Abstract

Nowadays organization use the cloud infrastructure to store data as no local setup needed in the user system. To retrieve files from the cloud, the user needs internet service. When the internet comes into the picture, a lot of attacks happens on the cloud, and to detect & prevent those attacks, cloud forensics is used. Secure user log file on the cloud is also important as the cloud log contains valuable information which helps in forensics investigation. Previously designed logging systems have some drawbacks for providing security to the cloud user. The existing system provides security on user files which is uploaded by the user or they provide login authentication of the user. In this secure logging, the scheme is provided by encrypting cloud logs (sensitive information of the user) using encryption techniques and it identifies DDoS (distributed denial of service) assault on the cloud framework. It is distinguished through investigating accessible cloud logs in the cloud server. Encryption algorithms will be utilized to build the security of the logging system and to keep up secrecy and protection of client information.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.