Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:2 Issue:3 Year: 08 April,2014 Pages:184-191
CLOUD computing presents a replacement thanks to supplement this consumption and delivery model for IT services supported the net, by providing for dynamically scalable and sometimes virtualized resources as a service over the net. The JAR file includes a group of straightforward access management rules specifying whether or not and the way the cloud servers and probably different knowledge stakeholder’s square measure approved to access the content itself. Once the authentication succeeds, the service supplier is allowed to access the info capsulate within the JAR. Reckoning on the configuration settings outlined at the time of creation, the JAR can offer usage management related to work, or can offer solely work practicality. As for the work, every time there\'s associate access to the info, the JAR can mechanically generate a log record. In this paper to provide the data security in cloud and to view the log records .log records are using to find out the unauthorized person
Secure production, Jar creation, log Record generation, Push and Pull Mode.
[1]. P. Ammann and S. Jajodia, ―Distributed Timestamp Generation in Planar Lattice Networks,‖ ACM Trans. Computer Systems, vol. 11, pp. 205-225, Aug. 1993. [2]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, ―Provable Data Possession at Untrusted Stores,‖ Proc. ACM Conf. Computer and Comm. Security, pp. 598- 609, 2007. [3]. E. Barka and A. Lakas, ―Integrating Usage Control with SIP-Based Communications,‖ J. Computer Systems, Networks, and Comm.,vol. 2008, pp. 1-8, 2008. [4]. D. Boneh and M.K. Franklin, ―Identity-Based Encryption from the Weil Pairing,‖ Proc. Int’l Cryptology Conf. Advances in Cryptology, pp. 213-229, 2001. [5]. R. Bose and J. Frew, ―Lineage Retrieval for Scientific Data Processing: A Survey,‖ ACM Computing Surveys, vol. 37, pp. 1- 28, Mar. 2005. [6]. M. Bellare and B. S. Yee, ―Forward integrity for secure audit logs,‖ Dept. Comput. Sci., Univ. California, San Diego, Tech. Rep., Nov. 1997. [7]. BalaBit IT Security (2011, Sep.).Syslog-ng—Multiplatform Syslog Server and Logging Daemon [Online]. Available: http://www.balabit.com/network-security/syslog-ng [8]. J. Kelsey, J. Callas, and A. Clemm, Signed Syslog Messages, Request for Comment RFC 5848, Internet Engineering Task Force, Network Working Group, May 2010. [9]. D. Ma and G. Tsudik, ―A new approach to secure logging,‖ ACM Trans.Storage, vol. 5, no. 1, pp. 2:1–2:21, Mar. 2009. [10]. U. Flegel, ―Pseudonymizingunix log file,‖ in Proc. Int. Conf. Infrastruture Security, LNCS 2437. Oct. 2002, pp. 162–179. [11]. C. Eckert and A. Pircher, ―Internet anonymity: Problems and solutions,‖ inProc. 16th IFIP TC-11 Int. Conf. Inform. Security, 2001, pp. 35–50 . [12]. M. Rose, The Blocks Extensible Exchange Protocol Core, Request for Comment RFC 3080, Internet Engineering Task Force, Network Working Group, Mar. 2001. [13]. B. Schneier and J. Kelsey, ―Security audit logs to support computer forensics,‖ ACM Trans. Inform. Syst. Security, vol. 2, no. 2, pp. 159–176, May 1999. [14]. J. E. Holt, ―Logcrypt: Forward security and public verification for secure audit logs,‖ in Proc. 4th Australasian Inform. Security Workshop, 2006,pp. 203–211. [15]. R. Dingledine, N. Mathewson, and P. Syverson, ―Tor: The second generation onion router,‖ in Proc. 12th Ann. USENIX Security Symp.,Aug. 2004, pp. 21–21. [16]. The Tor Project, Inc. (2011, Sep.) Tor: Anonymity Online [Online]. Available: http://www.torproject.org [17]. D. Dolev and A. Yao, ―On the security of public key protocols,‖ IEEE Trans. Inform. Theory, vol. 29, no. 2, pp. 198–208, Mar. 1983. [18]. A. Shamir, ―How to share a secret,‖ Commun. ACM, vol. 22, no. 11,pp. 612–613, Nov. 1979. [19]. G. R. Blakley, ―Safeguarding cryptographic keys,‖ in Proc. Nat. Comput.Conf., Jun. 1979, p. 313.