Please use this identifier to cite or link to this item: https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/15725
Full metadata record
DC FieldValueLanguage
dc.contributor.authorShekhar, R-
dc.contributor.authorSridhar, T-
dc.date.accessioned2024-07-08T10:06:50Z-
dc.date.available2024-07-08T10:06:50Z-
dc.date.issued2018-01-
dc.identifier.citationVol. 4, No. 1; pp. 6-11en_US
dc.identifier.issn2454-9762-
dc.identifier.issn2454-9762-
dc.identifier.urihttps://www.ijarmate.com/index.php?option=com_login&task=download_volume_doc&fname=V4i1&foldertype=journal&id=867-
dc.identifier.urihttps://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/15725-
dc.description.abstractCloud security incorporate under its umbrella extremely broad arrangement of administration level assertions (SLA's), systems which are utilized to secure client information, applications and assets that are associated by means of cloud. Be that as it may, in any case the customers are incapacitated with next to no help and learning about what really happens to their information after they have pushed it on to the cloud. Information possession is critical issue, particularly while managing a gigantic measure of information. This permits cloud gives to make their own terms and conditions, which on occasion may appear to be self-assertive. We proposed a novel approach which will keep up logging and observing for helping cloud purchasers to distinguish any strange movement and resolve the issues as needs be. However, logging has a wide application as well, hence it relies upon the client how and what he logs and screens. To help the purchasers all cloud specialist co-ops keep up logs and produce a tremendous measure of data, quite a bit of which is excess, clumsily designed, yet there are shrouded pieces of information that can help the customer to comprehend that they are having, or all the more vitally, going to have an issue. Utilizing these logs the work makes a device which parses these logs and gives client the adept measure of data and enables them to comprehend their exercises and occupation conduct on cloud. It causes them to report any irregularity in the utilization of their cloud occupation and foundation adequately.en_US
dc.language.isoenen_US
dc.publisherInternational Journal of Advanced Research in Management, Architecture, Technology and Engineering (IJARMATE)en_US
dc.subjectCloud Computingen_US
dc.subjectCloud Securityen_US
dc.subjectOpenstacken_US
dc.subjectServer Node Logen_US
dc.subjectLogging And Monitoringen_US
dc.titleRetreat In Distributed Computing Utilization Of Action Log For Client Statistics Assuranceen_US
dc.typeArticleen_US
Appears in Collections:Journal Articles

Files in This Item:
File Description SizeFormat 
document_2_dz3q_30122017.pdf634.12 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.