Abstract

Cloud computing is a technology for sharing the resources for on demand request and for processing the data . V V arious cloud storage providers (CSP) offers free and premium cloud storage spaces. Multi cloud storage management application provides a single unified interface to access all the connected storage spaces to obtain quick accessibility removing the effort and time involved in switching between CSPs to access data hosted in different CSPs. Authenticated accessibility ensures a secured environment but provision to audit the actions performed to verify the history of actions is required for auditing to ensure the data and application integrity. Observing and registering a Trace Log for each and every actions performed by each user will facilitate and assure the process of auditing. In order to secure the Trace Logs of each user from unauthorized access of other users, encryption can be employed using user specific secret key. This approach will ensure both security and authorization for the Trace Logs.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call