Cloud Based Secured Log Retrieval Using Fully Homomorphic Encryption

Authors

  • B. Rasina Begum Research Scholar, Department of Computer Science and Engineering, Mohamed Sathak Engineering College, Kilakarai, Ramanathapuram, Tamil Nadu, India
  • P. Chithra Professor, Department of Computer Science and Engineering, Thiagarajar College of Engineering, Madurai, Tamil Nadu India

DOI:

https://doi.org/10.51983/ajeat-2020.9.1.1084

Keywords:

Cloud Security, Logging, Fully Homomorphic Encryption, Decipherment

Abstract

Cloud computing provides a scalable platform for growing amount of data and processes that work on various applications and services by means of on-demand service providing. The storage services offered by clouds have become a new profit growth by providing a comparably cheapest, scalable, location-independent platform for managing users’ data. Client uses the cloud storage and enjoys the high-quality applications and services from a shared pool of configurable computing resources using cloud services. It reduces the trouble of local data storage and maintenance. But it gives severe security threats toward users’ outsourced data. Maintaining the log record securely over extended period is very crucial to the proper functioning of any organization. Log holds the record of system events specially user activities. It is the main target for malicious attackers. An attacker, breaking into a system would not try to leave traces of his or her activities behind. This proposed work mainly concentrates on the problem of log security in cloud computing system and using fully homomorphism encryption algorithm in the cloud computing log data.

References

K. Kent and M. Souppaya, "Guide to Computer Security Log Management," NIST Special Publication.

F. Zhao, C. Li, and C.F. Liu, "A cloud computing security solution based on Fully Homomorphic Encryption," in ICACT2014, February 2014.

V. Varadharajan and U. Tupakula, "Security as a Service Model for Cloud Environment," IEEE Transactions on Network and Service Management, vol. 11, no. 1, March 2014.

I. Ray, K. Belyaev, M. Strizhov, D. Mulamba, and M. Rajaram, "Secure Logging as a Service-Delegating Log Management to the Cloud," IEEE Systems Journal, vol. 7, no. 2, June 2013.

S. Bajpal and P. Srivastava, "A Fully Homomorphic Encryption Implementation on Cloud Computing," International Journal of Information & Computation Technology, vol. 4, no. 8, 2014.

M. Tebaa, S. El Hajji, and A. El Ghazi, "Homomorphic Encryption Applied to the Cloud Computing Security," in World Congress on Engineering, 2012.

B. Rajeswari and B. Suneel Kumar, "CLASS: Cloud Log Assuring Soundness and Secrecy scheme for cloud Forensics," International Journal of Engineering Technology Science and Research, vol. 6, no. 7, July 2019.

Downloads

Published

01-02-2020

How to Cite

Rasina Begum, B., & Chithra, P. (2020). Cloud Based Secured Log Retrieval Using Fully Homomorphic Encryption. Asian Journal of Engineering and Applied Technology, 9(1), 13–17. https://doi.org/10.51983/ajeat-2020.9.1.1084