Please use this identifier to cite or link to this item: https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/2288
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSridhar, T-
dc.contributor.authorVivek, V-
dc.contributor.authorShekhar, R-
dc.date.accessioned2023-12-09T08:56:05Z-
dc.date.available2023-12-09T08:56:05Z-
dc.date.issued2017-
dc.identifier.citationpp. 1458-1462en_US
dc.identifier.isbn9781509037049-
dc.identifier.urihttps://doi.org/10.1109/RTEICT.2017.8256839-
dc.identifier.urihttp://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/2288-
dc.description.abstractCloud security encompass under its umbrella very extensive set of service level agreements (SLA's), methodologies which are used to secure user data, applications and resources that are connected via cloud. But, still the clients are handicapped with very little support and knowledge about what actually happens to their data after they have pushed it on to the cloud. Data ownership is important issue, especially while dealing with an enormous amount of data. This allows cloud provides to create their own terms and conditions, which at times may seem arbitrary. We proposed a novel approach which will maintain logging and monitoring for helping cloud consumers to identify any abnormal activity and resolve the problems accordingly. But, logging has a wide application too, therefore it depends on the user how and what he logs and monitors. To aid the consumers all cloud service providers maintain logs and generate a huge amount of information, much of which is redundant, awkwardly formatted, but there are hidden clues that can help the consumer to understand that they are having, or more importantly, about to have a problem. Using these logs the work creates a tool which parses these logs and provides user the apt amount of information and allows them to understand their activities and job behavior on cloud. It helps them to report any anomaly in the use of their cloud job and infrastructure effectively. © 2017 IEEE.en_US
dc.language.isoenen_US
dc.publisherRTEICT 2017 - 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technologyen_US
dc.subjectCloud Computingen_US
dc.subjectCloud securityen_US
dc.subjectlogging and monitoringen_US
dc.subjectOpenStacken_US
dc.subjectServer node logen_US
dc.titleSeclogmon : Security In Cloud Computing Using Activity Log For Consumer Data Protectionen_US
dc.typeArticleen_US
Appears in Collections:Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.