanism in conjunction with users' info and policies. We tend to leverage the JAR programmable capabilities to every produce a dynamic and traveling object, and to create certain that any access to users' info will trigger authentication and automatic work native to the JARs. To strengthen user's management, we have a tendency to conjointly give distributed auditing mechanisms. We provide full experimental studies that demonstrate the efficiency and effectiveness of the planned approaches. We implement how to store secure log file in cloud and that file we can change read, write, delete, upload and download. We can implement AES algorithm that uses for log monitor and log generator.


Download Full paper: Click Here